Analysis
-
max time kernel
118s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
22-05-2024 22:25
Static task
static1
Behavioral task
behavioral1
Sample
4ba3b170621efc2610c377d59afaa760_NeikiAnalytics.exe
Resource
win7-20240508-en
General
-
Target
4ba3b170621efc2610c377d59afaa760_NeikiAnalytics.exe
-
Size
282KB
-
MD5
4ba3b170621efc2610c377d59afaa760
-
SHA1
930acfab9086b964ac5a80a587d0ddfcecf94177
-
SHA256
e2f53a888380a25369efb53f2f286b6bb64a46012ce38dc24ba3699aeb6df169
-
SHA512
4ee082240f70079c41c0af78bbfc7c7a6cb0bdcb87514fb656e60c55a2f79cd0da2ff9dc43022416139c63f7ae948926602132628b88487dc80d42fcead4c4a9
-
SSDEEP
3072:crNw6+NQHMGq5+C4l4osSTZ60MwuBRv6tlu6tA8A/a9V0m6X0bw+lyiCR851pU7u:cr4Yc5+Nl3/Z4itljyIP0PNwyi3b
Malware Config
Extracted
gcleaner
185.172.128.90
5.42.64.56
5.42.65.64
Signatures
-
Deletes itself 1 IoCs
Processes:
cmd.exepid process 2900 cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Kills process with taskkill 1 IoCs
Processes:
taskkill.exepid process 2616 taskkill.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
taskkill.exedescription pid process Token: SeDebugPrivilege 2616 taskkill.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
4ba3b170621efc2610c377d59afaa760_NeikiAnalytics.execmd.exedescription pid process target process PID 1068 wrote to memory of 2900 1068 4ba3b170621efc2610c377d59afaa760_NeikiAnalytics.exe cmd.exe PID 1068 wrote to memory of 2900 1068 4ba3b170621efc2610c377d59afaa760_NeikiAnalytics.exe cmd.exe PID 1068 wrote to memory of 2900 1068 4ba3b170621efc2610c377d59afaa760_NeikiAnalytics.exe cmd.exe PID 1068 wrote to memory of 2900 1068 4ba3b170621efc2610c377d59afaa760_NeikiAnalytics.exe cmd.exe PID 2900 wrote to memory of 2616 2900 cmd.exe taskkill.exe PID 2900 wrote to memory of 2616 2900 cmd.exe taskkill.exe PID 2900 wrote to memory of 2616 2900 cmd.exe taskkill.exe PID 2900 wrote to memory of 2616 2900 cmd.exe taskkill.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\4ba3b170621efc2610c377d59afaa760_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\4ba3b170621efc2610c377d59afaa760_NeikiAnalytics.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1068 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im "4ba3b170621efc2610c377d59afaa760_NeikiAnalytics.exe" /f & erase "C:\Users\Admin\AppData\Local\Temp\4ba3b170621efc2610c377d59afaa760_NeikiAnalytics.exe" & exit2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:2900 -
C:\Windows\SysWOW64\taskkill.exetaskkill /im "4ba3b170621efc2610c377d59afaa760_NeikiAnalytics.exe" /f3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2616
-
-