Analysis
-
max time kernel
134s -
max time network
109s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
26-05-2024 06:30
Static task
static1
Behavioral task
behavioral1
Sample
7d178ff934477ccd80e47cee1cb81210_NeikiAnalytics.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
7d178ff934477ccd80e47cee1cb81210_NeikiAnalytics.exe
Resource
win10v2004-20240426-en
General
-
Target
7d178ff934477ccd80e47cee1cb81210_NeikiAnalytics.exe
-
Size
73KB
-
MD5
7d178ff934477ccd80e47cee1cb81210
-
SHA1
ce8a2994925d3d6d737a9ba48f2dba12d1085e1a
-
SHA256
730f0df403ed5e20309532daf30fbba15607dd632d1d7225fe1251b31e920b90
-
SHA512
ed0024a9f9d7b01da9702e34c2ec41daaad855669537df9b66ea1a52f3f84e53ca676f1c6ff71d3a92b07be4e92407cec39cd70b9f9fdaf956c802d680974c32
-
SSDEEP
1536:hbPerSI+0NsuK5QPqfhVWbdsmA+RjPFLC+e5hA0ZGUGf2g:hCeXXuNPqfcxA+HFshAOg
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1264 [email protected] -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2752 wrote to memory of 920 2752 7d178ff934477ccd80e47cee1cb81210_NeikiAnalytics.exe 84 PID 2752 wrote to memory of 920 2752 7d178ff934477ccd80e47cee1cb81210_NeikiAnalytics.exe 84 PID 2752 wrote to memory of 920 2752 7d178ff934477ccd80e47cee1cb81210_NeikiAnalytics.exe 84 PID 920 wrote to memory of 1264 920 cmd.exe 85 PID 920 wrote to memory of 1264 920 cmd.exe 85 PID 920 wrote to memory of 1264 920 cmd.exe 85 PID 1264 wrote to memory of 4636 1264 [email protected] 86 PID 1264 wrote to memory of 4636 1264 [email protected] 86 PID 1264 wrote to memory of 4636 1264 [email protected] 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\7d178ff934477ccd80e47cee1cb81210_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\7d178ff934477ccd80e47cee1cb81210_NeikiAnalytics.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2752 -
C:\Windows\SysWOW64\cmd.exePID:920
-
C:\Users\Admin\AppData\Local\Temp\[email protected]PID:1264
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c 00.exe4⤵PID:4636
-
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\[email protected]
Filesize73KB
MD5132b4159be0137fa21d342808a654618
SHA176c8386acc67c05d2c038f6a9332483b8702eea3
SHA256f6b0296de8a22011c47ca2e2126534b2c8e259ea7b3769240281cba526f9ec2d
SHA51293a39dfe174a6fb03d97f3ed79ba99df4736d32038942840b4f667dd19e987e12f8b0ee0255d51a1bdc02bc7688779d4bb5cb0277b6107096e08bd8282ac65b6
-
Filesize
2KB
MD57b621943a35e7f39cf89f50cc48d7b94
SHA12858a28cf60f38025fffcd0ba2ecfec8511c197d
SHA256bef04c2f89dc115ce2763558933dba1767bf30cda6856d335ae68955923f9991
SHA5124169e664ad4e7e6891a05ceed78465e0ec44879b37fc0de97c014945e10c161f6bfb040efc24edc136e69bb115b2a1327b04cefb58141f712da856129872e8f1