Analysis
-
max time kernel
142s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
23/05/2024, 22:10
Static task
static1
Behavioral task
behavioral1
Sample
959cee3f56bc0e49fa55acdd8cd69aa0_NeikiAnalytics.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
959cee3f56bc0e49fa55acdd8cd69aa0_NeikiAnalytics.exe
Resource
win10v2004-20240426-en
General
-
Target
959cee3f56bc0e49fa55acdd8cd69aa0_NeikiAnalytics.exe
-
Size
52KB
-
MD5
959cee3f56bc0e49fa55acdd8cd69aa0
-
SHA1
ca8f371f2d967752272dbe762eea5d44363d6227
-
SHA256
391156a041106b29233f4b0c0a6f975977e848b78967af8cac9f7f652cdb9402
-
SHA512
0bef903dbe4adf976943ae2e2fa9321883a1f1ace29fae7ef967598f25f6a00969cd2007dd299a5a2082a8fc9951e7c873f297cd46b691c07706fd578b842cfc
-
SSDEEP
768:0M7kP0swFY6cPf/t+Vin9rOHialu0+qiWiSM81rVZVUCkzWdt8JC:0M4P0soYB/Iwn96H/unXjErZjdt8JC
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1948 ofylywo.exe -
Loads dropped DLL 1 IoCs
pid Process 1796 959cee3f56bc0e49fa55acdd8cd69aa0_NeikiAnalytics.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 3 checkip.dyndns.org -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1796 wrote to memory of 1948 1796 959cee3f56bc0e49fa55acdd8cd69aa0_NeikiAnalytics.exe 28 PID 1796 wrote to memory of 1948 1796 959cee3f56bc0e49fa55acdd8cd69aa0_NeikiAnalytics.exe 28 PID 1796 wrote to memory of 1948 1796 959cee3f56bc0e49fa55acdd8cd69aa0_NeikiAnalytics.exe 28 PID 1796 wrote to memory of 1948 1796 959cee3f56bc0e49fa55acdd8cd69aa0_NeikiAnalytics.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\959cee3f56bc0e49fa55acdd8cd69aa0_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\959cee3f56bc0e49fa55acdd8cd69aa0_NeikiAnalytics.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1796 -
C:\Users\Admin\AppData\Local\Temp\ofylywo.exeC:\Users\Admin\AppData\Local\Temp\ofylywo.exe2⤵
- Executes dropped EXE
PID:1948
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
52KB
MD5ae5d1653af5a112d71bd688ce10c9bbd
SHA1c587f57666c9f841b76f5b51a0d25299fb7fa2d0
SHA256cd29161e7a760ece22dfe19ad60b4833ecba33a8eb3c557e0bd76ba008eb4de2
SHA51250ef1f57f4db8919a541041d7fe9b37eb3d49193fabfc217f7c2acd4eacc875789fca7f9cd0b737e707c028554245aab74c0d425fa16627aab80de1030077d5b