Analysis

  • max time kernel
    122s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240419-en
  • resource tags

    arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system
  • submitted
    27-05-2024 04:16

General

  • Target

    1e92e914c34f9ca40effa7f8831629f0_NeikiAnalytics.exe

  • Size

    539KB

  • MD5

    1e92e914c34f9ca40effa7f8831629f0

  • SHA1

    cc3c1019191cbf8c6cdfebd800b30707aed5a1b7

  • SHA256

    01c97ce4d6d63c4a0b73a1a90aeb9a9204307c1abfd62a913638ba41230745cb

  • SHA512

    c519e5ed538f0d847173714044d5b860ce1ac24c043e6685d66ba6183b99f846f183fad2acca3a32b2896593e98ab26ab800ff42a056b1b4598943271fa98fd1

  • SSDEEP

    12288:Ld8dsHxxCcAcqlMfU7yBc18bCCwO+TalLN:LdfxxDyOcimCwO+TalLN

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1e92e914c34f9ca40effa7f8831629f0_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\1e92e914c34f9ca40effa7f8831629f0_NeikiAnalytics.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2288
    • C:\Users\Admin\AppData\Local\Temp\B85.tmp
      "C:\Users\Admin\AppData\Local\Temp\B85.tmp" --pingC:\Users\Admin\AppData\Local\Temp\1e92e914c34f9ca40effa7f8831629f0_NeikiAnalytics.exe C417107E490B142C13616E417AD385C36B9EAB319B1BCB11E0A328AA1684151375989F94811A62AB282E3B803E59B671004C0CEC12134E934D9F14F67A949219
      2⤵
      • Deletes itself
      • Executes dropped EXE
      PID:2300

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\B85.tmp

    Filesize

    539KB

    MD5

    8bec354741bc3268c5e540a1cc3d90da

    SHA1

    5a3b374a06a9316d596333291cfe2d52e5bcac2d

    SHA256

    4210cc846847f4cf174bde4c70bfb4da91d4ca0a37a7ba60e8542ded5f477429

    SHA512

    345ad52a51ea1ac856e8c7013944f3e98966782b8a134c077fd374b89495507596554467b72f63f39988dfccd9ae46868dd5822e9fa2544cb4219c0924de8454