Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
26/05/2024, 09:11
Static task
static1
Behavioral task
behavioral1
Sample
9594cd49968f9e8f2c05c987ae867d80_NeikiAnalytics.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
9594cd49968f9e8f2c05c987ae867d80_NeikiAnalytics.exe
Resource
win10v2004-20240426-en
General
-
Target
9594cd49968f9e8f2c05c987ae867d80_NeikiAnalytics.exe
-
Size
73KB
-
MD5
9594cd49968f9e8f2c05c987ae867d80
-
SHA1
ea9d02e07c9f239791515f0a34216a1f47389a5c
-
SHA256
e9a0a62f07c1d4ed628ddbe0f4b6928f5bb81d8eb6d9a77f52ca3e8ed383c583
-
SHA512
939a9ca640a26e4b6e9fc9e0a36629b4affe0085239ae7ef0cbe18c82451e340bd5ead87a91696dfcceaa63fc503d77df1047f885f8578d28bc069424933fd9c
-
SSDEEP
1536:hbWJazkMYdK5QPqfhVWbdsmA+RjPFLC+e5hD0ZGUGf2g:hyY3qNPqfcxA+HFshDOg
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4848 [email protected] -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4800 wrote to memory of 3756 4800 9594cd49968f9e8f2c05c987ae867d80_NeikiAnalytics.exe 83 PID 4800 wrote to memory of 3756 4800 9594cd49968f9e8f2c05c987ae867d80_NeikiAnalytics.exe 83 PID 4800 wrote to memory of 3756 4800 9594cd49968f9e8f2c05c987ae867d80_NeikiAnalytics.exe 83 PID 3756 wrote to memory of 4848 3756 cmd.exe 84 PID 3756 wrote to memory of 4848 3756 cmd.exe 84 PID 3756 wrote to memory of 4848 3756 cmd.exe 84 PID 4848 wrote to memory of 1516 4848 [email protected] 85 PID 4848 wrote to memory of 1516 4848 [email protected] 85 PID 4848 wrote to memory of 1516 4848 [email protected] 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\9594cd49968f9e8f2c05c987ae867d80_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\9594cd49968f9e8f2c05c987ae867d80_NeikiAnalytics.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4800 -
C:\Windows\SysWOW64\cmd.exePID:3756
-
C:\Users\Admin\AppData\Local\Temp\[email protected]PID:4848
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c 00.exe4⤵PID:1516
-
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\[email protected]
Filesize73KB
MD505ac1c00bb3f83c7d069511cba7705eb
SHA1eb8ec20d3ce1c59ab5289917ea3e218baa458f8c
SHA256a31d384f03ca0f20984045d7edc8c97e3babd57c64f897bd7649c6147124a9c1
SHA5124a8769d77cb9c09a41a66eeb045f0956dfd662088d6f1263db4af4ec79748df9eb77dee546a564d2b03cd37beb453ea5f08e8e8804fefd27cc5ad85e3baffa06
-
Filesize
2KB
MD57b621943a35e7f39cf89f50cc48d7b94
SHA12858a28cf60f38025fffcd0ba2ecfec8511c197d
SHA256bef04c2f89dc115ce2763558933dba1767bf30cda6856d335ae68955923f9991
SHA5124169e664ad4e7e6891a05ceed78465e0ec44879b37fc0de97c014945e10c161f6bfb040efc24edc136e69bb115b2a1327b04cefb58141f712da856129872e8f1