Analysis
-
max time kernel
118s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
28-05-2024 00:44
Static task
static1
Behavioral task
behavioral1
Sample
29cfcf6e816b58b5bcba5265b90a0ba0_NeikiAnalytics.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
29cfcf6e816b58b5bcba5265b90a0ba0_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
29cfcf6e816b58b5bcba5265b90a0ba0_NeikiAnalytics.exe
-
Size
688KB
-
MD5
29cfcf6e816b58b5bcba5265b90a0ba0
-
SHA1
c9160896beb73651699aa8eb9ded9112a7ffcbae
-
SHA256
3eacb062570925b61037b583ba4a31309b6e7e4507170af4a1dd6e124bec6de9
-
SHA512
b365a899418ec8117e46cf0c5f9e1e51de428863faec4d77390ebde2ea1c759670f34840b2d36c72bcb83ea697e74acd3ca51198dd6a442b8078971fed7dbaca
-
SSDEEP
12288:82ax4OQ7L6jFcgk0npM4dl0v5JHpS0wULVnMhysFjm+0npM4z:7amOQPE2gkEM4dmv5Xf+hPEM4z
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2216 29cfcf6e816b58b5bcba5265b90a0ba0_NeikiAnalytics.exe -
Executes dropped EXE 1 IoCs
pid Process 2216 29cfcf6e816b58b5bcba5265b90a0ba0_NeikiAnalytics.exe -
Loads dropped DLL 1 IoCs
pid Process 3008 29cfcf6e816b58b5bcba5265b90a0ba0_NeikiAnalytics.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2216 29cfcf6e816b58b5bcba5265b90a0ba0_NeikiAnalytics.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3008 29cfcf6e816b58b5bcba5265b90a0ba0_NeikiAnalytics.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 2216 29cfcf6e816b58b5bcba5265b90a0ba0_NeikiAnalytics.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3008 wrote to memory of 2216 3008 29cfcf6e816b58b5bcba5265b90a0ba0_NeikiAnalytics.exe 28 PID 3008 wrote to memory of 2216 3008 29cfcf6e816b58b5bcba5265b90a0ba0_NeikiAnalytics.exe 28 PID 3008 wrote to memory of 2216 3008 29cfcf6e816b58b5bcba5265b90a0ba0_NeikiAnalytics.exe 28 PID 3008 wrote to memory of 2216 3008 29cfcf6e816b58b5bcba5265b90a0ba0_NeikiAnalytics.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\29cfcf6e816b58b5bcba5265b90a0ba0_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\29cfcf6e816b58b5bcba5265b90a0ba0_NeikiAnalytics.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:3008 -
C:\Users\Admin\AppData\Local\Temp\29cfcf6e816b58b5bcba5265b90a0ba0_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\29cfcf6e816b58b5bcba5265b90a0ba0_NeikiAnalytics.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of UnmapMainImage
PID:2216
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
688KB
MD53d416f23026243e8b574c2057ce223ea
SHA154065e03df8b117f9988d9c69d4a21e67520d864
SHA2565bb5596b1dc7c724c9d8cd0f0c1db994e38bf0191cdfc687fd536d8fecf62679
SHA512603fe6bc1d8425275767961fbd8519bccf854b46a6e803d9005fd2b024a23f9fce80e6ea8609a18fd2546f012c6082888d42a728d9d4f2445d40a69ed180010d