Analysis
-
max time kernel
143s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
27-05-2024 23:38
Static task
static1
Behavioral task
behavioral1
Sample
274b7afa082af29e25f4dc790f7a04c0_NeikiAnalytics.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
274b7afa082af29e25f4dc790f7a04c0_NeikiAnalytics.exe
Resource
win10v2004-20240226-en
General
-
Target
274b7afa082af29e25f4dc790f7a04c0_NeikiAnalytics.exe
-
Size
79KB
-
MD5
274b7afa082af29e25f4dc790f7a04c0
-
SHA1
d32e1f1cddf573acc9ae1fe769fcc6d513688c04
-
SHA256
d939f528b132a6bc3a4c62b8e7467cd2ccf52fbe3e9663485d18203a02c5f369
-
SHA512
0bfb7d0a094d4397068c21976818f9ff3f79fe5c75e23e4b981bd30db540afa66b011e3a3be1a314879942300a1461face41494a2999c1000482a7a5d39a6543
-
SSDEEP
1536:zvJudrqrpLekL5OQA8AkqUhMb2nuy5wgIP0CSJ+5y6B8GMGlZ5G:zvJu0rpLXUGdqU7uy5w9WMy6N5G
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2788 [email protected] -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1600 wrote to memory of 4520 1600 274b7afa082af29e25f4dc790f7a04c0_NeikiAnalytics.exe 93 PID 1600 wrote to memory of 4520 1600 274b7afa082af29e25f4dc790f7a04c0_NeikiAnalytics.exe 93 PID 1600 wrote to memory of 4520 1600 274b7afa082af29e25f4dc790f7a04c0_NeikiAnalytics.exe 93 PID 4520 wrote to memory of 2788 4520 cmd.exe 94 PID 4520 wrote to memory of 2788 4520 cmd.exe 94 PID 4520 wrote to memory of 2788 4520 cmd.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\274b7afa082af29e25f4dc790f7a04c0_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\274b7afa082af29e25f4dc790f7a04c0_NeikiAnalytics.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1600 -
C:\Windows\SysWOW64\cmd.exePID:4520
-
C:\Users\Admin\AppData\Local\Temp\[email protected]PID:2788
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4168 --field-trial-handle=2284,i,15722001240173834669,15048020084704567542,262144 --variations-seed-version /prefetch:81⤵PID:4244
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\[email protected]
Filesize79KB
MD5f430c8db65a2b1cd985411b7896c6ff8
SHA15fc58484866eeb2fe1adc2f0c9ee2bb613f94d65
SHA25696fa9ac5e76690513e0c5da63ba18d93c89b27b1d30e3cb8639b2b2a18431dd1
SHA5127787e9ba0bd9eb57c64e78155d34cd77918abacf37fd3d51dbe38c09b79811755dc727b048a56ac584980a436d324178f678a84f0b8ea27d0b3c1567f5a55ac9