Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
27-05-2024 01:46
Static task
static1
Behavioral task
behavioral1
Sample
16ae0aa2c1269316be210abd46059fa0_NeikiAnalytics.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
16ae0aa2c1269316be210abd46059fa0_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
16ae0aa2c1269316be210abd46059fa0_NeikiAnalytics.exe
-
Size
4KB
-
MD5
16ae0aa2c1269316be210abd46059fa0
-
SHA1
2bd1032db6cd62542b816dbd0afd7eff7f54d698
-
SHA256
ad2f173f03d0d3fcabd2e12751b59356b572c64b74441c61c0ceb38396fc26c5
-
SHA512
955dd0945296681108cdcb5556620400beaedddbb9c35dc88d80f2889d649f6b8872c7f8dce7bd7080cc08c0f27411ae3b3ed74b797e1e7546463e3f9306f50a
-
SSDEEP
48:Zdni+Wyi18DN0nCvTaE6nc9fhXcGEY3sJd9ga91RsKs+EOnA7B8mOo4jUx7OtKGc:Z0v4mUWKh9ctgC1RMJOnKymV44Sh
Malware Config
Signatures
-
Upatre
Upatre is a generic malware downloader.
-
Deletes itself 1 IoCs
Processes:
szgfw.exepid Process 2412 szgfw.exe -
Executes dropped EXE 1 IoCs
Processes:
szgfw.exepid Process 2412 szgfw.exe -
Loads dropped DLL 2 IoCs
Processes:
16ae0aa2c1269316be210abd46059fa0_NeikiAnalytics.exepid Process 1704 16ae0aa2c1269316be210abd46059fa0_NeikiAnalytics.exe 1704 16ae0aa2c1269316be210abd46059fa0_NeikiAnalytics.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
16ae0aa2c1269316be210abd46059fa0_NeikiAnalytics.exedescription pid Process procid_target PID 1704 wrote to memory of 2412 1704 16ae0aa2c1269316be210abd46059fa0_NeikiAnalytics.exe 28 PID 1704 wrote to memory of 2412 1704 16ae0aa2c1269316be210abd46059fa0_NeikiAnalytics.exe 28 PID 1704 wrote to memory of 2412 1704 16ae0aa2c1269316be210abd46059fa0_NeikiAnalytics.exe 28 PID 1704 wrote to memory of 2412 1704 16ae0aa2c1269316be210abd46059fa0_NeikiAnalytics.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\16ae0aa2c1269316be210abd46059fa0_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\16ae0aa2c1269316be210abd46059fa0_NeikiAnalytics.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1704 -
C:\Users\Admin\AppData\Local\Temp\szgfw.exe"C:\Users\Admin\AppData\Local\Temp\szgfw.exe"2⤵
- Deletes itself
- Executes dropped EXE
PID:2412
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4KB
MD576b1c3f0ed6a48184f88eccf5f39bfc3
SHA1c503185b54b838145e47920c8b3ddee6a83551ec
SHA2564f871770f04788a583f5407db408b0db222bdd1afb6080075bab59f1413b57b5
SHA5122b283a91be6954875f216619411bdc4a0725bf0f716d4f3283fa7acc14f7a47a512b8a8cb1433a181bba2f653b70156348a69e5a36d1ee373fefbcd9e29b9f17