Analysis
-
max time kernel
142s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
23/05/2024, 11:28
Static task
static1
Behavioral task
behavioral1
Sample
54937998eea25c8fcb0aedfac2604b00_NeikiAnalytics.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
54937998eea25c8fcb0aedfac2604b00_NeikiAnalytics.exe
Resource
win10v2004-20240226-en
General
-
Target
54937998eea25c8fcb0aedfac2604b00_NeikiAnalytics.exe
-
Size
73KB
-
MD5
54937998eea25c8fcb0aedfac2604b00
-
SHA1
cadff22a940caf2d9d97debb06c78e961b010405
-
SHA256
fdfabd0dff64f3db777909cdf881fe2ee673cf06bb8954c80376faad09a99636
-
SHA512
b103119b53921850a237d5348f5b2acc590d1bae12c7330ab068985d8a7ca018146e80ca7e8b25470f8c493f1cc1882602e76575fa28b45d065db91f71bae036
-
SSDEEP
1536:hbcXhCvalcXK5QPqfhVWbdsmA+RjPFLC+e5hPT0ZGUGf2g:hnNPqfcxA+HFshPTOg
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2644 [email protected] -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1804 wrote to memory of 3588 1804 54937998eea25c8fcb0aedfac2604b00_NeikiAnalytics.exe 91 PID 1804 wrote to memory of 3588 1804 54937998eea25c8fcb0aedfac2604b00_NeikiAnalytics.exe 91 PID 1804 wrote to memory of 3588 1804 54937998eea25c8fcb0aedfac2604b00_NeikiAnalytics.exe 91 PID 3588 wrote to memory of 2644 3588 cmd.exe 92 PID 3588 wrote to memory of 2644 3588 cmd.exe 92 PID 3588 wrote to memory of 2644 3588 cmd.exe 92 PID 2644 wrote to memory of 440 2644 [email protected] 93 PID 2644 wrote to memory of 440 2644 [email protected] 93 PID 2644 wrote to memory of 440 2644 [email protected] 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\54937998eea25c8fcb0aedfac2604b00_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\54937998eea25c8fcb0aedfac2604b00_NeikiAnalytics.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1804 -
C:\Windows\SysWOW64\cmd.exePID:3588
-
C:\Users\Admin\AppData\Local\Temp\[email protected]PID:2644
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c 00.exe4⤵PID:440
-
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4104 --field-trial-handle=2280,i,11703952675008463361,17436195144517971517,262144 --variations-seed-version /prefetch:81⤵PID:2344
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\[email protected]
Filesize73KB
MD58850ed3a23a0b4014c04da4d49c83490
SHA1438fcb31cfe9430b2add95580193bbe1965b11a2
SHA256f683dee81b366e4782566808b3b7a26f8211260a9234b262b4493f676c23bec1
SHA5123de4d0247107a8265304a75181a85a6f4a9d20fbb15358343f39017f767800190fdf7a3bc9c968a44ca9e2ffff700fe666615555b061722ab616e6e97d3b81fe
-
Filesize
2KB
MD57b621943a35e7f39cf89f50cc48d7b94
SHA12858a28cf60f38025fffcd0ba2ecfec8511c197d
SHA256bef04c2f89dc115ce2763558933dba1767bf30cda6856d335ae68955923f9991
SHA5124169e664ad4e7e6891a05ceed78465e0ec44879b37fc0de97c014945e10c161f6bfb040efc24edc136e69bb115b2a1327b04cefb58141f712da856129872e8f1