Analysis

  • max time kernel
    118s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    23-05-2024 02:54

General

  • Target

    7c889a9c070eeba8d80a12563667fe30_NeikiAnalytics.exe

  • Size

    17KB

  • MD5

    7c889a9c070eeba8d80a12563667fe30

  • SHA1

    5c9c2bd6f3cdd2d54e85796ea45450c684ae4f55

  • SHA256

    41c099b6789ff7cfaa1ac37ede88d0bf61fcb87610dc4af6c2478f213509a437

  • SHA512

    44a210730d8673c9af42f136b4498f0ed36e4ec092adeccbfc604dfaf28051733e69955ecfffd7fe9d37545564af74bb79951a8c1a119543b48ff44026a15968

  • SSDEEP

    384:oHkBNZuRq7wCQ1AZaZ2UnnVTsSdDvRXaokwF4ztsg7MVqjxl:WmCq7wsZyBCSH0ySxl

Score
1/10

Malware Config

Signatures

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7c889a9c070eeba8d80a12563667fe30_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\7c889a9c070eeba8d80a12563667fe30_NeikiAnalytics.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2060
    • C:\Windows\system32\WerFault.exe
      C:\Windows\system32\WerFault.exe -u -p 2060 -s 500
      2⤵
        PID:1984

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/2060-0-0x000007FEF5E93000-0x000007FEF5E94000-memory.dmp

      Filesize

      4KB

    • memory/2060-1-0x0000000000210000-0x000000000021A000-memory.dmp

      Filesize

      40KB

    • memory/2060-2-0x000007FEF5E93000-0x000007FEF5E94000-memory.dmp

      Filesize

      4KB