Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
27-05-2024 04:16
Static task
static1
Behavioral task
behavioral1
Sample
1e92e914c34f9ca40effa7f8831629f0_NeikiAnalytics.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
1e92e914c34f9ca40effa7f8831629f0_NeikiAnalytics.exe
Resource
win10v2004-20240426-en
General
-
Target
1e92e914c34f9ca40effa7f8831629f0_NeikiAnalytics.exe
-
Size
539KB
-
MD5
1e92e914c34f9ca40effa7f8831629f0
-
SHA1
cc3c1019191cbf8c6cdfebd800b30707aed5a1b7
-
SHA256
01c97ce4d6d63c4a0b73a1a90aeb9a9204307c1abfd62a913638ba41230745cb
-
SHA512
c519e5ed538f0d847173714044d5b860ce1ac24c043e6685d66ba6183b99f846f183fad2acca3a32b2896593e98ab26ab800ff42a056b1b4598943271fa98fd1
-
SSDEEP
12288:Ld8dsHxxCcAcqlMfU7yBc18bCCwO+TalLN:LdfxxDyOcimCwO+TalLN
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 692 39DC.tmp -
Executes dropped EXE 1 IoCs
pid Process 692 39DC.tmp -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4396 wrote to memory of 692 4396 1e92e914c34f9ca40effa7f8831629f0_NeikiAnalytics.exe 81 PID 4396 wrote to memory of 692 4396 1e92e914c34f9ca40effa7f8831629f0_NeikiAnalytics.exe 81 PID 4396 wrote to memory of 692 4396 1e92e914c34f9ca40effa7f8831629f0_NeikiAnalytics.exe 81
Processes
-
C:\Users\Admin\AppData\Local\Temp\1e92e914c34f9ca40effa7f8831629f0_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\1e92e914c34f9ca40effa7f8831629f0_NeikiAnalytics.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4396 -
C:\Users\Admin\AppData\Local\Temp\39DC.tmp"C:\Users\Admin\AppData\Local\Temp\39DC.tmp" --pingC:\Users\Admin\AppData\Local\Temp\1e92e914c34f9ca40effa7f8831629f0_NeikiAnalytics.exe DEFBA17922963A6364B86B923EB329384D8DC6457F1A2CBDA2806093784A02759BC4D13408876A9F824815F36AAA3E89EAFA07438A88AF20646229A4B7A70FB92⤵
- Deletes itself
- Executes dropped EXE
PID:692
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
539KB
MD557b69e7ff6701ff4fe6341d00419c486
SHA1d7bebe4a56b3422b1822c4b26a11657854d05035
SHA2562197b43c3d55cb8c1c68fb5beb6b6621e8f1b70b2c8afe307eb3aa4b3796e777
SHA5127b55ed537c96a7157aa0e473400a27126687e2ec5a12bd96fd40826d4928323f45bfe04c2109146d38774191c2c299fe122e36174a1a5fa6be5c560809ba9de8