Analysis
-
max time kernel
119s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
30/05/2024, 21:54
Static task
static1
Behavioral task
behavioral1
Sample
69d8a1a14d2ba67c2f2a3ec6f6262a30_NeikiAnalytics.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
69d8a1a14d2ba67c2f2a3ec6f6262a30_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
69d8a1a14d2ba67c2f2a3ec6f6262a30_NeikiAnalytics.exe
-
Size
448KB
-
MD5
69d8a1a14d2ba67c2f2a3ec6f6262a30
-
SHA1
ed211aed940c03a25fe2ee0a9cd2d86d028f51f8
-
SHA256
9083ed7c96416b50d46e8cdcd62dab82105bbb3337f800f8ed0aba9fc63fc433
-
SHA512
58a8a4ed790bcf0f30f373dff0e2231aaadca5cf833a55eb1ba70671a17d9f504a3a36bfc61b58b2e1e556959accb7d56dac40989b57eccaaa0aa20acbaa2934
-
SSDEEP
6144:1/pym9+onoPnxUGpcNUHobiW0fXMwCyGH6Y660W7cyqCxSngmMBqfycuPbUl0i5m:uPxUtWV/bCyfi0npM4dl0v5JdmA
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2248 69d8a1a14d2ba67c2f2a3ec6f6262a30_NeikiAnalytics.exe -
Executes dropped EXE 1 IoCs
pid Process 2248 69d8a1a14d2ba67c2f2a3ec6f6262a30_NeikiAnalytics.exe -
Loads dropped DLL 1 IoCs
pid Process 2812 69d8a1a14d2ba67c2f2a3ec6f6262a30_NeikiAnalytics.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2248 69d8a1a14d2ba67c2f2a3ec6f6262a30_NeikiAnalytics.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2812 69d8a1a14d2ba67c2f2a3ec6f6262a30_NeikiAnalytics.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 2248 69d8a1a14d2ba67c2f2a3ec6f6262a30_NeikiAnalytics.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2812 wrote to memory of 2248 2812 69d8a1a14d2ba67c2f2a3ec6f6262a30_NeikiAnalytics.exe 28 PID 2812 wrote to memory of 2248 2812 69d8a1a14d2ba67c2f2a3ec6f6262a30_NeikiAnalytics.exe 28 PID 2812 wrote to memory of 2248 2812 69d8a1a14d2ba67c2f2a3ec6f6262a30_NeikiAnalytics.exe 28 PID 2812 wrote to memory of 2248 2812 69d8a1a14d2ba67c2f2a3ec6f6262a30_NeikiAnalytics.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\69d8a1a14d2ba67c2f2a3ec6f6262a30_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\69d8a1a14d2ba67c2f2a3ec6f6262a30_NeikiAnalytics.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:2812 -
C:\Users\Admin\AppData\Local\Temp\69d8a1a14d2ba67c2f2a3ec6f6262a30_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\69d8a1a14d2ba67c2f2a3ec6f6262a30_NeikiAnalytics.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of UnmapMainImage
PID:2248
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
448KB
MD52005f986ba47aec55b2a936d437f485b
SHA1467ec906e64b228dbbb9df62d4db177e5fd4c86d
SHA256264fbd51b17574fb09b6c7c1907bd685d8cb960a302b6801d803432a11e6afcb
SHA512a25e9f7891c2656ddc295b1dc390eca2c0565f31fcee9145ef9b34a9e996e7e2ceb9307ea6c306ce5c504002d246692195a77628ba6ec98fe67f2538b9e9a6b1