Analysis
-
max time kernel
117s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
20/05/2024, 08:04
Static task
static1
Behavioral task
behavioral1
Sample
d9fa537e9ae17d58ef8aaef648864900_NeikiAnalytics.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
d9fa537e9ae17d58ef8aaef648864900_NeikiAnalytics.exe
Resource
win10v2004-20240426-en
General
-
Target
d9fa537e9ae17d58ef8aaef648864900_NeikiAnalytics.exe
-
Size
333KB
-
MD5
d9fa537e9ae17d58ef8aaef648864900
-
SHA1
d37d6778249472e5f224076a1830bdc5f38dad11
-
SHA256
981ae762f1e5137266cd717a2e513a2a39deb1c5b3c5023f485dd22e16bd4f65
-
SHA512
d4ab54ccdf65b53964a201756d94ddb6bc3ebb6232a7a8765b5afdea8a82402dd0fd86b301691477290b891fb4dda94bf77e452fcc864a4f3f0f9c4e9ad8c077
-
SSDEEP
6144:vsjAXgOhretc4YreqMQBULjW2Jybfd9yy6atBWONLRIaUOkKr:qAXgOhretcnreqfBajHyjd97trIahP
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1520 d9fa537e9ae17d58ef8aaef648864900_NeikiAnalytics.exe -
Executes dropped EXE 1 IoCs
pid Process 1520 d9fa537e9ae17d58ef8aaef648864900_NeikiAnalytics.exe -
Loads dropped DLL 1 IoCs
pid Process 3048 d9fa537e9ae17d58ef8aaef648864900_NeikiAnalytics.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3048 d9fa537e9ae17d58ef8aaef648864900_NeikiAnalytics.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 1520 d9fa537e9ae17d58ef8aaef648864900_NeikiAnalytics.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3048 wrote to memory of 1520 3048 d9fa537e9ae17d58ef8aaef648864900_NeikiAnalytics.exe 29 PID 3048 wrote to memory of 1520 3048 d9fa537e9ae17d58ef8aaef648864900_NeikiAnalytics.exe 29 PID 3048 wrote to memory of 1520 3048 d9fa537e9ae17d58ef8aaef648864900_NeikiAnalytics.exe 29 PID 3048 wrote to memory of 1520 3048 d9fa537e9ae17d58ef8aaef648864900_NeikiAnalytics.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\d9fa537e9ae17d58ef8aaef648864900_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\d9fa537e9ae17d58ef8aaef648864900_NeikiAnalytics.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:3048 -
C:\Users\Admin\AppData\Local\Temp\d9fa537e9ae17d58ef8aaef648864900_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\d9fa537e9ae17d58ef8aaef648864900_NeikiAnalytics.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:1520
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
333KB
MD58b301437f23a7fb2eb2ba72aaf5efd59
SHA1b7436a8866b45e4a798312e23317c090d05cb3bf
SHA256ac22903d5ed003d7ae8d9fe3cc1e42719c06a3543334ebec8a2613c0f0818193
SHA5125f07ce7e0356b8c6a780c7cd4b4a680e226fb55111f27fbe52002ad78893d760157aae1a9fe99c5ee07276a6696d946478c926214a61e49091202fc716aafc87