Analysis
-
max time kernel
154s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
22-05-2024 22:47
Static task
static1
Behavioral task
behavioral1
Sample
500b1012b2129355463285ac7e7840c0_NeikiAnalytics.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
500b1012b2129355463285ac7e7840c0_NeikiAnalytics.exe
Resource
win10v2004-20240226-en
General
-
Target
500b1012b2129355463285ac7e7840c0_NeikiAnalytics.exe
-
Size
320KB
-
MD5
500b1012b2129355463285ac7e7840c0
-
SHA1
19ec2af87c7e71f73f23cfb3374512dc3587c479
-
SHA256
78378453292369749970abfcc0d53213c2fe943314f769fed4ef0e9314ef11d1
-
SHA512
db513a6deb6c747cd4d53c33faa3c2ea4dce37b9b88baae5b87b9f36fc6427ed0747e5c06cff9f73b7f5b094a9079d17769e11ad8e6436a0ce61baec823b70ea
-
SSDEEP
6144:fqjkWx4UFyaE8UVbdaYKQU4Sv7sKG7NIDEqZK0W7cyqCxSngmMBqfycuPbUl0i5w:wH4UEaE8UpdaYvU4E7wwEqZQ0npM4dlY
Malware Config
Signatures
-
Deletes itself 1 IoCs
Processes:
500b1012b2129355463285ac7e7840c0_NeikiAnalytics.exepid process 4328 500b1012b2129355463285ac7e7840c0_NeikiAnalytics.exe -
Executes dropped EXE 1 IoCs
Processes:
500b1012b2129355463285ac7e7840c0_NeikiAnalytics.exepid process 4328 500b1012b2129355463285ac7e7840c0_NeikiAnalytics.exe -
Program crash 4 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 4868 4328 WerFault.exe 500b1012b2129355463285ac7e7840c0_NeikiAnalytics.exe 220 4328 WerFault.exe 500b1012b2129355463285ac7e7840c0_NeikiAnalytics.exe 1748 4328 WerFault.exe 500b1012b2129355463285ac7e7840c0_NeikiAnalytics.exe 3692 4328 WerFault.exe 500b1012b2129355463285ac7e7840c0_NeikiAnalytics.exe -
Suspicious behavior: RenamesItself 1 IoCs
Processes:
500b1012b2129355463285ac7e7840c0_NeikiAnalytics.exepid process 4888 500b1012b2129355463285ac7e7840c0_NeikiAnalytics.exe -
Suspicious use of UnmapMainImage 1 IoCs
Processes:
500b1012b2129355463285ac7e7840c0_NeikiAnalytics.exepid process 4328 500b1012b2129355463285ac7e7840c0_NeikiAnalytics.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
500b1012b2129355463285ac7e7840c0_NeikiAnalytics.exedescription pid process target process PID 4888 wrote to memory of 4328 4888 500b1012b2129355463285ac7e7840c0_NeikiAnalytics.exe 500b1012b2129355463285ac7e7840c0_NeikiAnalytics.exe PID 4888 wrote to memory of 4328 4888 500b1012b2129355463285ac7e7840c0_NeikiAnalytics.exe 500b1012b2129355463285ac7e7840c0_NeikiAnalytics.exe PID 4888 wrote to memory of 4328 4888 500b1012b2129355463285ac7e7840c0_NeikiAnalytics.exe 500b1012b2129355463285ac7e7840c0_NeikiAnalytics.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\500b1012b2129355463285ac7e7840c0_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\500b1012b2129355463285ac7e7840c0_NeikiAnalytics.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\500b1012b2129355463285ac7e7840c0_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\500b1012b2129355463285ac7e7840c0_NeikiAnalytics.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4328 -s 3683⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4328 -s 7683⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4328 -s 7883⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4328 -s 8083⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 4888 -ip 48881⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 4328 -ip 43281⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4060 --field-trial-handle=3240,i,13319578961094268484,16557498665191861597,262144 --variations-seed-version /prefetch:81⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 384 -p 4328 -ip 43281⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 384 -p 4328 -ip 43281⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 4328 -ip 43281⤵
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\500b1012b2129355463285ac7e7840c0_NeikiAnalytics.exeFilesize
320KB
MD58113afbfa1d90fbb5d1ae76c5830f8b0
SHA1513d510cb9a1b9cd9d8985db2d98f282fd39496b
SHA256f2139dccf57317aa66ce729741d540b7fafe5f1e57ca059ae7d997133ef47f26
SHA51240fb137b841b6165592de31c304c2de42efa6ac6ce8436d8d5880de221e9883460ceaac097f7f67027aeb26946c3ae15a4238e6657b4f0250905f617a07a8fcb
-
memory/4328-10-0x0000000000400000-0x0000000000438000-memory.dmpFilesize
224KB
-
memory/4328-11-0x0000000000400000-0x0000000000438000-memory.dmpFilesize
224KB
-
memory/4328-14-0x00000000014A0000-0x00000000014D8000-memory.dmpFilesize
224KB
-
memory/4328-15-0x0000000000400000-0x0000000000415000-memory.dmpFilesize
84KB
-
memory/4888-0-0x0000000000400000-0x0000000000438000-memory.dmpFilesize
224KB
-
memory/4888-1-0x0000000000400000-0x0000000000438000-memory.dmpFilesize
224KB
-
memory/4888-2-0x0000000000400000-0x0000000000438000-memory.dmpFilesize
224KB
-
memory/4888-6-0x0000000000400000-0x0000000000438000-memory.dmpFilesize
224KB