Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
30/05/2024, 09:43
Static task
static1
Behavioral task
behavioral1
Sample
c11f71e7b9b3690bfe225f1137144620_NeikiAnalytics.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
c11f71e7b9b3690bfe225f1137144620_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
c11f71e7b9b3690bfe225f1137144620_NeikiAnalytics.exe
-
Size
65KB
-
MD5
c11f71e7b9b3690bfe225f1137144620
-
SHA1
5a382756be9e4cea4276478be6b6eb87762ea67c
-
SHA256
aee8ce7978d4f39b6ec71c0c68ea4a510a9824e1c448f2fa0d3772394bce7575
-
SHA512
4270fb2850de82f51e8d50d1f78afadaa3812409a548ccbbe59f28e609a6eb2b5ed73ba046cdd9b6f43e6bb842260ab3c0a2414d1476f2184f0b7e8cf8b5edce
-
SSDEEP
1536:o1KhxqwtdgI2MyzNORQtOflIwoHNV2XBFV72BOlA7ZszsbKY1x/9lfL+gniDSAa6:aq7tdgI2MyzNORQtOflIwoHNV2XBFV7d
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2316 hurok.exe -
Loads dropped DLL 1 IoCs
pid Process 1860 c11f71e7b9b3690bfe225f1137144620_NeikiAnalytics.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1860 c11f71e7b9b3690bfe225f1137144620_NeikiAnalytics.exe 2316 hurok.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1860 wrote to memory of 2316 1860 c11f71e7b9b3690bfe225f1137144620_NeikiAnalytics.exe 28 PID 1860 wrote to memory of 2316 1860 c11f71e7b9b3690bfe225f1137144620_NeikiAnalytics.exe 28 PID 1860 wrote to memory of 2316 1860 c11f71e7b9b3690bfe225f1137144620_NeikiAnalytics.exe 28 PID 1860 wrote to memory of 2316 1860 c11f71e7b9b3690bfe225f1137144620_NeikiAnalytics.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\c11f71e7b9b3690bfe225f1137144620_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\c11f71e7b9b3690bfe225f1137144620_NeikiAnalytics.exe"1⤵
- Loads dropped DLL
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1860 -
C:\Users\Admin\AppData\Local\Temp\hurok.exe"C:\Users\Admin\AppData\Local\Temp\hurok.exe"2⤵
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2316
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
65KB
MD52f44e2fb1e9cc67d22b388f25530d42c
SHA1b07174631cd95f85faa94c68c3daa7559011dd3e
SHA256565f78dedcdce2c11350028331fd5604ae77f0687e46689f860c914ffcbbc128
SHA512e50bdd32443487c72b52303b48c0a624fe75b29fe54cf48ad7fa4b592dc6f5eb2fb059f780c558f3ebee3238ba5ab662d4fc9e635004bda5387bd79b521101dd