Analysis
-
max time kernel
117s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
22-05-2024 21:32
Static task
static1
Behavioral task
behavioral1
Sample
41094def0fc4232a1a944e0d96cd3bb0_NeikiAnalytics.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
41094def0fc4232a1a944e0d96cd3bb0_NeikiAnalytics.exe
Resource
win10v2004-20240226-en
General
-
Target
41094def0fc4232a1a944e0d96cd3bb0_NeikiAnalytics.exe
-
Size
202KB
-
MD5
41094def0fc4232a1a944e0d96cd3bb0
-
SHA1
7b875ab7bdd2ef167adec5a223c8a92427507b07
-
SHA256
27228fb292fd3d144e373584bc25aeae69507a4c3e5ac2013481dd93d01b8137
-
SHA512
7da13a9724937a201f4bd7f02f6a0dea25bf3a93f1c8524716354d649b968b3c83cb0bf0fac086355ce2a20b561479f3203a63b73ef0aaa3e3d383e9e98c6037
-
SSDEEP
6144:09kwBxO6SXQ/Yr9nWOsVNc2DQ99bu3Ti8FpoVrP:0DSgQxWOl2DeajpoVrP
Malware Config
Signatures
-
Deletes itself 1 IoCs
Processes:
41094def0fc4232a1a944e0d96cd3bb0_NeikiAnalytics.exepid process 2980 41094def0fc4232a1a944e0d96cd3bb0_NeikiAnalytics.exe -
Executes dropped EXE 1 IoCs
Processes:
41094def0fc4232a1a944e0d96cd3bb0_NeikiAnalytics.exepid process 2980 41094def0fc4232a1a944e0d96cd3bb0_NeikiAnalytics.exe -
Loads dropped DLL 1 IoCs
Processes:
41094def0fc4232a1a944e0d96cd3bb0_NeikiAnalytics.exepid process 2776 41094def0fc4232a1a944e0d96cd3bb0_NeikiAnalytics.exe -
Suspicious behavior: RenamesItself 1 IoCs
Processes:
41094def0fc4232a1a944e0d96cd3bb0_NeikiAnalytics.exepid process 2776 41094def0fc4232a1a944e0d96cd3bb0_NeikiAnalytics.exe -
Suspicious use of UnmapMainImage 1 IoCs
Processes:
41094def0fc4232a1a944e0d96cd3bb0_NeikiAnalytics.exepid process 2980 41094def0fc4232a1a944e0d96cd3bb0_NeikiAnalytics.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
41094def0fc4232a1a944e0d96cd3bb0_NeikiAnalytics.exedescription pid process target process PID 2776 wrote to memory of 2980 2776 41094def0fc4232a1a944e0d96cd3bb0_NeikiAnalytics.exe 41094def0fc4232a1a944e0d96cd3bb0_NeikiAnalytics.exe PID 2776 wrote to memory of 2980 2776 41094def0fc4232a1a944e0d96cd3bb0_NeikiAnalytics.exe 41094def0fc4232a1a944e0d96cd3bb0_NeikiAnalytics.exe PID 2776 wrote to memory of 2980 2776 41094def0fc4232a1a944e0d96cd3bb0_NeikiAnalytics.exe 41094def0fc4232a1a944e0d96cd3bb0_NeikiAnalytics.exe PID 2776 wrote to memory of 2980 2776 41094def0fc4232a1a944e0d96cd3bb0_NeikiAnalytics.exe 41094def0fc4232a1a944e0d96cd3bb0_NeikiAnalytics.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\41094def0fc4232a1a944e0d96cd3bb0_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\41094def0fc4232a1a944e0d96cd3bb0_NeikiAnalytics.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:2776 -
C:\Users\Admin\AppData\Local\Temp\41094def0fc4232a1a944e0d96cd3bb0_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\41094def0fc4232a1a944e0d96cd3bb0_NeikiAnalytics.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2980
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
202KB
MD51ac55b0b65fa61fcc2e1674d6070cc23
SHA1e0ae5588844f9eb919249267cfdf4514aad17b5b
SHA256f5db4faccabcb3b8e09d110c3e238011d81d011a6fc68983cec6d231720309e0
SHA5120d7b5269c0af746f93516a67ad94a7fba8dc2aea5c05d281bef30d3b7fd39e18b2944b7c6c0b729b2f75cfa0347370e24f9e7a1b548e47c0a08aeede6f3ec0bb