Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
27-05-2024 23:38
Static task
static1
Behavioral task
behavioral1
Sample
274b7afa082af29e25f4dc790f7a04c0_NeikiAnalytics.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
274b7afa082af29e25f4dc790f7a04c0_NeikiAnalytics.exe
Resource
win10v2004-20240226-en
General
-
Target
274b7afa082af29e25f4dc790f7a04c0_NeikiAnalytics.exe
-
Size
79KB
-
MD5
274b7afa082af29e25f4dc790f7a04c0
-
SHA1
d32e1f1cddf573acc9ae1fe769fcc6d513688c04
-
SHA256
d939f528b132a6bc3a4c62b8e7467cd2ccf52fbe3e9663485d18203a02c5f369
-
SHA512
0bfb7d0a094d4397068c21976818f9ff3f79fe5c75e23e4b981bd30db540afa66b011e3a3be1a314879942300a1461face41494a2999c1000482a7a5d39a6543
-
SSDEEP
1536:zvJudrqrpLekL5OQA8AkqUhMb2nuy5wgIP0CSJ+5y6B8GMGlZ5G:zvJu0rpLXUGdqU7uy5w9WMy6N5G
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2352 [email protected] -
Loads dropped DLL 2 IoCs
pid Process 2516 cmd.exe 2516 cmd.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1032 wrote to memory of 2516 1032 274b7afa082af29e25f4dc790f7a04c0_NeikiAnalytics.exe 29 PID 1032 wrote to memory of 2516 1032 274b7afa082af29e25f4dc790f7a04c0_NeikiAnalytics.exe 29 PID 1032 wrote to memory of 2516 1032 274b7afa082af29e25f4dc790f7a04c0_NeikiAnalytics.exe 29 PID 1032 wrote to memory of 2516 1032 274b7afa082af29e25f4dc790f7a04c0_NeikiAnalytics.exe 29 PID 2516 wrote to memory of 2352 2516 cmd.exe 30 PID 2516 wrote to memory of 2352 2516 cmd.exe 30 PID 2516 wrote to memory of 2352 2516 cmd.exe 30 PID 2516 wrote to memory of 2352 2516 cmd.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\274b7afa082af29e25f4dc790f7a04c0_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\274b7afa082af29e25f4dc790f7a04c0_NeikiAnalytics.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1032 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c [email protected]2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2516 -
C:\Users\Admin\AppData\Local\Temp\[email protected]PID:2352
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\[email protected]
Filesize79KB
MD5f430c8db65a2b1cd985411b7896c6ff8
SHA15fc58484866eeb2fe1adc2f0c9ee2bb613f94d65
SHA25696fa9ac5e76690513e0c5da63ba18d93c89b27b1d30e3cb8639b2b2a18431dd1
SHA5127787e9ba0bd9eb57c64e78155d34cd77918abacf37fd3d51dbe38c09b79811755dc727b048a56ac584980a436d324178f678a84f0b8ea27d0b3c1567f5a55ac9