Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
28-05-2024 22:59
Static task
static1
Behavioral task
behavioral1
Sample
13e13732f695efdfd3572fca49ff7570_NeikiAnalytics.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
13e13732f695efdfd3572fca49ff7570_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
13e13732f695efdfd3572fca49ff7570_NeikiAnalytics.exe
-
Size
218KB
-
MD5
13e13732f695efdfd3572fca49ff7570
-
SHA1
9e14f6c9e42bdc36b44b3e56a005c4c36356124b
-
SHA256
b0c5fa918254780dddf0e0a1fe02e54cb38c7b84a05fefcdf9b00bcb84edfe33
-
SHA512
2df86c36a0d8049520947e833bd5f450baf42eade8febe84b4158cf8cd483b25ffcf99a19333b735ef99db869d01269efeedfa1cf23fc99d00281a6f0e807215
-
SSDEEP
6144:h0KGo4GsI4QupTbvAAbUCRSkoHyjm0dySTqo86NvX9aLisM+Nea:dhsI4nTbvXBSkogX9aLisvNea
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3572 13e13732f695efdfd3572fca49ff7570_NeikiAnalytics.exe -
Executes dropped EXE 1 IoCs
pid Process 3572 13e13732f695efdfd3572fca49ff7570_NeikiAnalytics.exe -
Program crash 2 IoCs
pid pid_target Process procid_target 3052 4648 WerFault.exe 81 1232 3572 WerFault.exe 86 -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4648 13e13732f695efdfd3572fca49ff7570_NeikiAnalytics.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 3572 13e13732f695efdfd3572fca49ff7570_NeikiAnalytics.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4648 wrote to memory of 3572 4648 13e13732f695efdfd3572fca49ff7570_NeikiAnalytics.exe 86 PID 4648 wrote to memory of 3572 4648 13e13732f695efdfd3572fca49ff7570_NeikiAnalytics.exe 86 PID 4648 wrote to memory of 3572 4648 13e13732f695efdfd3572fca49ff7570_NeikiAnalytics.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\13e13732f695efdfd3572fca49ff7570_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\13e13732f695efdfd3572fca49ff7570_NeikiAnalytics.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:4648 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4648 -s 4002⤵
- Program crash
PID:3052
-
-
C:\Users\Admin\AppData\Local\Temp\13e13732f695efdfd3572fca49ff7570_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\13e13732f695efdfd3572fca49ff7570_NeikiAnalytics.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:3572 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3572 -s 3683⤵
- Program crash
PID:1232
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4648 -ip 46481⤵PID:2184
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 3572 -ip 35721⤵PID:1572
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
218KB
MD5a276f24935a6d30e065acb49c6b3603d
SHA10bb1335368bb735647d54c5fec213d76291cf519
SHA2569c6ed04a22679521edbca154b5a3eb440200abd3c65d923902ef11ad4ae2f289
SHA512bf80c5b57506a908dd23203b969757b15c3372debaf82f2290339b9bada60c0bb3c3e5acb4c91880ad4f5521f79c54338417fb0a2ecb66eb2feb5aa04500249e