Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
29/05/2024, 05:01
Behavioral task
behavioral1
Sample
426f1b268b921018de305365d77c9160_NeikiAnalytics.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
426f1b268b921018de305365d77c9160_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
426f1b268b921018de305365d77c9160_NeikiAnalytics.exe
-
Size
68KB
-
MD5
426f1b268b921018de305365d77c9160
-
SHA1
b4736d54646991ea7ef5f9c7a60bc3bb3d170cb1
-
SHA256
6f758182494cda18df6220f3a39dda526a54dfb7ec11d5eb411f7853b6387ea9
-
SHA512
c19bef97b26a818dfb6ae7f7243825d11935871e0cff2bfa4fa4978e7418ce78ad3f41f4297cb9a990051a1524050845ea363436b0fe43109f19b33039f7ea4a
-
SSDEEP
1536:Q4QQ6NSyM61l19piO+LV8YEoI/EU9RUe4mOqwezD:Q4X6NSyfnpijeYEoIcq4t6
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/2596-0-0x0000000000400000-0x0000000000464000-memory.dmp upx behavioral2/files/0x0007000000023418-6.dat upx behavioral2/memory/2596-29-0x0000000000400000-0x0000000000464000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\winxcfg.exe = "C:\\Windows\\system32\\winxcfg.exe" 426f1b268b921018de305365d77c9160_NeikiAnalytics.exe -
Drops file in System32 directory 27 IoCs
description ioc Process File created C:\Windows\SysWOW64\macromd\Counter Strike CD Keygen.exe 426f1b268b921018de305365d77c9160_NeikiAnalytics.exe File created C:\Windows\SysWOW64\macromd\Pamela Anderson.exe 426f1b268b921018de305365d77c9160_NeikiAnalytics.exe File created C:\Windows\SysWOW64\macromd\preteen sucking huge cock illegal.mpg.exe 426f1b268b921018de305365d77c9160_NeikiAnalytics.exe File created C:\Windows\SysWOW64\macromd\chubby girl bukkake gang banged sucking cock.mpg.pif 426f1b268b921018de305365d77c9160_NeikiAnalytics.exe File created C:\Windows\SysWOW64\macromd\aimhacker.exe 426f1b268b921018de305365d77c9160_NeikiAnalytics.exe File created C:\Windows\SysWOW64\winxcfg.exe 426f1b268b921018de305365d77c9160_NeikiAnalytics.exe File created C:\Windows\SysWOW64\macromd\yahoo cracker.exe 426f1b268b921018de305365d77c9160_NeikiAnalytics.exe File created C:\Windows\SysWOW64\macromd\invisible IP.exe 426f1b268b921018de305365d77c9160_NeikiAnalytics.exe File created C:\Windows\SysWOW64\macromd\Want to see a massive horse cock in a tight little teen's pussy.mpg.pif 426f1b268b921018de305365d77c9160_NeikiAnalytics.exe File created C:\Windows\SysWOW64\macromd\Digimon.exe 426f1b268b921018de305365d77c9160_NeikiAnalytics.exe File created C:\Windows\SysWOW64\macromd\divx pro.exe 426f1b268b921018de305365d77c9160_NeikiAnalytics.exe File created C:\Windows\SysWOW64\macromd\AIM Password Stealer.exe 426f1b268b921018de305365d77c9160_NeikiAnalytics.exe File created C:\Windows\SysWOW64\macromd\Another bang bus victim forced rape sex cum.mpg.exe 426f1b268b921018de305365d77c9160_NeikiAnalytics.exe File created C:\Windows\SysWOW64\macromd\crack.exe 426f1b268b921018de305365d77c9160_NeikiAnalytics.exe File created C:\Windows\SysWOW64\macromd\siemens unlocker.exe 426f1b268b921018de305365d77c9160_NeikiAnalytics.exe File created C:\Windows\SysWOW64\macromd\Microsoft Office XP (english) key generator.exe 426f1b268b921018de305365d77c9160_NeikiAnalytics.exe File created C:\Windows\SysWOW64\macromd\Blonde and Japanese girl bukkake.mpg.exe 426f1b268b921018de305365d77c9160_NeikiAnalytics.exe File created C:\Windows\SysWOW64\macromd\password stealer.exe 426f1b268b921018de305365d77c9160_NeikiAnalytics.exe File created C:\Windows\SysWOW64\macromd\Britney Spears Dance Beat.exe 426f1b268b921018de305365d77c9160_NeikiAnalytics.exe File created C:\Windows\SysWOW64\macromd\Bondage Fetish Foot Cum.exe 426f1b268b921018de305365d77c9160_NeikiAnalytics.exe File created C:\Windows\SysWOW64\macromd\fetish bondage preteen porno.mpg.pif 426f1b268b921018de305365d77c9160_NeikiAnalytics.exe File created C:\Windows\SysWOW64\macromd\jenna jameson - shower scene.exe 426f1b268b921018de305365d77c9160_NeikiAnalytics.exe File created C:\Windows\SysWOW64\macromd\aol password cracker.exe 426f1b268b921018de305365d77c9160_NeikiAnalytics.exe File created C:\Windows\SysWOW64\macromd\DivX pro key generator.exe 426f1b268b921018de305365d77c9160_NeikiAnalytics.exe File created C:\Windows\SysWOW64\macromd\16 year old webcam.mpg.exe 426f1b268b921018de305365d77c9160_NeikiAnalytics.exe File created C:\Windows\SysWOW64\macromd\ICQ Hackingtools.exe 426f1b268b921018de305365d77c9160_NeikiAnalytics.exe File created C:\Windows\SysWOW64\macromd\AIM Account Hacker.exe 426f1b268b921018de305365d77c9160_NeikiAnalytics.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
80KB
MD50a1271a26ecaa847270e13fe367637cf
SHA12e7ef311374733a314a9561680de8419a35633df
SHA256887bbaf7896d0634ca9d0ae8bfec936c142295e5ef60315acc74752e3e1305ac
SHA5127caa081057f909af677dfb39a58a306a9e712855d13f2b74566da98ac098cde6b9d9fdfd96f88f05b1b683499859dad510fb3d74a4a50040f8c826bd3b7c3564