Analysis
-
max time kernel
129s -
max time network
99s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
21/05/2024, 06:16
Static task
static1
Behavioral task
behavioral1
Sample
0e0705194fb24dbf4b399451307c85adfd286e2285f4113c1616a5e5f5fdcaa3_NeikiAnalytics.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
0e0705194fb24dbf4b399451307c85adfd286e2285f4113c1616a5e5f5fdcaa3_NeikiAnalytics.exe
Resource
win10v2004-20240426-en
General
-
Target
0e0705194fb24dbf4b399451307c85adfd286e2285f4113c1616a5e5f5fdcaa3_NeikiAnalytics.exe
-
Size
79KB
-
MD5
118d707b05c51a881ab8793615450710
-
SHA1
22413c8011c9839cb2619cf0c31ae829c9929571
-
SHA256
0e0705194fb24dbf4b399451307c85adfd286e2285f4113c1616a5e5f5fdcaa3
-
SHA512
7da24955fbaa04a99d7fedf40b29eaaeefb0d658985b95d553431bd376478805bdbb82c1dec35334fdf8fc55a9e571fa30ea7dea97dee82bbf790236db618709
-
SSDEEP
1536:zvnQ97QhjYrr259AZOQA8AkqUhMb2nuy5wgIP0CSJ+5yiB8GMGlZ5G:zvnQx3f259A4GdqU7uy5w9WMyiN5G
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4688 [email protected] -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2908 wrote to memory of 1900 2908 0e0705194fb24dbf4b399451307c85adfd286e2285f4113c1616a5e5f5fdcaa3_NeikiAnalytics.exe 83 PID 2908 wrote to memory of 1900 2908 0e0705194fb24dbf4b399451307c85adfd286e2285f4113c1616a5e5f5fdcaa3_NeikiAnalytics.exe 83 PID 2908 wrote to memory of 1900 2908 0e0705194fb24dbf4b399451307c85adfd286e2285f4113c1616a5e5f5fdcaa3_NeikiAnalytics.exe 83 PID 1900 wrote to memory of 4688 1900 cmd.exe 84 PID 1900 wrote to memory of 4688 1900 cmd.exe 84 PID 1900 wrote to memory of 4688 1900 cmd.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\0e0705194fb24dbf4b399451307c85adfd286e2285f4113c1616a5e5f5fdcaa3_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\0e0705194fb24dbf4b399451307c85adfd286e2285f4113c1616a5e5f5fdcaa3_NeikiAnalytics.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2908 -
C:\Windows\SysWOW64\cmd.exePID:1900
-
C:\Users\Admin\AppData\Local\Temp\[email protected]PID:4688
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\[email protected]
Filesize79KB
MD567a37c86fe51de4f822b1e22d3380592
SHA1829f4ac0b8c8fb410efc90380ba2681097254541
SHA2561dfe4d599d60c9af897f6e62ca8f5052dbb8f2533880a7a090da5efb4231f702
SHA512b025828df7b2b75e00820e4547c2899bc96e65a1be4086acfff9b4180c5d409c06c2bfb0ba7fcb5eeebed59ce59bfe2e4be5115b19257ed48e5cf0befd63a0a3