Analysis
-
max time kernel
143s -
max time network
143s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
26/05/2024, 23:09
Static task
static1
Behavioral task
behavioral1
Sample
0ad4fa0f053bc4aa9d337137081f9fb0_NeikiAnalytics.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
0ad4fa0f053bc4aa9d337137081f9fb0_NeikiAnalytics.exe
Resource
win10v2004-20240426-en
General
-
Target
0ad4fa0f053bc4aa9d337137081f9fb0_NeikiAnalytics.exe
-
Size
65KB
-
MD5
0ad4fa0f053bc4aa9d337137081f9fb0
-
SHA1
1993e98b059b45b5534ae995b73dc14397730c7a
-
SHA256
b672884046c8e9e4ffa18aa00b9a65e36d7fa10490e5427bf91c1b8f807d1c6e
-
SHA512
5de2a481f611ef63c86691a859d24d96b73328be54948eabb5c9f3e432de44ada583513a767459b8d7fdd2eb557b6939badcc834ad7aba1bca1f1ac799e2e349
-
SSDEEP
768:c5JIvFKPZo2sFEasjcj29NWngAHxcw9ppEaxglaX5uAj4:cvIvEPZoZEad29NQgA2wQle5M
Malware Config
Signatures
-
Executes dropped EXE 7 IoCs
pid Process 2968 ewiuer2.exe 2476 ewiuer2.exe 2164 ewiuer2.exe 1444 ewiuer2.exe 2508 ewiuer2.exe 1100 ewiuer2.exe 1472 ewiuer2.exe -
Loads dropped DLL 14 IoCs
pid Process 2964 0ad4fa0f053bc4aa9d337137081f9fb0_NeikiAnalytics.exe 2964 0ad4fa0f053bc4aa9d337137081f9fb0_NeikiAnalytics.exe 2968 ewiuer2.exe 2968 ewiuer2.exe 2476 ewiuer2.exe 2476 ewiuer2.exe 2164 ewiuer2.exe 2164 ewiuer2.exe 1444 ewiuer2.exe 1444 ewiuer2.exe 2508 ewiuer2.exe 2508 ewiuer2.exe 1100 ewiuer2.exe 1100 ewiuer2.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\ewiuer2.exe ewiuer2.exe File opened for modification C:\Windows\SysWOW64\ewiuer2.exe ewiuer2.exe File opened for modification C:\Windows\SysWOW64\ewiuer2.exe ewiuer2.exe -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 2964 wrote to memory of 2968 2964 0ad4fa0f053bc4aa9d337137081f9fb0_NeikiAnalytics.exe 28 PID 2964 wrote to memory of 2968 2964 0ad4fa0f053bc4aa9d337137081f9fb0_NeikiAnalytics.exe 28 PID 2964 wrote to memory of 2968 2964 0ad4fa0f053bc4aa9d337137081f9fb0_NeikiAnalytics.exe 28 PID 2964 wrote to memory of 2968 2964 0ad4fa0f053bc4aa9d337137081f9fb0_NeikiAnalytics.exe 28 PID 2968 wrote to memory of 2476 2968 ewiuer2.exe 30 PID 2968 wrote to memory of 2476 2968 ewiuer2.exe 30 PID 2968 wrote to memory of 2476 2968 ewiuer2.exe 30 PID 2968 wrote to memory of 2476 2968 ewiuer2.exe 30 PID 2476 wrote to memory of 2164 2476 ewiuer2.exe 31 PID 2476 wrote to memory of 2164 2476 ewiuer2.exe 31 PID 2476 wrote to memory of 2164 2476 ewiuer2.exe 31 PID 2476 wrote to memory of 2164 2476 ewiuer2.exe 31 PID 2164 wrote to memory of 1444 2164 ewiuer2.exe 35 PID 2164 wrote to memory of 1444 2164 ewiuer2.exe 35 PID 2164 wrote to memory of 1444 2164 ewiuer2.exe 35 PID 2164 wrote to memory of 1444 2164 ewiuer2.exe 35 PID 1444 wrote to memory of 2508 1444 ewiuer2.exe 36 PID 1444 wrote to memory of 2508 1444 ewiuer2.exe 36 PID 1444 wrote to memory of 2508 1444 ewiuer2.exe 36 PID 1444 wrote to memory of 2508 1444 ewiuer2.exe 36 PID 2508 wrote to memory of 1100 2508 ewiuer2.exe 38 PID 2508 wrote to memory of 1100 2508 ewiuer2.exe 38 PID 2508 wrote to memory of 1100 2508 ewiuer2.exe 38 PID 2508 wrote to memory of 1100 2508 ewiuer2.exe 38 PID 1100 wrote to memory of 1472 1100 ewiuer2.exe 39 PID 1100 wrote to memory of 1472 1100 ewiuer2.exe 39 PID 1100 wrote to memory of 1472 1100 ewiuer2.exe 39 PID 1100 wrote to memory of 1472 1100 ewiuer2.exe 39
Processes
-
C:\Users\Admin\AppData\Local\Temp\0ad4fa0f053bc4aa9d337137081f9fb0_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\0ad4fa0f053bc4aa9d337137081f9fb0_NeikiAnalytics.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2964 -
C:\Users\Admin\AppData\Roaming\ewiuer2.exeC:\Users\Admin\AppData\Roaming\ewiuer2.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2968 -
