Analysis
-
max time kernel
149s -
max time network
154s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
31/05/2024, 23:12
Static task
static1
Behavioral task
behavioral1
Sample
83b585ba6f451b5920456d48a3152260_NeikiAnalytics.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
83b585ba6f451b5920456d48a3152260_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
83b585ba6f451b5920456d48a3152260_NeikiAnalytics.exe
-
Size
5KB
-
MD5
83b585ba6f451b5920456d48a3152260
-
SHA1
d89f84c7382a54a359031b57e059f59badea1811
-
SHA256
5fedf92d75c078809153831be8b6f24fd0468aa39c2e74361f89f0fb398cedde
-
SHA512
fb496516f3fa7224181720644b9b2b769c79f87956e1cb5194ab37e8aa16bc4cbcf6a931978f47f61a37b6341f1128afb821ec2dcd4b6201ffd190d3d36a4d40
-
SSDEEP
48:qa8xVL+AmcRB/G9UQ4mBgaaXx1rsHB/VnC/RAxUR2CS70ALNx:KLnRLXQ5VahuHnnwR2UR2ClAhx
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2476 budha.exe -
Executes dropped EXE 1 IoCs
pid Process 2476 budha.exe -
Loads dropped DLL 2 IoCs
pid Process 2240 83b585ba6f451b5920456d48a3152260_NeikiAnalytics.exe 2240 83b585ba6f451b5920456d48a3152260_NeikiAnalytics.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2240 wrote to memory of 2476 2240 83b585ba6f451b5920456d48a3152260_NeikiAnalytics.exe 28 PID 2240 wrote to memory of 2476 2240 83b585ba6f451b5920456d48a3152260_NeikiAnalytics.exe 28 PID 2240 wrote to memory of 2476 2240 83b585ba6f451b5920456d48a3152260_NeikiAnalytics.exe 28 PID 2240 wrote to memory of 2476 2240 83b585ba6f451b5920456d48a3152260_NeikiAnalytics.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\83b585ba6f451b5920456d48a3152260_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\83b585ba6f451b5920456d48a3152260_NeikiAnalytics.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2240 -
C:\Users\Admin\AppData\Local\Temp\budha.exe"C:\Users\Admin\AppData\Local\Temp\budha.exe"2⤵
- Deletes itself
- Executes dropped EXE
PID:2476
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5KB
MD566ba8c9d407b92c4c146d213e1fe7281
SHA14578139d3361847c9b111bf28e84f143baf02d0c
SHA2568e1747d67c2815d0ff1c48506cbb41e4d4250bd416fe14c170c03a52d014ef3a
SHA512e055bee6b98749d6ffce06005b4d5b88bbe5d7dd0cc6f34ad0cac0f16579e8a24609261107c3c8041b1edf43a9238e9d291e132d995719e98a93804a9aa21f45