Analysis
-
max time kernel
119s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
22-05-2024 20:48
Static task
static1
Behavioral task
behavioral1
Sample
382f1422d0d62efc64ce591da58bc6f0_NeikiAnalytics.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
382f1422d0d62efc64ce591da58bc6f0_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
382f1422d0d62efc64ce591da58bc6f0_NeikiAnalytics.exe
-
Size
663KB
-
MD5
382f1422d0d62efc64ce591da58bc6f0
-
SHA1
d348f4f5a6be2f23cc7f459b7152d8a78b71a920
-
SHA256
7e5f30c36d7959de20bd0eac9f2673df7f6ea47981eeb5bca35fa85f9326c11e
-
SHA512
72c1d197c2b2c844603af68ee0f0569acc0535e698021a1988514696a612b78639eedc7e6e6a1792630da491b2f02c3b0862b434d622503f758e67619b73a489
-
SSDEEP
12288:92Ae691B+wYllPxUnAMSeJkIFbZa1QrXBjRHR8vGLGB42DxAi05nSgdo:UE91BDqlPanAMSeJBa1QjtZRLb2DR05s
Malware Config
Signatures
-
Drops file in System32 directory 1 IoCs
Processes:
382f1422d0d62efc64ce591da58bc6f0_NeikiAnalytics.exedescription ioc process File opened for modification C:\Windows\System32\alg.exe 382f1422d0d62efc64ce591da58bc6f0_NeikiAnalytics.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
382f1422d0d62efc64ce591da58bc6f0_NeikiAnalytics.exedescription pid process Token: SeTakeOwnershipPrivilege 2412 382f1422d0d62efc64ce591da58bc6f0_NeikiAnalytics.exe