Analysis
-
max time kernel
93s -
max time network
123s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
30/05/2024, 00:55
Static task
static1
Behavioral task
behavioral1
Sample
5d71dc42665df9301364ed4004d292b0_NeikiAnalytics.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
5d71dc42665df9301364ed4004d292b0_NeikiAnalytics.exe
Resource
win10v2004-20240426-en
General
-
Target
5d71dc42665df9301364ed4004d292b0_NeikiAnalytics.exe
-
Size
73KB
-
MD5
5d71dc42665df9301364ed4004d292b0
-
SHA1
94059d7370afdc27199cc843a0b8d0c8c8b7f502
-
SHA256
2a1baeba4dfaf6c521240c2a6c27dae8507ec5ac1937a831554ab5144d06112c
-
SHA512
40cb3d7505cc667c4157634667d0302df27c81ca7ff1b92d3c48fb97bde8741aeffa52377b5a8eb66bb1398ac0ea99a3bee05eaba8f32dc0858690cdc27e3a2e
-
SSDEEP
1536:hbl1c9CzvwFI5D3s1K5QPqfhVWbdsmA+RjPFLC+e5hg0ZGUGf2g:hhSSvWIq1NPqfcxA+HFshgOg
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1112 [email protected] -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4948 wrote to memory of 4788 4948 5d71dc42665df9301364ed4004d292b0_NeikiAnalytics.exe 82 PID 4948 wrote to memory of 4788 4948 5d71dc42665df9301364ed4004d292b0_NeikiAnalytics.exe 82 PID 4948 wrote to memory of 4788 4948 5d71dc42665df9301364ed4004d292b0_NeikiAnalytics.exe 82 PID 4788 wrote to memory of 1112 4788 cmd.exe 83 PID 4788 wrote to memory of 1112 4788 cmd.exe 83 PID 4788 wrote to memory of 1112 4788 cmd.exe 83 PID 1112 wrote to memory of 4104 1112 [email protected] 84 PID 1112 wrote to memory of 4104 1112 [email protected] 84 PID 1112 wrote to memory of 4104 1112 [email protected] 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\5d71dc42665df9301364ed4004d292b0_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\5d71dc42665df9301364ed4004d292b0_NeikiAnalytics.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4948 -
C:\Windows\SysWOW64\cmd.exePID:4788
-
C:\Users\Admin\AppData\Local\Temp\[email protected]PID:1112
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c 00.exe4⤵PID:4104
-
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\[email protected]
Filesize73KB
MD564c62ce5ee0a01804ee13143e404cacf
SHA15b09fd8a41f324d41334492638b51d91f7ea08e2
SHA2564faafd4f19891c945c69bd6643f352dfedc76a79a045f89809eb31a194621cb9
SHA51215c3f63469ea648e0095d54253c3201464c91f4e5e38a118b2d77bb7af497a01c294742b7e97e4a0c13f74387c262c4fbc438e9fcabf352dbca3830649a7b68b
-
Filesize
2KB
MD57b621943a35e7f39cf89f50cc48d7b94
SHA12858a28cf60f38025fffcd0ba2ecfec8511c197d
SHA256bef04c2f89dc115ce2763558933dba1767bf30cda6856d335ae68955923f9991
SHA5124169e664ad4e7e6891a05ceed78465e0ec44879b37fc0de97c014945e10c161f6bfb040efc24edc136e69bb115b2a1327b04cefb58141f712da856129872e8f1