Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
27-05-2024 23:55
Static task
static1
Behavioral task
behavioral1
Sample
27f5e41c31c39fef1c1b860c84d4f4a0_NeikiAnalytics.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
27f5e41c31c39fef1c1b860c84d4f4a0_NeikiAnalytics.exe
Resource
win10v2004-20240426-en
General
-
Target
27f5e41c31c39fef1c1b860c84d4f4a0_NeikiAnalytics.exe
-
Size
52KB
-
MD5
27f5e41c31c39fef1c1b860c84d4f4a0
-
SHA1
73f72944c4a37683a204b88d552d8554505641d0
-
SHA256
f9f9479bb920a31f25483f38744224fd811146bdc3d444b78445ac8b7f5b4084
-
SHA512
a060205fbae6735267568cdbe5a0c7cb1c92ef58481a4f1eba7ac763a636484445ed55095d035491841b7c2c1da474f7e81a13c1c73cf32274381aa0807d42c1
-
SSDEEP
1536:0MB82vyvDnKPg9xSGt43daa3pD2GbAwOHM:tlYDK4t43daaR2G3
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4360 salyban.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 29 checkip.dyndns.org -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2136 wrote to memory of 4360 2136 27f5e41c31c39fef1c1b860c84d4f4a0_NeikiAnalytics.exe 84 PID 2136 wrote to memory of 4360 2136 27f5e41c31c39fef1c1b860c84d4f4a0_NeikiAnalytics.exe 84 PID 2136 wrote to memory of 4360 2136 27f5e41c31c39fef1c1b860c84d4f4a0_NeikiAnalytics.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\27f5e41c31c39fef1c1b860c84d4f4a0_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\27f5e41c31c39fef1c1b860c84d4f4a0_NeikiAnalytics.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2136 -
C:\Users\Admin\AppData\Local\Temp\salyban.exeC:\Users\Admin\AppData\Local\Temp\salyban.exe2⤵
- Executes dropped EXE
PID:4360
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
52KB
MD52bc9c3124f2571371ca50ad22b235306
SHA163e4143677698730172df6962ce76294ba54ef07
SHA256c2628bf8641260cfb4c325cd3dbd5ac6bfb463289cb065e13034633935a81c56
SHA51253475847a31cb0a5c93cdc787c68b4b1e1431d744a8e749ce56d5ef1b50452eae1252e17af91e96d735d52e363a0ab93f2b1bac7ad9a49e7597d0df9186ca5e1