Analysis

  • max time kernel
    120s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240220-en
  • resource tags

    arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system
  • submitted
    25-05-2024 07:36

General

  • Target

    cca0018fb98d58d9442f116027785c50_NeikiAnalytics.exe

  • Size

    197KB

  • MD5

    cca0018fb98d58d9442f116027785c50

  • SHA1

    8302becd8deb3ef4a155401789d82520cc0d62d3

  • SHA256

    3fe244585b281dce88c9f11ff8ceede9d4b2aadd46ffc5b2dad3e34291a55ae1

  • SHA512

    aae931cf91164505df57e80561d0a7e1b87f8287a018afa11ab2467f2b430506dd4cc01d9f90f5d6c526fb495e3319cae57d2900b900bc5a3b40863db2ae5b31

  • SSDEEP

    6144:MWRmaMplFINh1+Mpd1H1/qEhBoa+WZ3o8Uc21MY729W45oGRNUpCyGH6Y6l:MW7JLUc2x8WuJNeCyfv

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of UnmapMainImage 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\cca0018fb98d58d9442f116027785c50_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\cca0018fb98d58d9442f116027785c50_NeikiAnalytics.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: RenamesItself
    • Suspicious use of WriteProcessMemory
    PID:2204
    • C:\Users\Admin\AppData\Local\Temp\cca0018fb98d58d9442f116027785c50_NeikiAnalytics.exe
      C:\Users\Admin\AppData\Local\Temp\cca0018fb98d58d9442f116027785c50_NeikiAnalytics.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of UnmapMainImage
      PID:2872

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\cca0018fb98d58d9442f116027785c50_NeikiAnalytics.exe

    Filesize

    197KB

    MD5

    f4a1015612fb24d683cc0b67b9fa115c

    SHA1

    c1767d26a1da2ce132981bb47b6cdf32f93b1fb1

    SHA256

    07a946689af422044b5220b4745f676ee3fa46dd548f7a95a700f35d5e71061c

    SHA512

    f1f5b23c6db0973bc73cc013a32cfcd1b4131bbabe66061765ccbe8738c7693b871657a68b1ed1c42bfb5ab53a5a9bb9e08de06032e2a33f71c76e32abce485e

  • memory/2204-0-0x0000000000400000-0x000000000043F000-memory.dmp

    Filesize

    252KB

  • memory/2204-6-0x00000000001D0000-0x000000000020F000-memory.dmp

    Filesize

    252KB

  • memory/2204-10-0x0000000000400000-0x000000000043F000-memory.dmp

    Filesize

    252KB

  • memory/2872-11-0x0000000000400000-0x000000000043F000-memory.dmp

    Filesize

    252KB

  • memory/2872-12-0x0000000000400000-0x0000000000415000-memory.dmp

    Filesize

    84KB

  • memory/2872-17-0x0000000000130000-0x000000000016F000-memory.dmp

    Filesize

    252KB

  • memory/2872-18-0x0000000000400000-0x000000000043F000-memory.dmp

    Filesize

    252KB