Analysis
-
max time kernel
140s -
max time network
159s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
28-05-2024 03:04
Static task
static1
Behavioral task
behavioral1
Sample
2f5e64b9959a96defff65e208e0eb5a0_NeikiAnalytics.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
2f5e64b9959a96defff65e208e0eb5a0_NeikiAnalytics.exe
Resource
win10v2004-20240226-en
General
-
Target
2f5e64b9959a96defff65e208e0eb5a0_NeikiAnalytics.exe
-
Size
73KB
-
MD5
2f5e64b9959a96defff65e208e0eb5a0
-
SHA1
3188ad4ac836b764cc16815d180a57e8ca10f01a
-
SHA256
3dedc4300b318f3aee10248f5282caee678feb4a16522f62a509a0b43fc6c258
-
SHA512
03954ae60c2cc067544b021b21a7b88caeee42e6643caf0e4b1109e0a1788173ac8488c874b22f98cead53b6f2d471b0fcc529a0fa9db52dab7d5b8471d9b7fb
-
SSDEEP
1536:hbqbUIzHK5QPqfhVWbdsmA+RjPFLC+e5hf0ZGUGf2g:h8UI7NPqfcxA+HFshfOg
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2760 [email protected] -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2620 wrote to memory of 2728 2620 2f5e64b9959a96defff65e208e0eb5a0_NeikiAnalytics.exe 92 PID 2620 wrote to memory of 2728 2620 2f5e64b9959a96defff65e208e0eb5a0_NeikiAnalytics.exe 92 PID 2620 wrote to memory of 2728 2620 2f5e64b9959a96defff65e208e0eb5a0_NeikiAnalytics.exe 92 PID 2728 wrote to memory of 2760 2728 cmd.exe 93 PID 2728 wrote to memory of 2760 2728 cmd.exe 93 PID 2728 wrote to memory of 2760 2728 cmd.exe 93 PID 2760 wrote to memory of 924 2760 [email protected] 94 PID 2760 wrote to memory of 924 2760 [email protected] 94 PID 2760 wrote to memory of 924 2760 [email protected] 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\2f5e64b9959a96defff65e208e0eb5a0_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\2f5e64b9959a96defff65e208e0eb5a0_NeikiAnalytics.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2620 -
C:\Windows\SysWOW64\cmd.exePID:2728
-
C:\Users\Admin\AppData\Local\Temp\[email protected]PID:2760
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c 00.exe4⤵PID:924
-
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=1324 --field-trial-handle=2280,i,1836084024518340990,18250262151825427757,262144 --variations-seed-version /prefetch:81⤵PID:3860
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\[email protected]
Filesize73KB
MD5c8479ca423a8d161f8df84a073c158e9
SHA1d9c74eb5c265309610fda386152dce3170109a0f
SHA256bd099450c95092e4624585c6824507966fffbd4f5dde8079f3d10216fe5562f8
SHA512a3820e220749baaf68258ab7f064fd996762f303b244ee4a259fb834788b3f1da649d7181bea930f0bdc4f4a7dfa26dcab6bf7f2710cd7bf79cf53be0716cf33
-
Filesize
2KB
MD57b621943a35e7f39cf89f50cc48d7b94
SHA12858a28cf60f38025fffcd0ba2ecfec8511c197d
SHA256bef04c2f89dc115ce2763558933dba1767bf30cda6856d335ae68955923f9991
SHA5124169e664ad4e7e6891a05ceed78465e0ec44879b37fc0de97c014945e10c161f6bfb040efc24edc136e69bb115b2a1327b04cefb58141f712da856129872e8f1