Analysis
-
max time kernel
120s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
30/05/2024, 05:16
Static task
static1
Behavioral task
behavioral1
Sample
6609b48e40b938cc61a5b451efc4eec0_NeikiAnalytics.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
6609b48e40b938cc61a5b451efc4eec0_NeikiAnalytics.exe
Resource
win10v2004-20240426-en
General
-
Target
6609b48e40b938cc61a5b451efc4eec0_NeikiAnalytics.exe
-
Size
184KB
-
MD5
6609b48e40b938cc61a5b451efc4eec0
-
SHA1
880180e181e168825490aaa315ed1e70e5f631b5
-
SHA256
da012a5563dd239bc5b8547917a0bbf268ac5d70c9fe950284586fa86ff28542
-
SHA512
8387a9b63ebeabc31f0a8d0b352783926a424c7eebce9ed43e21022dc5ff6822934617516c893d9a9d146bc6ad1233f3ed29ab9c95927bf58bd9d9d0ed12e10c
-
SSDEEP
3072:ByqypxoThHOtdttWe4iLRcs6hlzViF7n3:Byvos7ttFLCs6hlzViF7
Malware Config
Signatures
-
Executes dropped EXE 4 IoCs
pid Process 1048 Unicorn-656.exe 2708 Unicorn-63570.exe 2536 Unicorn-28288.exe 3036 Unicorn-1064.exe -
Loads dropped DLL 35 IoCs
pid Process 2480 6609b48e40b938cc61a5b451efc4eec0_NeikiAnalytics.exe 2480 6609b48e40b938cc61a5b451efc4eec0_NeikiAnalytics.exe 1048 Unicorn-656.exe 1048 Unicorn-656.exe 2920 WerFault.exe 2920 WerFault.exe 2920 WerFault.exe 2920 WerFault.exe 2920 WerFault.exe 2920 WerFault.exe 2920 WerFault.exe 2920 WerFault.exe 2920 WerFault.exe 2708 Unicorn-63570.exe 2708 Unicorn-63570.exe 2624 WerFault.exe 2624 WerFault.exe 2624 WerFault.exe 2624 WerFault.exe 2624 WerFault.exe 2624 WerFault.exe 2624 WerFault.exe 2624 WerFault.exe 2624 WerFault.exe 2536 Unicorn-28288.exe 2536 Unicorn-28288.exe 2528 WerFault.exe 2528 WerFault.exe 2528 WerFault.exe 2528 WerFault.exe 2528 WerFault.exe 2528 WerFault.exe 2528 WerFault.exe 2528 WerFault.exe 2528 WerFault.exe -
Program crash 4 IoCs
pid pid_target Process procid_target 2252 2480 WerFault.exe 27 2920 1048 WerFault.exe 28 2624 2708 WerFault.exe 30 2528 2536 WerFault.exe 32 -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2480 6609b48e40b938cc61a5b451efc4eec0_NeikiAnalytics.exe 1048 Unicorn-656.exe 2708 Unicorn-63570.exe 2536 Unicorn-28288.exe -
Suspicious use of WriteProcessMemory 32 IoCs
description pid Process procid_target PID 2480 wrote to memory of 1048 2480 6609b48e40b938cc61a5b451efc4eec0_NeikiAnalytics.exe 28 PID 2480 wrote to memory of 1048 2480 6609b48e40b938cc61a5b451efc4eec0_NeikiAnalytics.exe 28 PID 2480 wrote to memory of 1048 2480 6609b48e40b938cc61a5b451efc4eec0_NeikiAnalytics.exe 28 PID 2480 wrote to memory of 1048 2480 6609b48e40b938cc61a5b451efc4eec0_NeikiAnalytics.exe 28 PID 2480 wrote to memory of 2252 2480 6609b48e40b938cc61a5b451efc4eec0_NeikiAnalytics.exe 29 PID 2480 wrote to memory of 2252 2480 6609b48e40b938cc61a5b451efc4eec0_NeikiAnalytics.exe 29 PID 2480 wrote to memory of 2252 2480 6609b48e40b938cc61a5b451efc4eec0_NeikiAnalytics.exe 29 PID 2480 wrote to memory of 2252 2480 6609b48e40b938cc61a5b451efc4eec0_NeikiAnalytics.exe 29 PID 1048 wrote to memory of 2708 1048 Unicorn-656.exe 30 PID 1048 wrote to memory of 2708 1048 Unicorn-656.exe 30 PID 1048 wrote to memory of 2708 1048 Unicorn-656.exe 30 PID 1048 wrote to memory of 2708 1048 Unicorn-656.exe 30 PID 1048 wrote to memory of 2920 1048 Unicorn-656.exe 31 PID 1048 wrote to memory of 2920 1048 Unicorn-656.exe 31 PID 1048 wrote to memory of 2920 1048 Unicorn-656.exe 31 PID 1048 wrote to memory of 2920 1048 Unicorn-656.exe 31 PID 2708 wrote to memory of 2536 2708 Unicorn-63570.exe 32 PID 2708 wrote to memory of 2536 2708 