Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
21/05/2024, 09:44
Static task
static1
Behavioral task
behavioral1
Sample
2ef8b2aafd8af5911313aed2e32e846788a85a682f63fba4272eb318f1f6b679_NeikiAnalytics.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
2ef8b2aafd8af5911313aed2e32e846788a85a682f63fba4272eb318f1f6b679_NeikiAnalytics.exe
Resource
win10v2004-20240426-en
General
-
Target
2ef8b2aafd8af5911313aed2e32e846788a85a682f63fba4272eb318f1f6b679_NeikiAnalytics.exe
-
Size
73KB
-
MD5
b6220d85af3a02dea4f4d6f3d5367270
-
SHA1
3c26a70052c86c1e44d0e4dd2fedc7ae36930d3b
-
SHA256
2ef8b2aafd8af5911313aed2e32e846788a85a682f63fba4272eb318f1f6b679
-
SHA512
6ae1e5c4e41dfb6d17be5e3a2c508292965c46e87b6484f223e15e01d5776b5f6524c67a98c69765f1e482c1197f4f87215fee243f4545ab73f544d7f03cab6b
-
SSDEEP
1536:hbWJazkMYdK5QPqfhVWbdsmA+RjPFLC+e5h40ZGUGf2g:hyY3qNPqfcxA+HFsh4Og
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2540 [email protected] -
Loads dropped DLL 2 IoCs
pid Process 2972 cmd.exe 2972 cmd.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2940 wrote to memory of 2972 2940 2ef8b2aafd8af5911313aed2e32e846788a85a682f63fba4272eb318f1f6b679_NeikiAnalytics.exe 29 PID 2940 wrote to memory of 2972 2940 2ef8b2aafd8af5911313aed2e32e846788a85a682f63fba4272eb318f1f6b679_NeikiAnalytics.exe 29 PID 2940 wrote to memory of 2972 2940 2ef8b2aafd8af5911313aed2e32e846788a85a682f63fba4272eb318f1f6b679_NeikiAnalytics.exe 29 PID 2940 wrote to memory of 2972 2940 2ef8b2aafd8af5911313aed2e32e846788a85a682f63fba4272eb318f1f6b679_NeikiAnalytics.exe 29 PID 2972 wrote to memory of 2540 2972 cmd.exe 30 PID 2972 wrote to memory of 2540 2972 cmd.exe 30 PID 2972 wrote to memory of 2540 2972 cmd.exe 30 PID 2972 wrote to memory of 2540 2972 cmd.exe 30 PID 2540 wrote to memory of 2596 2540 [email protected] 31 PID 2540 wrote to memory of 2596 2540 [email protected] 31 PID 2540 wrote to memory of 2596 2540 [email protected] 31 PID 2540 wrote to memory of 2596 2540 [email protected] 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\2ef8b2aafd8af5911313aed2e32e846788a85a682f63fba4272eb318f1f6b679_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\2ef8b2aafd8af5911313aed2e32e846788a85a682f63fba4272eb318f1f6b679_NeikiAnalytics.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2940 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c [email protected]2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2972 -
C:\Users\Admin\AppData\Local\Temp\[email protected]PID:2540
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c 00.exe4⤵PID:2596
-
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\[email protected]
Filesize73KB
MD549eca8f8aa73bf5596c525861f5ed022
SHA1593635ac0dbc56a78b92c6e30c475ff95c060f0e
SHA2569073d61ed7e9fb91e5d30178109984b023d70bb5e3b130f5cf3886cf42cb6562
SHA5123d4412d16b8615625cd4d172fac681746a94d30c931a154a248beb5f8929ff18956265edbb5b4977deeb56eba4e021eb051b00aa96227e6451246f1b84290570