Analysis
-
max time kernel
149s -
max time network
94s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
28/05/2024, 21:01
Static task
static1
Behavioral task
behavioral1
Sample
05cb86e9612ada52985400834f6ca700_NeikiAnalytics.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
05cb86e9612ada52985400834f6ca700_NeikiAnalytics.exe
Resource
win10v2004-20240426-en
General
-
Target
05cb86e9612ada52985400834f6ca700_NeikiAnalytics.exe
-
Size
66KB
-
MD5
05cb86e9612ada52985400834f6ca700
-
SHA1
2c3fa3e64ab3416bf1882ac2e72ae7c83a95b121
-
SHA256
9d79faadf552d754f53d28878c5c859d954c43003123159f7d12e9e69a90a411
-
SHA512
aa8a576fe0ad0686d889cf4f7dcbd6b66c7a2a13045e5b48c683905605eec2df60734b9e79e0e58a1640aa1ac166632a3e93589169259ad63bff75d63350780d
-
SSDEEP
768:iLxqBt1sJw5pVNUP1/kvtbWcpmCKXHak3QIXjLZJ2bXfqQKMq+gjTAfu/MB8QKpA:1teqYQIXJJyXEv/MBK6vRel1HQwE
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 4580 imlearifú±¬± 2988 imlearifú±¬± -
Drops file in System32 directory 5 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\imlearifú±¬± imlearifú±¬± File opened for modification C:\Windows\SysWOW64\imlearifú±¬± 05cb86e9612ada52985400834f6ca700_NeikiAnalytics.exe File created C:\Windows\SysWOW64\imlearifú±¬± 05cb86e9612ada52985400834f6ca700_NeikiAnalytics.exe File opened for modification C:\Windows\SysWOW64\ifkaread-oudoocú°¸¸ imlearifú±¬± File created C:\Windows\SysWOW64\ifkaread-oudoocú°¸¸ imlearifú±¬± -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4580 imlearifú±¬± 4580 imlearifú±¬± 4580 imlearifú±¬± 4580 imlearifú±¬± 4580 imlearifú±¬± 4580 imlearifú±¬± 4580 imlearifú±¬± 4580 imlearifú±¬± 2988 imlearifú±¬± 2988 imlearifú±¬± 4580 imlearifú±¬± 4580 imlearifú±¬± 4580 imlearifú±¬± 4580 imlearifú±¬± 4580 imlearifú±¬± 4580 imlearifú±¬± 4580 imlearifú±¬± 4580 imlearifú±¬± 4580 imlearifú±¬± 4580 imlearifú±¬± 4580 imlearifú±¬± 4580 imlearifú±¬± 4580 imlearifú±¬± 4580 imlearifú±¬± 4580 imlearifú±¬± 4580 imlearifú±¬± 4580 imlearifú±¬± 4580 imlearifú±¬± 4580 imlearifú±¬± 4580 imlearifú±¬± 4580 imlearifú±¬± 4580 imlearifú±¬± 4580 imlearifú±¬± 4580 imlearifú±¬± 4580 imlearifú±¬± 4580 imlearifú±¬± 4580 imlearifú±¬± 4580 imlearifú±¬± 4580 imlearifú±¬± 4580 imlearifú±¬± 4580 imlearifú±¬± 4580 imlearifú±¬± 4580 imlearifú±¬± 4580 imlearifú±¬± 4580 imlearifú±¬± 4580 imlearifú±¬± 4580 imlearifú±¬± 4580 imlearifú±¬± 4580 imlearifú±¬± 4580 imlearifú±¬± 4580 imlearifú±¬± 4580 imlearifú±¬± 4580 imlearifú±¬± 4580 imlearifú±¬± 4580 imlearifú±¬± 4580 imlearifú±¬± 4580 imlearifú±¬± 4580 imlearifú±¬± 4580 imlearifú±¬± 4580 imlearifú±¬± 4580 imlearifú±¬± 4580 imlearifú±¬± 4580 imlearifú±¬± 4580 imlearifú±¬± -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4792 wrote to memory of 4580 4792 05cb86e9612ada52985400834f6ca700_NeikiAnalytics.exe 84 PID 4792 wrote to memory of 4580 4792 05cb86e9612ada52985400834f6ca700_NeikiAnalytics.exe 84 PID 4792 wrote to memory of 4580 4792 05cb86e9612ada52985400834f6ca700_NeikiAnalytics.exe 84 PID 4580 wrote to memory of 2988 4580 imlearifú±¬± 85 PID 4580 wrote to memory of 2988 4580 imlearifú±¬± 85 PID 4580 wrote to memory of 2988 4580 imlearifú±¬± 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\05cb86e9612ada52985400834f6ca700_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\05cb86e9612ada52985400834f6ca700_NeikiAnalytics.exe"1⤵
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:4792 -
C:\Windows\SysWOW64\imlearifú±¬±"C:\Windows\system32\imlearifú±¬±"2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4580 -
C:\Windows\SysWOW64\imlearifú±¬±ùù¿çç¤3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2988
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5KB
MD548c45e05569f9a5665d082fbdc116c14
SHA1e491ab1327b88312fc6d0535621b6de733c8efb5
SHA2567e916f847bb5de3e09b36bd527e09ed656df13296bdcd9924185bcccde7dbe4c
SHA512e1cc47e185831dc6c40372efc227f299964f262c641b790d31f0fe452a5bc70a4946c689913504c64790833c131d40c01fcd9ff3a148636be9f502959f7cc49c
-
Filesize
66KB
MD50d13558be2eb07428e69115627be460b
SHA1346f7c2438d08e9492dad0e43f515fcc855fcd64
SHA256f9a15e2e8d076e2e046889ce8bc536aa5ca5c906c26fa41bf50789010ede11c4
SHA5126dcac96289b24aa9bac681bd6d9b4e41714b71fef412377dd333d80fe3b1d17bc7adff8e23ab8105a8b77b5895047727dff76804e4ce97a08b5d7add0b473dd8