Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
30-05-2024 00:55
Static task
static1
Behavioral task
behavioral1
Sample
5d71dc42665df9301364ed4004d292b0_NeikiAnalytics.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
5d71dc42665df9301364ed4004d292b0_NeikiAnalytics.exe
Resource
win10v2004-20240426-en
General
-
Target
5d71dc42665df9301364ed4004d292b0_NeikiAnalytics.exe
-
Size
73KB
-
MD5
5d71dc42665df9301364ed4004d292b0
-
SHA1
94059d7370afdc27199cc843a0b8d0c8c8b7f502
-
SHA256
2a1baeba4dfaf6c521240c2a6c27dae8507ec5ac1937a831554ab5144d06112c
-
SHA512
40cb3d7505cc667c4157634667d0302df27c81ca7ff1b92d3c48fb97bde8741aeffa52377b5a8eb66bb1398ac0ea99a3bee05eaba8f32dc0858690cdc27e3a2e
-
SSDEEP
1536:hbl1c9CzvwFI5D3s1K5QPqfhVWbdsmA+RjPFLC+e5hg0ZGUGf2g:hhSSvWIq1NPqfcxA+HFshgOg
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2692 [email protected] -
Loads dropped DLL 2 IoCs
pid Process 1952 cmd.exe 1952 cmd.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1720 wrote to memory of 1952 1720 5d71dc42665df9301364ed4004d292b0_NeikiAnalytics.exe 29 PID 1720 wrote to memory of 1952 1720 5d71dc42665df9301364ed4004d292b0_NeikiAnalytics.exe 29 PID 1720 wrote to memory of 1952 1720 5d71dc42665df9301364ed4004d292b0_NeikiAnalytics.exe 29 PID 1720 wrote to memory of 1952 1720 5d71dc42665df9301364ed4004d292b0_NeikiAnalytics.exe 29 PID 1952 wrote to memory of 2692 1952 cmd.exe 30 PID 1952 wrote to memory of 2692 1952 cmd.exe 30 PID 1952 wrote to memory of 2692 1952 cmd.exe 30 PID 1952 wrote to memory of 2692 1952 cmd.exe 30 PID 2692 wrote to memory of 2340 2692 [email protected] 31 PID 2692 wrote to memory of 2340 2692 [email protected] 31 PID 2692 wrote to memory of 2340 2692 [email protected] 31 PID 2692 wrote to memory of 2340 2692 [email protected] 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\5d71dc42665df9301364ed4004d292b0_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\5d71dc42665df9301364ed4004d292b0_NeikiAnalytics.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1720 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c [email protected]2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1952 -
C:\Users\Admin\AppData\Local\Temp\[email protected]PID:2692
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c 00.exe4⤵PID:2340
-
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\[email protected]
Filesize73KB
MD564c62ce5ee0a01804ee13143e404cacf
SHA15b09fd8a41f324d41334492638b51d91f7ea08e2
SHA2564faafd4f19891c945c69bd6643f352dfedc76a79a045f89809eb31a194621cb9
SHA51215c3f63469ea648e0095d54253c3201464c91f4e5e38a118b2d77bb7af497a01c294742b7e97e4a0c13f74387c262c4fbc438e9fcabf352dbca3830649a7b68b