C:\Windows\SysWOW64\ewiuer2.exeC:\Windows\System32\ewiuer2.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2476 -
C:\Users\Admin\AppData\Roaming\ewiuer2.exeC:\Users\Admin\AppData\Roaming\ewiuer2.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2164 -
C:\Windows\SysWOW64\ewiuer2.exeC:\Windows\System32\ewiuer2.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1444 -
C:\Users\Admin\AppData\Roaming\ewiuer2.exeC:\Users\Admin\AppData\Roaming\ewiuer2.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2508 -
C:\Windows\SysWOW64\ewiuer2.exeC:\Windows\System32\ewiuer2.exe7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1100 -
C:\Users\Admin\AppData\Roaming\ewiuer2.exeC:\Users\Admin\AppData\Roaming\ewiuer2.exe8⤵
- Executes dropped EXE
PID:1472
-
-
-
-
-
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
230B
MD5269644a73b351e18d66762a744378170
SHA1e02f0feecc9bde8e1a0c7e02c341eddf96d24113
SHA25665b0b1c809a12f5e9f90a3e2c49550a5be371cc0fecb2bca933a2a876a3e22b9
SHA5129f7b9e6920a3f4ac7fac5fc73fbee198b599e5b4e6d41d0d9c834043dedadcd8eb6dcfefe8d709b24e2a32563c9d5ae306bff2fe44df16cfe821321ac6f6bba6
-
Filesize
229B
MD52e3eea2f0058cf08e0689aae6388db4f
SHA108a9e81b7cc4e00fd482387bb1fd06df1878ed5c
SHA2567f45f704f78b08a0f17895abec56ba9d3f11f8a1a9d1ddb10ba668324d274cc7
SHA51231aa286803855d9460eb04a7013364e76855c2aed70cae12ca085a12ba6dc035988f43c6f47cc3621a1bef79659a9a72a32a771a98ca463aff7365834d7b6a09
-
Filesize
65KB
MD5f7fa68fd8bd58289a1cf9a03bc3b3e58
SHA199c6ef1ca8dfae00e9329ffce46079aae7be58db
SHA25647ea5144edd93d89276fd2453ed0abac3561aeb7a45411b059a5522f92247668
SHA5126f303a158650e4e06f393fa4d20aec0d97fa6874b16a038e301285fb7470c22f03bfb017ccd7f35dbaba0a84c8c468938127e7fff3be54e58f6f23b03c95aded
-
Filesize
65KB
MD527b71158be08f178622dc0d28b0534b3
SHA1d04673a8e54fcc5055670cb0bc851969ccbb6786
SHA2565ca44966497b621acbe86449bc598ec38fee33cd2cab0803abdc6ba0f7e87d11
SHA5120c3c24a81de46ba181aa181dc4cf018209b86939cfd0a8eb6e34019de49c3f0af470fbde6095039e05a78d2625b3831f3f2a2883a884d902f041838358f2033c
-
Filesize
65KB
MD5a7ca03364ea1f53ccd35a03339877bf7
SHA1a803af618fbac582429945edb71edac32d48ce7a
SHA256d673e3d97a7ec83bf5b81fbce17b1bf672212f5ff047384a07cb4d1226dd8d3d
SHA512d77e4e30ace4deb2ef89ee2ae14dcf71d422fc1cc8f327b4b635d340c7f3c3faec81b3cf68c27464dc2e1f0adb3d9147a265c5a6d4ac8fda52759901ed89a514
-
Filesize
65KB
MD5e7d43f6d73bc6e1ed46a5a0db17c1328
SHA1dc1555c44f1b7e5212d60a3438bf9ef57bf3f389
SHA256bf43069c998e7b7ffa356b415e3e8c304248b28fd770e050cb7b364f14d1d3b9
SHA512df4a5a3ecaa0ac6fde361fdfdfd76c73aff46741169e4b5a477df747a287530f010b4a34189c36677fb1494c5b9cf3ef3b7541198d87c10c29b7d1e834676ea7
-
Filesize
65KB
MD509f5ec2286e48cda848410518c5f1dc3
SHA1744dcb266616d1a1383bcd7e48c322a543bb2d0d
SHA2565b68a623ae26196c3bd1ffe6f0c3c5da01f9f592f074aebcedf8e01a4ffd0bbe
SHA512b866f62793409fe459a60adb5a4d7f813701028813723be9dc60ef9c90caf40cf568f00735a0c10113a0dbd1feada3684f4ea7a5403375128c246f6d230bd2fa
-
Filesize
65KB
MD55b773305d4b24271ec400857ab7e217b
SHA15b74cf991d05353b2c241fc59935b800ecc1fe5d
SHA2568a96100ac235ce1a80a1860c02c7cff046ed12d682142830cc69987981bcacfd
SHA512cc882009d3484c40f1a2cbb02fb6a0680fb647e7b15717de721119acd08a9cce209a6489b6fdcbc3bd27358aba890c30d859affec36b0cb86edb1976b3903ed9
-
Filesize
65KB
MD57784c3b1570f6ae27872021b32263d4f
SHA16d644fb32505a8a4a9c22abf4a93291e155830eb
SHA256a646e58fa101d7259a3203c2bd0ee6fc47de22780820c68efb87b5dcf60560c8
SHA512031462c7ff0e16e2d5d217a532907038fe8fbf6961a8dd11cd6317be34e102354326af8a789fc6cd0e9408e5598d7478d675f928370a98e6bc490f246300cfb1