Analysis
-
max time kernel
118s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
22-05-2024 22:18
Static task
static1
Behavioral task
behavioral1
Sample
4a7647858648aaf45b2163e3ceb4b170_NeikiAnalytics.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
4a7647858648aaf45b2163e3ceb4b170_NeikiAnalytics.exe
Resource
win10v2004-20240426-en
General
-
Target
4a7647858648aaf45b2163e3ceb4b170_NeikiAnalytics.exe
-
Size
154KB
-
MD5
4a7647858648aaf45b2163e3ceb4b170
-
SHA1
271f125eea1a744bf7bb820f8a8a4e4175c264ce
-
SHA256
17c5334d7cb118bb198bf13b120c7f5ed58848a4f38f46b8f4656fdf8aa0761c
-
SHA512
5c5f431d46ca14e3f3b18515616c14524be51efafbfe9392861fe0997e8d2e55eaceb1208d023dcaed98e7512a21c3811fa657110dab542daaefb7bb55503d4f
-
SSDEEP
1536:C7fPGykbOqjoHm4pICdfkLtAfupcWX50MxFY+yIOlnToIfOxmW:gq6+ouCpk2mpcWJ0r+QNTBfOcW
Malware Config
Signatures
-
Enumerates connected drives 3 TTPs 2 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
format.comdescription ioc process File opened (read-only) \??\A: format.com File opened (read-only) \??\B: format.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 10 IoCs
Processes:
4a7647858648aaf45b2163e3ceb4b170_NeikiAnalytics.execmd.exedescription pid process target process PID 2352 wrote to memory of 2748 2352 4a7647858648aaf45b2163e3ceb4b170_NeikiAnalytics.exe cmd.exe PID 2352 wrote to memory of 2748 2352 4a7647858648aaf45b2163e3ceb4b170_NeikiAnalytics.exe cmd.exe PID 2352 wrote to memory of 2748 2352 4a7647858648aaf45b2163e3ceb4b170_NeikiAnalytics.exe cmd.exe PID 2352 wrote to memory of 2748 2352 4a7647858648aaf45b2163e3ceb4b170_NeikiAnalytics.exe cmd.exe PID 2748 wrote to memory of 3060 2748 cmd.exe format.com PID 2748 wrote to memory of 3060 2748 cmd.exe format.com PID 2748 wrote to memory of 3060 2748 cmd.exe format.com PID 2748 wrote to memory of 2552 2748 cmd.exe notepad.exe PID 2748 wrote to memory of 2552 2748 cmd.exe notepad.exe PID 2748 wrote to memory of 2552 2748 cmd.exe notepad.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\4a7647858648aaf45b2163e3ceb4b170_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\4a7647858648aaf45b2163e3ceb4b170_NeikiAnalytics.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2352 -
C:\Windows\system32\cmd.exe"C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\118E.tmp\118F.tmp\1190.bat C:\Users\Admin\AppData\Local\Temp\4a7647858648aaf45b2163e3ceb4b170_NeikiAnalytics.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:2748 -
C:\Windows\system32\format.comformat D3⤵
- Enumerates connected drives
PID:3060
-
-
C:\Windows\system32\notepad.exenotepad3⤵PID:2552
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
141B
MD594a8c78e2af7ff36d7e0bf31ee7b4b1f
SHA19cf5959a6c1c85f7aa32cf8d24056b9b7cba0bf2
SHA2566b35541e58eb91b04c76e0f11d29e1b7c9d50ddf0473e1e48607e8f7776bbcf1
SHA512014509e76bbc7ceb0f56b3e5c17b45bc499a2e8655e9ef1b42237c56481d30f73cdd5cbe661f0ef279e277f35eca3ec6803ee6a42a00044cde97e3c678129f7a