Analysis
-
max time kernel
118s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
26/05/2024, 01:32
Static task
static1
Behavioral task
behavioral1
Sample
49a7522eb56b81e0cc317e836a0a22c0_NeikiAnalytics.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
49a7522eb56b81e0cc317e836a0a22c0_NeikiAnalytics.exe
Resource
win10v2004-20240426-en
General
-
Target
49a7522eb56b81e0cc317e836a0a22c0_NeikiAnalytics.exe
-
Size
92KB
-
MD5
49a7522eb56b81e0cc317e836a0a22c0
-
SHA1
cb5d4f5b07f4dc5120d62a47bb6f7ba97c52e345
-
SHA256
4145d10c613d1d271648e08adf2edbea1a4e942a32ec8394e87da34f788f19d5
-
SHA512
c5b8d2823ef379e9db21657828c0aa52ba0ca62ca1586d50f7e51654c6d7d34245a59f0ac1551d5367f776db1b64bcbae473aca97062a839ae2ae67ce74b4223
-
SSDEEP
1536:BVsZJ1QfW9wIsD7iPjsIVK/C038WVP8O2mwpHTPBjrKhafQQSITRO+PV1z3a:BVsX10W9wRWjH+lwpzPqITRz7ra
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2480 49a7522eb56b81e0cc317e836a0a22c0_NeikiAnalytics.exe -
Executes dropped EXE 1 IoCs
pid Process 2480 49a7522eb56b81e0cc317e836a0a22c0_NeikiAnalytics.exe -
Loads dropped DLL 1 IoCs
pid Process 1972 49a7522eb56b81e0cc317e836a0a22c0_NeikiAnalytics.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1972 49a7522eb56b81e0cc317e836a0a22c0_NeikiAnalytics.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1972 49a7522eb56b81e0cc317e836a0a22c0_NeikiAnalytics.exe 2480 49a7522eb56b81e0cc317e836a0a22c0_NeikiAnalytics.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1972 wrote to memory of 2480 1972 49a7522eb56b81e0cc317e836a0a22c0_NeikiAnalytics.exe 29 PID 1972 wrote to memory of 2480 1972 49a7522eb56b81e0cc317e836a0a22c0_NeikiAnalytics.exe 29 PID 1972 wrote to memory of 2480 1972 49a7522eb56b81e0cc317e836a0a22c0_NeikiAnalytics.exe 29 PID 1972 wrote to memory of 2480 1972 49a7522eb56b81e0cc317e836a0a22c0_NeikiAnalytics.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\49a7522eb56b81e0cc317e836a0a22c0_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\49a7522eb56b81e0cc317e836a0a22c0_NeikiAnalytics.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1972 -
C:\Users\Admin\AppData\Local\Temp\49a7522eb56b81e0cc317e836a0a22c0_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\49a7522eb56b81e0cc317e836a0a22c0_NeikiAnalytics.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2480
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
92KB
MD527dfa53830529eed15335795ed6695b8
SHA1bcdcb6d8b18260de4014243f5ca955b0cf0007bc
SHA2562ffcd2de574d4fc4f5a9783f59bd0898895c226cd07dc91c7c9b6d3e4a418c33
SHA51219db06aba6002366d369bbacc583adf61c73a9ffe58816214d6f9fe72ed5d2a2ff21bf0827fe8c2b06b82279905cc25fc0631475988a847d3247c5803f2015a8