Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
27-05-2024 04:16
Static task
static1
Behavioral task
behavioral1
Sample
1e92e914c34f9ca40effa7f8831629f0_NeikiAnalytics.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
1e92e914c34f9ca40effa7f8831629f0_NeikiAnalytics.exe
Resource
win10v2004-20240426-en
General
-
Target
1e92e914c34f9ca40effa7f8831629f0_NeikiAnalytics.exe
-
Size
539KB
-
MD5
1e92e914c34f9ca40effa7f8831629f0
-
SHA1
cc3c1019191cbf8c6cdfebd800b30707aed5a1b7
-
SHA256
01c97ce4d6d63c4a0b73a1a90aeb9a9204307c1abfd62a913638ba41230745cb
-
SHA512
c519e5ed538f0d847173714044d5b860ce1ac24c043e6685d66ba6183b99f846f183fad2acca3a32b2896593e98ab26ab800ff42a056b1b4598943271fa98fd1
-
SSDEEP
12288:Ld8dsHxxCcAcqlMfU7yBc18bCCwO+TalLN:LdfxxDyOcimCwO+TalLN
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2300 B85.tmp -
Executes dropped EXE 1 IoCs
pid Process 2300 B85.tmp -
Loads dropped DLL 1 IoCs
pid Process 2288 1e92e914c34f9ca40effa7f8831629f0_NeikiAnalytics.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2288 wrote to memory of 2300 2288 1e92e914c34f9ca40effa7f8831629f0_NeikiAnalytics.exe 28 PID 2288 wrote to memory of 2300 2288 1e92e914c34f9ca40effa7f8831629f0_NeikiAnalytics.exe 28 PID 2288 wrote to memory of 2300 2288 1e92e914c34f9ca40effa7f8831629f0_NeikiAnalytics.exe 28 PID 2288 wrote to memory of 2300 2288 1e92e914c34f9ca40effa7f8831629f0_NeikiAnalytics.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\1e92e914c34f9ca40effa7f8831629f0_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\1e92e914c34f9ca40effa7f8831629f0_NeikiAnalytics.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2288 -
C:\Users\Admin\AppData\Local\Temp\B85.tmp"C:\Users\Admin\AppData\Local\Temp\B85.tmp" --pingC:\Users\Admin\AppData\Local\Temp\1e92e914c34f9ca40effa7f8831629f0_NeikiAnalytics.exe C417107E490B142C13616E417AD385C36B9EAB319B1BCB11E0A328AA1684151375989F94811A62AB282E3B803E59B671004C0CEC12134E934D9F14F67A9492192⤵
- Deletes itself
- Executes dropped EXE
PID:2300
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
539KB
MD58bec354741bc3268c5e540a1cc3d90da
SHA15a3b374a06a9316d596333291cfe2d52e5bcac2d
SHA2564210cc846847f4cf174bde4c70bfb4da91d4ca0a37a7ba60e8542ded5f477429
SHA512345ad52a51ea1ac856e8c7013944f3e98966782b8a134c077fd374b89495507596554467b72f63f39988dfccd9ae46868dd5822e9fa2544cb4219c0924de8454