Analysis
-
max time kernel
129s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
18-05-2024 13:31
Behavioral task
behavioral1
Sample
ce58f09c1fd2e3d53f16c579f0c7e950_NeikiAnalytics.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
ce58f09c1fd2e3d53f16c579f0c7e950_NeikiAnalytics.exe
Resource
win10v2004-20240426-en
General
-
Target
ce58f09c1fd2e3d53f16c579f0c7e950_NeikiAnalytics.exe
-
Size
80KB
-
MD5
ce58f09c1fd2e3d53f16c579f0c7e950
-
SHA1
6daf6c675fbccacc4966ba52a6cc4257085f88e0
-
SHA256
11b601c4a4c13b07fb1783dccee903c98da103a02ff1702b7cd9e9dd7ff4f874
-
SHA512
208ba79e75d227dbedb836cf05284d76168bf0756def95ff7ca8ed42f186e582ab8e13e35c9710f24bd1448568c08e125db60990b9a6439cf30d9675fe65ea18
-
SSDEEP
1536:nL1YLP2tFivwdGoB5PpSUF23ICquF7i0CmuJd4BXL:L1YbClGo/RhFooBbd45
Malware Config
Signatures
-
Deletes itself 1 IoCs
Processes:
ce58f09c1fd2e3d53f16c579f0c7e950_NeikiAnalytics.exepid process 2296 ce58f09c1fd2e3d53f16c579f0c7e950_NeikiAnalytics.exe -
Executes dropped EXE 1 IoCs
Processes:
ce58f09c1fd2e3d53f16c579f0c7e950_NeikiAnalytics.exepid process 2296 ce58f09c1fd2e3d53f16c579f0c7e950_NeikiAnalytics.exe -
Processes:
resource yara_rule behavioral2/memory/2908-0-0x0000000000400000-0x000000000043A000-memory.dmp upx C:\Users\Admin\AppData\Local\Temp\ce58f09c1fd2e3d53f16c579f0c7e950_NeikiAnalytics.exe upx behavioral2/memory/2296-13-0x0000000000400000-0x000000000043A000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
Processes:
ce58f09c1fd2e3d53f16c579f0c7e950_NeikiAnalytics.exepid process 2908 ce58f09c1fd2e3d53f16c579f0c7e950_NeikiAnalytics.exe -
Suspicious use of UnmapMainImage 2 IoCs
Processes:
ce58f09c1fd2e3d53f16c579f0c7e950_NeikiAnalytics.exece58f09c1fd2e3d53f16c579f0c7e950_NeikiAnalytics.exepid process 2908 ce58f09c1fd2e3d53f16c579f0c7e950_NeikiAnalytics.exe 2296 ce58f09c1fd2e3d53f16c579f0c7e950_NeikiAnalytics.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
ce58f09c1fd2e3d53f16c579f0c7e950_NeikiAnalytics.exedescription pid process target process PID 2908 wrote to memory of 2296 2908 ce58f09c1fd2e3d53f16c579f0c7e950_NeikiAnalytics.exe ce58f09c1fd2e3d53f16c579f0c7e950_NeikiAnalytics.exe PID 2908 wrote to memory of 2296 2908 ce58f09c1fd2e3d53f16c579f0c7e950_NeikiAnalytics.exe ce58f09c1fd2e3d53f16c579f0c7e950_NeikiAnalytics.exe PID 2908 wrote to memory of 2296 2908 ce58f09c1fd2e3d53f16c579f0c7e950_NeikiAnalytics.exe ce58f09c1fd2e3d53f16c579f0c7e950_NeikiAnalytics.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ce58f09c1fd2e3d53f16c579f0c7e950_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\ce58f09c1fd2e3d53f16c579f0c7e950_NeikiAnalytics.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\ce58f09c1fd2e3d53f16c579f0c7e950_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\ce58f09c1fd2e3d53f16c579f0c7e950_NeikiAnalytics.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\ce58f09c1fd2e3d53f16c579f0c7e950_NeikiAnalytics.exeFilesize
80KB
MD5502946d61d8e1544c7cd371097b50ba4
SHA1f08391d2204a24b6b8f18f177e300990f44f6a3d
SHA256afb3bc2a679362e7e7a2bd6f8047671cf24353c493762ef82e0817d9eb8534b4
SHA512afcdb924b64d25e8938ac9daafd82761111bd02996bc3d5772abb8125922aaa043b2ab0df107352e20461a41878b174720268b065a94becbaa22d8813d39f33f
-
memory/2296-13-0x0000000000400000-0x000000000043A000-memory.dmpFilesize
232KB
-
memory/2296-14-0x0000000000400000-0x000000000041B000-memory.dmpFilesize
108KB
-
memory/2296-19-0x0000000000190000-0x000000000019E000-memory.dmpFilesize
56KB
-
memory/2296-20-0x0000000000400000-0x000000000040E000-memory.dmpFilesize
56KB
-
memory/2296-25-0x00000000014B0000-0x00000000014CB000-memory.dmpFilesize
108KB
-
memory/2296-26-0x0000000000400000-0x000000000043A000-memory.dmpFilesize
232KB
-
memory/2908-0-0x0000000000400000-0x000000000043A000-memory.dmpFilesize
232KB
-
memory/2908-1-0x00000000000E0000-0x00000000000EE000-memory.dmpFilesize
56KB
-
memory/2908-2-0x0000000000400000-0x000000000041B000-memory.dmpFilesize
108KB
-
memory/2908-12-0x0000000000400000-0x000000000041B000-memory.dmpFilesize
108KB