Analysis
-
max time kernel
148s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
19-05-2024 19:54
Behavioral task
behavioral1
Sample
2993f9f3de9d6970c92c98339ace7fc0_NeikiAnalytics.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
2993f9f3de9d6970c92c98339ace7fc0_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
2993f9f3de9d6970c92c98339ace7fc0_NeikiAnalytics.exe
-
Size
39KB
-
MD5
2993f9f3de9d6970c92c98339ace7fc0
-
SHA1
74699afbc7a9d5fd0add201f707554c647177d8e
-
SHA256
abb7c0224b3829bb35d7e50633e9cc45830c26e79a703c61316b3a1b1b186456
-
SHA512
d51e4bfd42b99e4beb466370c6608d5c6b43637f7f9329c377ebaf00cff4e68b9a4c50d7f275de881b0bfe2d7eadcde0fe3d747ef6694091a84a487140fdc874
-
SSDEEP
768:q7PdFecFS5agQtOOtEvwDpjeMLZdzuqpXsiE8Wq/DpkITYXi:qDdFJy3QMOtEvwDpjjWMl7TD
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2272 asih.exe -
Loads dropped DLL 1 IoCs
pid Process 2208 2993f9f3de9d6970c92c98339ace7fc0_NeikiAnalytics.exe -
resource yara_rule behavioral1/memory/2208-0-0x0000000000500000-0x0000000000510000-memory.dmp upx behavioral1/files/0x000c00000001275b-11.dat upx behavioral1/memory/2208-13-0x0000000000600000-0x0000000000610000-memory.dmp upx behavioral1/memory/2208-17-0x0000000000500000-0x0000000000510000-memory.dmp upx behavioral1/memory/2272-27-0x0000000000500000-0x0000000000510000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2208 wrote to memory of 2272 2208 2993f9f3de9d6970c92c98339ace7fc0_NeikiAnalytics.exe 29 PID 2208 wrote to memory of 2272 2208 2993f9f3de9d6970c92c98339ace7fc0_NeikiAnalytics.exe 29 PID 2208 wrote to memory of 2272 2208 2993f9f3de9d6970c92c98339ace7fc0_NeikiAnalytics.exe 29 PID 2208 wrote to memory of 2272 2208 2993f9f3de9d6970c92c98339ace7fc0_NeikiAnalytics.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\2993f9f3de9d6970c92c98339ace7fc0_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\2993f9f3de9d6970c92c98339ace7fc0_NeikiAnalytics.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2208 -
C:\Users\Admin\AppData\Local\Temp\asih.exe"C:\Users\Admin\AppData\Local\Temp\asih.exe"2⤵
- Executes dropped EXE
PID:2272
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
39KB
MD55d3ca4b3ef15429bf6228fa99908cb01
SHA172b1c52c0eb7f388f2cb3f765556e7835fdd14c4
SHA25655e8515073d1746c395a9db5061e09c0635f36abfe8ed8b5fe481cb6d3c4d49a
SHA5121c612419c26d0b2476f92f6289769e26df1870788a983828810239d68d236ee3626a6e545a783bcfa76b75c9b7fcd60588d476a5b8a63647b48cf87853a3e662