Analysis
-
max time kernel
149s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
29/05/2024, 03:16
Static task
static1
Behavioral task
behavioral1
Sample
35554c384ad5d5af228b849dc94ba4b0_NeikiAnalytics.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
35554c384ad5d5af228b849dc94ba4b0_NeikiAnalytics.exe
Resource
win10v2004-20240426-en
General
-
Target
35554c384ad5d5af228b849dc94ba4b0_NeikiAnalytics.exe
-
Size
79KB
-
MD5
35554c384ad5d5af228b849dc94ba4b0
-
SHA1
947adc0864cd72589c9624e2e81a03fe2bf1cf22
-
SHA256
3507ef89ed397ca13f63c17dbcc77564dd9ded37d5964cb8e94a3fde5b7f86d3
-
SHA512
d33214dea0c7e77dec12fb1e9cd29e13535e8bb04bbc739c74e0638d8f8bddd9001479025d9f191b630bbff2bf7e91f94c5b1261609acdc2993af62ee2bdd1e0
-
SSDEEP
1536:zvO/iWQN7sVqtRZuuOQA8AkqUhMb2nuy5wgIP0CSJ+5yCB8GMGlZ5G:zvO6LP7Z+GdqU7uy5w9WMyCN5G
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3348 [email protected] -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4088 wrote to memory of 700 4088 35554c384ad5d5af228b849dc94ba4b0_NeikiAnalytics.exe 85 PID 4088 wrote to memory of 700 4088 35554c384ad5d5af228b849dc94ba4b0_NeikiAnalytics.exe 85 PID 4088 wrote to memory of 700 4088 35554c384ad5d5af228b849dc94ba4b0_NeikiAnalytics.exe 85 PID 700 wrote to memory of 3348 700 cmd.exe 86 PID 700 wrote to memory of 3348 700 cmd.exe 86 PID 700 wrote to memory of 3348 700 cmd.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\35554c384ad5d5af228b849dc94ba4b0_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\35554c384ad5d5af228b849dc94ba4b0_NeikiAnalytics.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4088 -
C:\Windows\SysWOW64\cmd.exePID:700
-
C:\Users\Admin\AppData\Local\Temp\[email protected]PID:3348
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\[email protected]
Filesize79KB
MD50e5ee8b0604d3e46912eabbd6ab62b36
SHA156a41e6d0ba8da5c243b84047866400b62664a0e
SHA256af39fee639ad96fabda9637cc5d0c254ce8463c9ebf9e8f396982ba0c1315838
SHA5128cbe0825cddca140bbc11c95c6c14d8b3ec20e1bbefade28ae67f6bfec79914b465735317822956edaaff0e3e0ee01b4fe61d76abc04619b98e4ed9e4d2aca7f