Analysis
-
max time kernel
128s -
max time network
98s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
22-05-2024 21:36
Static task
static1
Behavioral task
behavioral1
Sample
41c6927a623a6a5d3f8b365096124480_NeikiAnalytics.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
41c6927a623a6a5d3f8b365096124480_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
41c6927a623a6a5d3f8b365096124480_NeikiAnalytics.exe
-
Size
2.6MB
-
MD5
41c6927a623a6a5d3f8b365096124480
-
SHA1
bcb7d52997d28b917a306e5b83d45c362cf37f2c
-
SHA256
db2ac1a9475a243d6de8147c8082a86e2a6237870c4c61e00f02d198ed070583
-
SHA512
ea2aa7e0ae95663baae9d0f91747f8511b91be6b0a6db104d715971d34cac848f08daaec0db0e650b4a266007253d694b1dbd3dbd34378afa22de2d86511b247
-
SSDEEP
49152:+qe3f6aSzD7+H98AHaCfu6FCHCL+WuTmuKwEI:vSinD7E9vBunHCK5NKXI
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
41c6927a623a6a5d3f8b365096124480_NeikiAnalytics.tmppid process 1928 41c6927a623a6a5d3f8b365096124480_NeikiAnalytics.tmp -
Loads dropped DLL 3 IoCs
Processes:
41c6927a623a6a5d3f8b365096124480_NeikiAnalytics.tmppid process 1928 41c6927a623a6a5d3f8b365096124480_NeikiAnalytics.tmp 1928 41c6927a623a6a5d3f8b365096124480_NeikiAnalytics.tmp 1928 41c6927a623a6a5d3f8b365096124480_NeikiAnalytics.tmp -
Script User-Agent 1 IoCs
Uses user-agent string associated with script host/environment.
Processes:
description flow ioc HTTP User-Agent header 26 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
41c6927a623a6a5d3f8b365096124480_NeikiAnalytics.tmppid process 1928 41c6927a623a6a5d3f8b365096124480_NeikiAnalytics.tmp -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
41c6927a623a6a5d3f8b365096124480_NeikiAnalytics.exedescription pid process target process PID 820 wrote to memory of 1928 820 41c6927a623a6a5d3f8b365096124480_NeikiAnalytics.exe 41c6927a623a6a5d3f8b365096124480_NeikiAnalytics.tmp PID 820 wrote to memory of 1928 820 41c6927a623a6a5d3f8b365096124480_NeikiAnalytics.exe 41c6927a623a6a5d3f8b365096124480_NeikiAnalytics.tmp PID 820 wrote to memory of 1928 820 41c6927a623a6a5d3f8b365096124480_NeikiAnalytics.exe 41c6927a623a6a5d3f8b365096124480_NeikiAnalytics.tmp
Processes
-
C:\Users\Admin\AppData\Local\Temp\41c6927a623a6a5d3f8b365096124480_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\41c6927a623a6a5d3f8b365096124480_NeikiAnalytics.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:820 -
C:\Users\Admin\AppData\Local\Temp\is-EJO3S.tmp\41c6927a623a6a5d3f8b365096124480_NeikiAnalytics.tmp"C:\Users\Admin\AppData\Local\Temp\is-EJO3S.tmp\41c6927a623a6a5d3f8b365096124480_NeikiAnalytics.tmp" /SL5="$A0046,1785071,899584,C:\Users\Admin\AppData\Local\Temp\41c6927a623a6a5d3f8b365096124480_NeikiAnalytics.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:1928
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.0MB
MD5eaf2c9683c1424abb77a6104b339fda5
SHA182fe536dc66036a759f620003f324bc726192da0
SHA256a2c20488f11814b0bb8eb471f364c58d8f16a34fb526b84ccb97d15b98450d9a
SHA51249d9482bb2f41aa87654d22f3ffc31abed183ac68545cef87125de932cf745f8c68a31d17e142c4a4f0f21e2bf1edab8cda59ba2b1b1827f8c84837352196bf1
-
Filesize
37KB
MD567965a5957a61867d661f05ae1f4773e
SHA1f14c0a4f154dc685bb7c65b2d804a02a0fb2360d
SHA256450b9b0ba25bf068afbc2b23d252585a19e282939bf38326384ea9112dfd0105
SHA512c6942818b9026dc5db2d62999d32cf99fe7289f79a28b8345af17acf9d13b2229a5e917a48ff1f6d59715bdbcb00c1625e0302abcfe10ca7e0475762e0a3f41b
-
Filesize
3KB
MD5d35d95fc6bd8be33d3ce5da2630b90bd
SHA1be2fb4098a151f6c77a85ce8c274a3054a61178b
SHA256dfa608be394c8f6d19aff352185917720f04072ac0412a8cab1174fec4939c08
SHA512078fa3cf9c08c8bdaa554a52b153a159f537de3ee0ba923d64928cdd99b4f2528b4eb229c1b2352b946ef417efd478b453588a6cda1afc91b374e709afc730e4
-
Filesize
2.0MB
MD5e1f18a22199c6f6aa5d87b24e5b39ef1
SHA10dcd8f90b575f6f1d10d6789fe769fa26daafd0e
SHA25662c56c8cf2ac6521ce047b73aa99b6d3952ca53f11d34b00e98d17674a2fc10d
SHA5125a10a2f096adce6e7db3a40bc3ea3fd44d602966e606706ee5a780703f211de7f77656c79c296390baee1e008dc3ce327eaaf5d78bbae20108670c5bc809a190