Analysis
-
max time kernel
135s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
21/05/2024, 09:44
Static task
static1
Behavioral task
behavioral1
Sample
2ef8b2aafd8af5911313aed2e32e846788a85a682f63fba4272eb318f1f6b679_NeikiAnalytics.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
2ef8b2aafd8af5911313aed2e32e846788a85a682f63fba4272eb318f1f6b679_NeikiAnalytics.exe
Resource
win10v2004-20240426-en
General
-
Target
2ef8b2aafd8af5911313aed2e32e846788a85a682f63fba4272eb318f1f6b679_NeikiAnalytics.exe
-
Size
73KB
-
MD5
b6220d85af3a02dea4f4d6f3d5367270
-
SHA1
3c26a70052c86c1e44d0e4dd2fedc7ae36930d3b
-
SHA256
2ef8b2aafd8af5911313aed2e32e846788a85a682f63fba4272eb318f1f6b679
-
SHA512
6ae1e5c4e41dfb6d17be5e3a2c508292965c46e87b6484f223e15e01d5776b5f6524c67a98c69765f1e482c1197f4f87215fee243f4545ab73f544d7f03cab6b
-
SSDEEP
1536:hbWJazkMYdK5QPqfhVWbdsmA+RjPFLC+e5h40ZGUGf2g:hyY3qNPqfcxA+HFsh4Og
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3036 [email protected] -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4488 wrote to memory of 5040 4488 2ef8b2aafd8af5911313aed2e32e846788a85a682f63fba4272eb318f1f6b679_NeikiAnalytics.exe 88 PID 4488 wrote to memory of 5040 4488 2ef8b2aafd8af5911313aed2e32e846788a85a682f63fba4272eb318f1f6b679_NeikiAnalytics.exe 88 PID 4488 wrote to memory of 5040 4488 2ef8b2aafd8af5911313aed2e32e846788a85a682f63fba4272eb318f1f6b679_NeikiAnalytics.exe 88 PID 5040 wrote to memory of 3036 5040 cmd.exe 89 PID 5040 wrote to memory of 3036 5040 cmd.exe 89 PID 5040 wrote to memory of 3036 5040 cmd.exe 89 PID 3036 wrote to memory of 4448 3036 [email protected] 90 PID 3036 wrote to memory of 4448 3036 [email protected] 90 PID 3036 wrote to memory of 4448 3036 [email protected] 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\2ef8b2aafd8af5911313aed2e32e846788a85a682f63fba4272eb318f1f6b679_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\2ef8b2aafd8af5911313aed2e32e846788a85a682f63fba4272eb318f1f6b679_NeikiAnalytics.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4488 -
C:\Windows\SysWOW64\cmd.exePID:5040
-
C:\Users\Admin\AppData\Local\Temp\[email protected]PID:3036
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c 00.exe4⤵PID:4448
-
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\[email protected]
Filesize73KB
MD549eca8f8aa73bf5596c525861f5ed022
SHA1593635ac0dbc56a78b92c6e30c475ff95c060f0e
SHA2569073d61ed7e9fb91e5d30178109984b023d70bb5e3b130f5cf3886cf42cb6562
SHA5123d4412d16b8615625cd4d172fac681746a94d30c931a154a248beb5f8929ff18956265edbb5b4977deeb56eba4e021eb051b00aa96227e6451246f1b84290570
-
Filesize
2KB
MD57b621943a35e7f39cf89f50cc48d7b94
SHA12858a28cf60f38025fffcd0ba2ecfec8511c197d
SHA256bef04c2f89dc115ce2763558933dba1767bf30cda6856d335ae68955923f9991
SHA5124169e664ad4e7e6891a05ceed78465e0ec44879b37fc0de97c014945e10c161f6bfb040efc24edc136e69bb115b2a1327b04cefb58141f712da856129872e8f1