Analysis

  • max time kernel
    118s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    26/05/2024, 01:32

General

  • Target

    49a7522eb56b81e0cc317e836a0a22c0_NeikiAnalytics.exe

  • Size

    92KB

  • MD5

    49a7522eb56b81e0cc317e836a0a22c0

  • SHA1

    cb5d4f5b07f4dc5120d62a47bb6f7ba97c52e345

  • SHA256

    4145d10c613d1d271648e08adf2edbea1a4e942a32ec8394e87da34f788f19d5

  • SHA512

    c5b8d2823ef379e9db21657828c0aa52ba0ca62ca1586d50f7e51654c6d7d34245a59f0ac1551d5367f776db1b64bcbae473aca97062a839ae2ae67ce74b4223

  • SSDEEP

    1536:BVsZJ1QfW9wIsD7iPjsIVK/C038WVP8O2mwpHTPBjrKhafQQSITRO+PV1z3a:BVsX10W9wRWjH+lwpzPqITRz7ra

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\49a7522eb56b81e0cc317e836a0a22c0_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\49a7522eb56b81e0cc317e836a0a22c0_NeikiAnalytics.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: RenamesItself
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:1972
    • C:\Users\Admin\AppData\Local\Temp\49a7522eb56b81e0cc317e836a0a22c0_NeikiAnalytics.exe
      C:\Users\Admin\AppData\Local\Temp\49a7522eb56b81e0cc317e836a0a22c0_NeikiAnalytics.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Suspicious use of UnmapMainImage
      PID:2480

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\49a7522eb56b81e0cc317e836a0a22c0_NeikiAnalytics.exe

    Filesize

    92KB

    MD5

    27dfa53830529eed15335795ed6695b8

    SHA1

    bcdcb6d8b18260de4014243f5ca955b0cf0007bc

    SHA256

    2ffcd2de574d4fc4f5a9783f59bd0898895c226cd07dc91c7c9b6d3e4a418c33

    SHA512

    19db06aba6002366d369bbacc583adf61c73a9ffe58816214d6f9fe72ed5d2a2ff21bf0827fe8c2b06b82279905cc25fc0631475988a847d3247c5803f2015a8

  • memory/1972-0-0x0000000000400000-0x0000000000431000-memory.dmp

    Filesize

    196KB

  • memory/1972-1-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/1972-16-0x00000000001A0000-0x00000000001D1000-memory.dmp

    Filesize

    196KB

  • memory/1972-11-0x0000000000140000-0x0000000000171000-memory.dmp

    Filesize

    196KB

  • memory/1972-15-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/2480-18-0x0000000000140000-0x0000000000171000-memory.dmp

    Filesize

    196KB

  • memory/2480-29-0x00000000001B0000-0x00000000001CB000-memory.dmp

    Filesize

    108KB

  • memory/2480-24-0x0000000000400000-0x000000000040E000-memory.dmp

    Filesize

    56KB