Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
24/05/2024, 23:28
Static task
static1
Behavioral task
behavioral1
Sample
cd87dbe0dd16370880c9cda86aebd0d0_NeikiAnalytics.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
cd87dbe0dd16370880c9cda86aebd0d0_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
cd87dbe0dd16370880c9cda86aebd0d0_NeikiAnalytics.exe
-
Size
79KB
-
MD5
cd87dbe0dd16370880c9cda86aebd0d0
-
SHA1
a3f336fe7cac89df62cde708997c45935a430cae
-
SHA256
a2edf2dc530aba1b0cfca7e4a3eef1f3dd95b89c57e7d6db1b19a566e3360b2b
-
SHA512
43ec2cbdcbe508681c2fabe7e18497f9e9ff36621f3e932683cfea6b8f5fe7dd4667800eb91be64643460a064214304d735b8c84d7ccb61c637105f547bcb0fa
-
SSDEEP
1536:zvt0DJR6NMuOQA8AkqUhMb2nuy5wgIP0CSJ+5yxB8GMGlZ5G:zvt0k0GdqU7uy5w9WMyxN5G
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2860 [email protected] -
Loads dropped DLL 2 IoCs
pid Process 1928 cmd.exe 1928 cmd.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1732 wrote to memory of 1928 1732 cd87dbe0dd16370880c9cda86aebd0d0_NeikiAnalytics.exe 29 PID 1732 wrote to memory of 1928 1732 cd87dbe0dd16370880c9cda86aebd0d0_NeikiAnalytics.exe 29 PID 1732 wrote to memory of 1928 1732 cd87dbe0dd16370880c9cda86aebd0d0_NeikiAnalytics.exe 29 PID 1732 wrote to memory of 1928 1732 cd87dbe0dd16370880c9cda86aebd0d0_NeikiAnalytics.exe 29 PID 1928 wrote to memory of 2860 1928 cmd.exe 30 PID 1928 wrote to memory of 2860 1928 cmd.exe 30 PID 1928 wrote to memory of 2860 1928 cmd.exe 30 PID 1928 wrote to memory of 2860 1928 cmd.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\cd87dbe0dd16370880c9cda86aebd0d0_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\cd87dbe0dd16370880c9cda86aebd0d0_NeikiAnalytics.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1732 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c [email protected]2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1928 -
C:\Users\Admin\AppData\Local\Temp\[email protected]PID:2860
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\[email protected]
Filesize79KB
MD5a2bfc73cb5a25c0dd628794be7a0b5db
SHA18ee81c5b0dd2bded4c6dac9bb286c3ec03a5a8ae
SHA256fd7da877d5d7bb4b2901a3584232f6a16c101daa575e1d8d2fa9f96c8eee29b8
SHA5126052e1c139e3aac57dc9c1a27e491876200b62e446a8622a3153e91ce0cb4e0b68f75733fe87e8ed51f45570f00c137f572d5430c8bd0c09cb549344ebb07854