Analysis

  • max time kernel
    120s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    28-05-2024 00:59

General

  • Target

    2a71cc50645cc4124bb28fdad85e0760_NeikiAnalytics.exe

  • Size

    79KB

  • MD5

    2a71cc50645cc4124bb28fdad85e0760

  • SHA1

    413c06453a64538bff08a7b912efc3ec87b49460

  • SHA256

    94c7fd8de9e90482a3bb7c007c333687a6553ce5a1868b0d0c90f2e181bd0192

  • SHA512

    39814d346ec55a78b77f948bd1543e5351f1445ef786218ac20349f04b1c3341e13da267078451d710467ae7dc9f84cc1ffd1a0925194f1aaaa8074f32fdce19

  • SSDEEP

    1536:zvec2PUdwS/2YOQA8AkqUhMb2nuy5wgIP0CSJ+5yLB8GMGlZ5G:zveXPUur9GdqU7uy5w9WMyLN5G

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2a71cc50645cc4124bb28fdad85e0760_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\2a71cc50645cc4124bb28fdad85e0760_NeikiAnalytics.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1704

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\[email protected]

    Filesize

    79KB

    MD5

    ec90945d9ed32419817c305fec303991

    SHA1

    09e328b551c1d60929216de3f0bcb1c4371dd2bf

    SHA256

    6d3e6887672a165e49794c66273d7f7da1bd7abe0fcf56997f8dd50392d6acd4

    SHA512

    1dc346722b0dea0c30b3a608057f2c3323086a8068e19957956b740dc4303ab4233843ec2e64be926465ba4bfbe653d9194864592cbad186784c586a2d039341

  • memory/1704-8-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/2032-7-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB