Analysis
-
max time kernel
131s -
max time network
101s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
23-05-2024 00:02
Static task
static1
Behavioral task
behavioral1
Sample
5ddbe3e4e4fcc8163a8147daba347190_NeikiAnalytics.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
5ddbe3e4e4fcc8163a8147daba347190_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
5ddbe3e4e4fcc8163a8147daba347190_NeikiAnalytics.exe
-
Size
192KB
-
MD5
5ddbe3e4e4fcc8163a8147daba347190
-
SHA1
3d4f5abbbbfb5504c77583a53ccc330c87614701
-
SHA256
7edd94b53216fd0d45d02404437bd7b004f85378d1a8669ce03e5828a483aca2
-
SHA512
2b5c892b77de8e4e95e503ed4e6cafd50912e6e8b26d61bb5e373b16886aacda538a1867eaa3e9edf4f956e46a617fab9202e14df6504d9431555d9a7ca91196
-
SSDEEP
3072:D3jY5KTnhnQDlZ2iPTzf+pmGVjymkJ6xqv1/Zi0Jj9mQVONt7Vuh67:D3k5KThnQXx7r+pmGdNM6xqv/i8L4N2S
Malware Config
Signatures
-
Deletes itself 1 IoCs
Processes:
5ddbe3e4e4fcc8163a8147daba347190_NeikiAnalytics.exepid process 3604 5ddbe3e4e4fcc8163a8147daba347190_NeikiAnalytics.exe -
Executes dropped EXE 1 IoCs
Processes:
5ddbe3e4e4fcc8163a8147daba347190_NeikiAnalytics.exepid process 3604 5ddbe3e4e4fcc8163a8147daba347190_NeikiAnalytics.exe -
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 2484 4700 WerFault.exe 5ddbe3e4e4fcc8163a8147daba347190_NeikiAnalytics.exe 3128 3604 WerFault.exe 5ddbe3e4e4fcc8163a8147daba347190_NeikiAnalytics.exe -
Suspicious behavior: RenamesItself 1 IoCs
Processes:
5ddbe3e4e4fcc8163a8147daba347190_NeikiAnalytics.exepid process 4700 5ddbe3e4e4fcc8163a8147daba347190_NeikiAnalytics.exe -
Suspicious use of UnmapMainImage 1 IoCs
Processes:
5ddbe3e4e4fcc8163a8147daba347190_NeikiAnalytics.exepid process 3604 5ddbe3e4e4fcc8163a8147daba347190_NeikiAnalytics.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
5ddbe3e4e4fcc8163a8147daba347190_NeikiAnalytics.exedescription pid process target process PID 4700 wrote to memory of 3604 4700 5ddbe3e4e4fcc8163a8147daba347190_NeikiAnalytics.exe 5ddbe3e4e4fcc8163a8147daba347190_NeikiAnalytics.exe PID 4700 wrote to memory of 3604 4700 5ddbe3e4e4fcc8163a8147daba347190_NeikiAnalytics.exe 5ddbe3e4e4fcc8163a8147daba347190_NeikiAnalytics.exe PID 4700 wrote to memory of 3604 4700 5ddbe3e4e4fcc8163a8147daba347190_NeikiAnalytics.exe 5ddbe3e4e4fcc8163a8147daba347190_NeikiAnalytics.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\5ddbe3e4e4fcc8163a8147daba347190_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\5ddbe3e4e4fcc8163a8147daba347190_NeikiAnalytics.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:4700 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4700 -s 3962⤵
- Program crash
PID:2484 -
C:\Users\Admin\AppData\Local\Temp\5ddbe3e4e4fcc8163a8147daba347190_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\5ddbe3e4e4fcc8163a8147daba347190_NeikiAnalytics.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:3604 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3604 -s 3643⤵
- Program crash
PID:3128
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 4700 -ip 47001⤵PID:1684
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 484 -p 3604 -ip 36041⤵PID:1328
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
192KB
MD594183aded086d8e60efd724174a6a1f7
SHA19ff06a5649370694f0714a6b1f9448fefa579b1a
SHA256325ea8b3051e9b217734c3ed114ffafad8d11d65cf1b58aa8bab786a441c2a4f
SHA5126062cb3e1c9d0e8960092540a8bc4f55f7854ecaad8c19395658f4f929cf673e8e640013120c33cea33341766f7ffa82e8e297d172e081c8e46df5f12c2498b1