Analysis
-
max time kernel
149s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
26/05/2024, 01:32
Static task
static1
Behavioral task
behavioral1
Sample
49a7522eb56b81e0cc317e836a0a22c0_NeikiAnalytics.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
49a7522eb56b81e0cc317e836a0a22c0_NeikiAnalytics.exe
Resource
win10v2004-20240426-en
General
-
Target
49a7522eb56b81e0cc317e836a0a22c0_NeikiAnalytics.exe
-
Size
92KB
-
MD5
49a7522eb56b81e0cc317e836a0a22c0
-
SHA1
cb5d4f5b07f4dc5120d62a47bb6f7ba97c52e345
-
SHA256
4145d10c613d1d271648e08adf2edbea1a4e942a32ec8394e87da34f788f19d5
-
SHA512
c5b8d2823ef379e9db21657828c0aa52ba0ca62ca1586d50f7e51654c6d7d34245a59f0ac1551d5367f776db1b64bcbae473aca97062a839ae2ae67ce74b4223
-
SSDEEP
1536:BVsZJ1QfW9wIsD7iPjsIVK/C038WVP8O2mwpHTPBjrKhafQQSITRO+PV1z3a:BVsX10W9wRWjH+lwpzPqITRz7ra
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 4596 49a7522eb56b81e0cc317e836a0a22c0_NeikiAnalytics.exe -
Executes dropped EXE 1 IoCs
pid Process 4596 49a7522eb56b81e0cc317e836a0a22c0_NeikiAnalytics.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2868 49a7522eb56b81e0cc317e836a0a22c0_NeikiAnalytics.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2868 49a7522eb56b81e0cc317e836a0a22c0_NeikiAnalytics.exe 4596 49a7522eb56b81e0cc317e836a0a22c0_NeikiAnalytics.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2868 wrote to memory of 4596 2868 49a7522eb56b81e0cc317e836a0a22c0_NeikiAnalytics.exe 84 PID 2868 wrote to memory of 4596 2868 49a7522eb56b81e0cc317e836a0a22c0_NeikiAnalytics.exe 84 PID 2868 wrote to memory of 4596 2868 49a7522eb56b81e0cc317e836a0a22c0_NeikiAnalytics.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\49a7522eb56b81e0cc317e836a0a22c0_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\49a7522eb56b81e0cc317e836a0a22c0_NeikiAnalytics.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2868 -
C:\Users\Admin\AppData\Local\Temp\49a7522eb56b81e0cc317e836a0a22c0_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\49a7522eb56b81e0cc317e836a0a22c0_NeikiAnalytics.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:4596
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
92KB
MD50ea76b4239be45542cea576705695ece
SHA1399fc2cbb09d4945396c0d2b5d4ba24b4a4adedc
SHA256f578f5814715204812ccf129d65ce20a2d58ffde1ba124ac7a44fdbc80892158
SHA51299ffd6b4523b0f5bb18a6d6b43dd33f380440d03630475f8e15fbf0fd18f7d17453f429d1ceb9981221bd104ec6d11c94e01087455a81adec8f5741b49b27714