Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
28/05/2024, 06:41
Static task
static1
Behavioral task
behavioral1
Sample
37180e743e0aecd420dc00b941495200_NeikiAnalytics.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
37180e743e0aecd420dc00b941495200_NeikiAnalytics.exe
Resource
win10v2004-20240426-en
General
-
Target
37180e743e0aecd420dc00b941495200_NeikiAnalytics.exe
-
Size
79KB
-
MD5
37180e743e0aecd420dc00b941495200
-
SHA1
95e034d3b3b35b095b1a80b2d1647befed7bd4cf
-
SHA256
909d2d7d3adb3e49ba66507d383c696a74dac81f6f2188731c54dfd06fbba919
-
SHA512
51cf1eec3ac4ad09f60faba955ce416c1b8e1635d2c0dc5ee0083496726e311fbefd04f9a27ab6e2b013ab9165b5d1fd4ab930833fb55bc48136c3689c43047b
-
SSDEEP
1536:zvjtN299nmSy5qOQA8AkqUhMb2nuy5wgIP0CSJ+5ygB8GMGlZ5G:zvjtc9XSfGdqU7uy5w9WMygN5G
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1272 [email protected] -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 236 wrote to memory of 1744 236 37180e743e0aecd420dc00b941495200_NeikiAnalytics.exe 84 PID 236 wrote to memory of 1744 236 37180e743e0aecd420dc00b941495200_NeikiAnalytics.exe 84 PID 236 wrote to memory of 1744 236 37180e743e0aecd420dc00b941495200_NeikiAnalytics.exe 84 PID 1744 wrote to memory of 1272 1744 cmd.exe 85 PID 1744 wrote to memory of 1272 1744 cmd.exe 85 PID 1744 wrote to memory of 1272 1744 cmd.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\37180e743e0aecd420dc00b941495200_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\37180e743e0aecd420dc00b941495200_NeikiAnalytics.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:236 -
C:\Windows\SysWOW64\cmd.exePID:1744
-
C:\Users\Admin\AppData\Local\Temp\[email protected]PID:1272
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\[email protected]
Filesize79KB
MD56f7e9a5b3d3905e7dc2a9cf8f734d2a7
SHA179b56b17fdb16872e49abc4b2e3c0ef932bf3443
SHA256cd3f16de353a273179c0487cbbb53a3f17f2b1edeaf8713a68cf20b9ea98a26b
SHA512846090f38452b5bfd71f22a892b7fd3f2d11e20342dd18e52a8a22821e7dec7d3790a08dd3e9f8bdc397cc3d6632eb893c6fcb038fdae68023035469df30dab2