Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
26-05-2024 21:24
Static task
static1
Behavioral task
behavioral1
Sample
035556905825d9de954b2c4c3039fb50_NeikiAnalytics.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
035556905825d9de954b2c4c3039fb50_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
035556905825d9de954b2c4c3039fb50_NeikiAnalytics.exe
-
Size
1.2MB
-
MD5
035556905825d9de954b2c4c3039fb50
-
SHA1
94c968fbe37f830a1947dd9b393bb917aed85d4d
-
SHA256
391c4a9efc5fe391b5be45eef1784a73d716d12bd88ca2d63ffc754750e97efa
-
SHA512
e7425c82646ccaa6beca650d3aef2a9665a180c5cf3533f289e0545c7a66e566a0fad73d421a752318a9c80832a52fc26547becec1065a039c4395e9d3be9199
-
SSDEEP
24576:9ZSA8nZHZ9ozY6nHH5H6MUT6baz3CMmxPisRMYguiw7a/ZSya/JXk377Lv+f6T8P:GA8nWzY6nHHd6Z6ba7P+Khw7gxg23bnI
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2196 035556905825d9de954b2c4c3039fb50_NeikiAnalytics.exe -
Executes dropped EXE 1 IoCs
pid Process 2196 035556905825d9de954b2c4c3039fb50_NeikiAnalytics.exe -
Loads dropped DLL 1 IoCs
pid Process 2228 035556905825d9de954b2c4c3039fb50_NeikiAnalytics.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 4 pastebin.com 3 pastebin.com -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2196 035556905825d9de954b2c4c3039fb50_NeikiAnalytics.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2228 035556905825d9de954b2c4c3039fb50_NeikiAnalytics.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 2196 035556905825d9de954b2c4c3039fb50_NeikiAnalytics.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2228 wrote to memory of 2196 2228 035556905825d9de954b2c4c3039fb50_NeikiAnalytics.exe 29 PID 2228 wrote to memory of 2196 2228 035556905825d9de954b2c4c3039fb50_NeikiAnalytics.exe 29 PID 2228 wrote to memory of 2196 2228 035556905825d9de954b2c4c3039fb50_NeikiAnalytics.exe 29 PID 2228 wrote to memory of 2196 2228 035556905825d9de954b2c4c3039fb50_NeikiAnalytics.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\035556905825d9de954b2c4c3039fb50_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\035556905825d9de954b2c4c3039fb50_NeikiAnalytics.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:2228 -
C:\Users\Admin\AppData\Local\Temp\035556905825d9de954b2c4c3039fb50_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\035556905825d9de954b2c4c3039fb50_NeikiAnalytics.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
PID:2196
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.2MB
MD5614015efbff8c5ee236c50436f3b9feb
SHA194214fe3c943954ffde769441c48e80eedee2772
SHA256aa248f923511cf841781d62bc59c500d5ac79aefca59091e4cd3a0a2b0ddd414
SHA51295cf11c6f5c03e64b0c883cb9a44ff6ca011936cafbfb45441d8e9a890daea75d2c3afc82dae50b28ce7e6e52f2177c0495626bb59efa5af2ab0cd59646b67dd