Analysis

  • max time kernel
    117s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240215-en
  • resource tags

    arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system
  • submitted
    30-05-2024 05:21

General

  • Target

    6633752b078d5d1218f149b82b3a6e20_NeikiAnalytics.exe

  • Size

    79KB

  • MD5

    6633752b078d5d1218f149b82b3a6e20

  • SHA1

    18acf8d8f09ad76f9b5907be32fe65d4244eae01

  • SHA256

    7795a312c753fb3d9f4edaa503c056c3a86dc0bb48de169250bce8e72828d581

  • SHA512

    6a496089fd67334a0ffec0b0a17dde767ddfec84356ae387923c1e2dc8b57afaae649048372c24a617b169e3a237129ab1f32f652adcb2f586c74659d6bfb56e

  • SSDEEP

    1536:zvSPRRRf384f0+zOQA8AkqUhMb2nuy5wgIP0CSJ+5yLB8GMGlZ5G:zv0RRRfZfQGdqU7uy5w9WMyLN5G

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6633752b078d5d1218f149b82b3a6e20_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\6633752b078d5d1218f149b82b3a6e20_NeikiAnalytics.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2416

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\[email protected]

    Filesize

    79KB

    MD5

    fc0f142e3a6929bfc91eb8a3d641ffea

    SHA1

    be230eb7db3fa10f47643102d1939d32c5d8bedf

    SHA256

    0f05974fe03dfd4312cd49063d7c8e2b31a694cf0428b8c5dde46756a9db5d39

    SHA512

    bf9406749aeee02d5753a9f4d0167d399cf48fcdb14bdeb7d711a7210d96e95391116cd6b902fd7fc0a5f3dffe70bf0664e1b1f9b3a94374e3f4256ce87f5e30

  • memory/2216-7-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/2416-8-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB