Analysis
-
max time kernel
122s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
26/05/2024, 05:02
Static task
static1
Behavioral task
behavioral1
Sample
6c2561c55da61f713398f8618a2d8eb0_NeikiAnalytics.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
6c2561c55da61f713398f8618a2d8eb0_NeikiAnalytics.exe
Resource
win10v2004-20240426-en
General
-
Target
6c2561c55da61f713398f8618a2d8eb0_NeikiAnalytics.exe
-
Size
213KB
-
MD5
6c2561c55da61f713398f8618a2d8eb0
-
SHA1
067fbb187a70157db6135fc1b03896c47c9d799c
-
SHA256
18f661d63130bfc304e08e50dc4efd53daba6718628fb68b1f4e16f4a71ac939
-
SHA512
e77e553e7351454abd8cde83a509c618c36fe86b31a4af4a7b9092332810497160931794014343d198e7b8568f6e7bb198329b0561d16955fdbf2726cac92310
-
SSDEEP
6144:BgkoaLUlR2p0nxkqYU6GwGOKWmsNNqNZfgu3gS7tDH0:yZD2pulphOKWmsNNqNZfgu3lJDH0
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3008 6c2561c55da61f713398f8618a2d8eb0_NeikiAnalytics.exe -
Executes dropped EXE 1 IoCs
pid Process 3008 6c2561c55da61f713398f8618a2d8eb0_NeikiAnalytics.exe -
Loads dropped DLL 1 IoCs
pid Process 1164 6c2561c55da61f713398f8618a2d8eb0_NeikiAnalytics.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1164 6c2561c55da61f713398f8618a2d8eb0_NeikiAnalytics.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 3008 6c2561c55da61f713398f8618a2d8eb0_NeikiAnalytics.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1164 wrote to memory of 3008 1164 6c2561c55da61f713398f8618a2d8eb0_NeikiAnalytics.exe 29 PID 1164 wrote to memory of 3008 1164 6c2561c55da61f713398f8618a2d8eb0_NeikiAnalytics.exe 29 PID 1164 wrote to memory of 3008 1164 6c2561c55da61f713398f8618a2d8eb0_NeikiAnalytics.exe 29 PID 1164 wrote to memory of 3008 1164 6c2561c55da61f713398f8618a2d8eb0_NeikiAnalytics.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\6c2561c55da61f713398f8618a2d8eb0_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\6c2561c55da61f713398f8618a2d8eb0_NeikiAnalytics.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:1164 -
C:\Users\Admin\AppData\Local\Temp\6c2561c55da61f713398f8618a2d8eb0_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\6c2561c55da61f713398f8618a2d8eb0_NeikiAnalytics.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:3008
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
213KB
MD50ee68bdbddd03c4a7f735cdd821ad74d
SHA1af03914e416a740aa27d080164bc2e1721c87820
SHA2569a6dd7f8180c2dab7c9f296f99ddbbe8212b66b732ab583b30c24f1357b3f47b
SHA512e5bf82453c116d0054f6c1acfefdb76eb5e7396b0b3843fabe0daae74d920539f46870078ef6c090b77f460b3fe96c98480abea41eff3e6f788acf3ffae714ea