Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
22-05-2024 23:22
Static task
static1
Behavioral task
behavioral1
Sample
56838e6c314c6ece6f865be6c2ea5200_NeikiAnalytics.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
56838e6c314c6ece6f865be6c2ea5200_NeikiAnalytics.exe
Resource
win10v2004-20240426-en
General
-
Target
56838e6c314c6ece6f865be6c2ea5200_NeikiAnalytics.exe
-
Size
6.0MB
-
MD5
56838e6c314c6ece6f865be6c2ea5200
-
SHA1
504d1336e14ab40c3bdcefa40247c00458cd1d85
-
SHA256
74ae877dc5d5b871d3df2a1be6a297872afb261bd36f5c9938c9d73c1a104c30
-
SHA512
fd6b1e6b22c3d3851c58ae3a04f34e02585e4b8a285217c75643a2c9cc1e41c11fe587d53cd1d84c5d05d02a3c0743481a7271a216a84458fd90173338688ccb
-
SSDEEP
98304:emhd1UryeGyAV7KkWcP7qxuV7wQqZUha5jtSyZIUS:elQ5Hvexu2QbaZtlir
Malware Config
Signatures
-
Deletes itself 1 IoCs
Processes:
1D22.tmppid process 2804 1D22.tmp -
Executes dropped EXE 1 IoCs
Processes:
1D22.tmppid process 2804 1D22.tmp -
Loads dropped DLL 2 IoCs
Processes:
56838e6c314c6ece6f865be6c2ea5200_NeikiAnalytics.exepid process 1728 56838e6c314c6ece6f865be6c2ea5200_NeikiAnalytics.exe 1728 56838e6c314c6ece6f865be6c2ea5200_NeikiAnalytics.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
56838e6c314c6ece6f865be6c2ea5200_NeikiAnalytics.exedescription pid process target process PID 1728 wrote to memory of 2804 1728 56838e6c314c6ece6f865be6c2ea5200_NeikiAnalytics.exe 1D22.tmp PID 1728 wrote to memory of 2804 1728 56838e6c314c6ece6f865be6c2ea5200_NeikiAnalytics.exe 1D22.tmp PID 1728 wrote to memory of 2804 1728 56838e6c314c6ece6f865be6c2ea5200_NeikiAnalytics.exe 1D22.tmp PID 1728 wrote to memory of 2804 1728 56838e6c314c6ece6f865be6c2ea5200_NeikiAnalytics.exe 1D22.tmp
Processes
-
C:\Users\Admin\AppData\Local\Temp\56838e6c314c6ece6f865be6c2ea5200_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\56838e6c314c6ece6f865be6c2ea5200_NeikiAnalytics.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1728 -
C:\Users\Admin\AppData\Local\Temp\1D22.tmp"C:\Users\Admin\AppData\Local\Temp\1D22.tmp" --splashC:\Users\Admin\AppData\Local\Temp\56838e6c314c6ece6f865be6c2ea5200_NeikiAnalytics.exe 787C82DAEEBEC702088890E56ACA8C2BBA92E1DD6C17BB9240F02E92EEFF95B0C351CB4BB4FEBCE38EEAEFB0DF67E06025CB10AC48EC4645F0D2461527BFD2E82⤵
- Deletes itself
- Executes dropped EXE
PID:2804
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6.0MB
MD5004c87358f8bd9c529f938085904dfe7
SHA163392c1317d5faabd8b815df41236012c06a6f5f
SHA256bdca088839e1c0e7e694b6af96bc9cdcb67daaaac7a82091010fc85f8caa2db1
SHA5123f7b47417aefe6023128cd77d550383553aa25450a66895f5e766b94c0e7ba33f0a7473b74417c921d08167e75eb29913a794b1c59274cf1070933565dce14c0