Unicorn-63570.exe 32 PID 2708 wrote to memory of 2536 2708 Unicorn-63570.exe 32 PID 2708 wrote to memory of 2536 2708 Unicorn-63570.exe 32 PID 2708 wrote to memory of 2624 2708 Unicorn-63570.exe 33 PID 2708 wrote to memory of 2624 2708 Unicorn-63570.exe 33 PID 2708 wrote to memory of 2624 2708 Unicorn-63570.exe 33 PID 2708 wrote to memory of 2624 2708 Unicorn-63570.exe 33 PID 2536 wrote to memory of 3036 2536 Unicorn-28288.exe 34 PID 2536 wrote to memory of 3036 2536 Unicorn-28288.exe 34 PID 2536 wrote to memory of 3036 2536 Unicorn-28288.exe 34 PID 2536 wrote to memory of 3036 2536 Unicorn-28288.exe 34 PID 2536 wrote to memory of 2528 2536 Unicorn-28288.exe 35 PID 2536 wrote to memory of 2528 2536 Unicorn-28288.exe 35 PID 2536 wrote to memory of 2528 2536 Unicorn-28288.exe 35 PID 2536 wrote to memory of 2528 2536 Unicorn-28288.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\6609b48e40b938cc61a5b451efc4eec0_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\6609b48e40b938cc61a5b451efc4eec0_NeikiAnalytics.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2480 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-656.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-656.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1048 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-63570.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-63570.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2708 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-28288.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-28288.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2536 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-1064.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-1064.exe5⤵
- Executes dropped EXE
PID:3036
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2536 -s 2365⤵
- Loads dropped DLL
- Program crash
PID:2528
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2708 -s 2364⤵
- Loads dropped DLL
- Program crash
PID:2624
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1048 -s 2363⤵
- Loads dropped DLL
- Program crash
PID:2920
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2480 -s 2362⤵
- Program crash
PID:2252
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
184KB
MD56ff70650bfc6817a0bf55d60c95cdedc
SHA16930a0a68995108cc5fe8a1834dd1612f7366990
SHA256a3c1f79ed7ec5a931622a14904f50b59117386e7fa944eec738022337b1db62c
SHA5128169e457e8a12c4a6fcb9acf8ad5cc5d3efd3f17dde8f2263beaa839c275cb58c6a8e994948d1f25856c1d873141de23238aa2dac8656c1bdb36bdaff066104e
-
Filesize
184KB
MD5ab18c550a366c6929f5e476ab98405aa
SHA19c74a1c0d1aa1ef5b31fbb3a87c3487195f2edd6
SHA25602b433c4ef6998a8a601cfcbfdabc32642eeb4a50645987165a4ea5801714602
SHA512f87dd9c3fab7354a4e672c56a52be6d84b26eee94a06d30ebe2985fae963c53cb6de5414a41cfb356f05e9fe85fa73d8a4900ebb4eb1fc9733f39b183ffe0ba3
-
Filesize
184KB
MD5331a723aaff6af6ce80236cb0ec3fdeb
SHA13becee1340c592a767517367b67b39c2dc22094e
SHA2561429dc9c4479741cf9903b99fd66e711add09b435c46233d194ae0a04901354c
SHA512bf80239c083498ddd2689ec88029c710e26946f15facc5b74bfed768ff4a8212c7eca0976a4ea9539afbad9a59f6ddaef55c1c03d35e86ba512845cb9ab4e4f7
-
Filesize
184KB
MD51b23dcffc59490c26591a4857a507256
SHA1f87b6ff44668ea82963d238602aedab02970d264
SHA2566cdb85f3fb2554ce22d58b00aeb27b5f53d261b8ff98c6ab6d76cb6958342e8d
SHA512f34a681ab8dd307b658cfef439e61a8905e8d07a69d7688ad56f407c289ab5f2d8f3cf1f7e6c82d2336ad91b6355a1d81620f5e96baf93094ce513e8deaee9d9