Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
30-05-2024 05:21
Static task
static1
Behavioral task
behavioral1
Sample
6633752b078d5d1218f149b82b3a6e20_NeikiAnalytics.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
6633752b078d5d1218f149b82b3a6e20_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
6633752b078d5d1218f149b82b3a6e20_NeikiAnalytics.exe
-
Size
79KB
-
MD5
6633752b078d5d1218f149b82b3a6e20
-
SHA1
18acf8d8f09ad76f9b5907be32fe65d4244eae01
-
SHA256
7795a312c753fb3d9f4edaa503c056c3a86dc0bb48de169250bce8e72828d581
-
SHA512
6a496089fd67334a0ffec0b0a17dde767ddfec84356ae387923c1e2dc8b57afaae649048372c24a617b169e3a237129ab1f32f652adcb2f586c74659d6bfb56e
-
SSDEEP
1536:zvSPRRRf384f0+zOQA8AkqUhMb2nuy5wgIP0CSJ+5yLB8GMGlZ5G:zv0RRRfZfQGdqU7uy5w9WMyLN5G
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2216 [email protected] -
Loads dropped DLL 2 IoCs
pid Process 2296 cmd.exe 2296 cmd.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2416 wrote to memory of 2296 2416 6633752b078d5d1218f149b82b3a6e20_NeikiAnalytics.exe 29 PID 2416 wrote to memory of 2296 2416 6633752b078d5d1218f149b82b3a6e20_NeikiAnalytics.exe 29 PID 2416 wrote to memory of 2296 2416 6633752b078d5d1218f149b82b3a6e20_NeikiAnalytics.exe 29 PID 2416 wrote to memory of 2296 2416 6633752b078d5d1218f149b82b3a6e20_NeikiAnalytics.exe 29 PID 2296 wrote to memory of 2216 2296 cmd.exe 30 PID 2296 wrote to memory of 2216 2296 cmd.exe 30 PID 2296 wrote to memory of 2216 2296 cmd.exe 30 PID 2296 wrote to memory of 2216 2296 cmd.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\6633752b078d5d1218f149b82b3a6e20_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\6633752b078d5d1218f149b82b3a6e20_NeikiAnalytics.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2416 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c [email protected]2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2296 -
C:\Users\Admin\AppData\Local\Temp\[email protected]PID:2216
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\[email protected]
Filesize79KB
MD5fc0f142e3a6929bfc91eb8a3d641ffea
SHA1be230eb7db3fa10f47643102d1939d32c5d8bedf
SHA2560f05974fe03dfd4312cd49063d7c8e2b31a694cf0428b8c5dde46756a9db5d39
SHA512bf9406749aeee02d5753a9f4d0167d399cf48fcdb14bdeb7d711a7210d96e95391116cd6b902fd7fc0a5f3dffe70bf0664e1b1f9b3a94374e3f4256ce87f5e30