Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
31/05/2024, 23:41
Static task
static1
Behavioral task
behavioral1
Sample
84b163c085d9e8f04cc7bcd51d7f3aa0_NeikiAnalytics.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
84b163c085d9e8f04cc7bcd51d7f3aa0_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
84b163c085d9e8f04cc7bcd51d7f3aa0_NeikiAnalytics.exe
-
Size
79KB
-
MD5
84b163c085d9e8f04cc7bcd51d7f3aa0
-
SHA1
7268a3419ab93f5ccf8b33178e194ba5ac2b14e4
-
SHA256
089a7cbd6bb48846bab194d0f1192b005c808b8f77d916c7b9bd0b20e675d164
-
SHA512
e16963f8f87d1c65ae56cc4ac77162545980297c3115883d14bbb7e72006177becc580f9aa2014451b51434cc2ac906c4152e32ef4a92c801a9ecdccdac5659a
-
SSDEEP
1536:zvoO0/7E2BzTQTFOQA8AkqUhMb2nuy5wgIP0CSJ+5yKB8GMGlZ5G:zvL0/Y2lTQTcGdqU7uy5w9WMyKN5G
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3008 [email protected] -
Loads dropped DLL 2 IoCs
pid Process 2860 cmd.exe 2860 cmd.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1968 wrote to memory of 2860 1968 84b163c085d9e8f04cc7bcd51d7f3aa0_NeikiAnalytics.exe 29 PID 1968 wrote to memory of 2860 1968 84b163c085d9e8f04cc7bcd51d7f3aa0_NeikiAnalytics.exe 29 PID 1968 wrote to memory of 2860 1968 84b163c085d9e8f04cc7bcd51d7f3aa0_NeikiAnalytics.exe 29 PID 1968 wrote to memory of 2860 1968 84b163c085d9e8f04cc7bcd51d7f3aa0_NeikiAnalytics.exe 29 PID 2860 wrote to memory of 3008 2860 cmd.exe 30 PID 2860 wrote to memory of 3008 2860 cmd.exe 30 PID 2860 wrote to memory of 3008 2860 cmd.exe 30 PID 2860 wrote to memory of 3008 2860 cmd.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\84b163c085d9e8f04cc7bcd51d7f3aa0_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\84b163c085d9e8f04cc7bcd51d7f3aa0_NeikiAnalytics.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1968 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c [email protected]2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2860 -
C:\Users\Admin\AppData\Local\Temp\[email protected]PID:3008
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
\Users\Admin\AppData\Local\Temp\[email protected]
Filesize79KB
MD5f0b4b7af4d68ea9b85648eb8dc91e151
SHA10a12083d1ba895cb5f45177ac7e2e9d7a4ffa5cf
SHA256d31df750038ec5666b88f3e5d93f07cf103be76e572eb397d3e1b6397fc98c87
SHA51287399ec9eee4254ceb9e4f17f1ab10bbc0fc502bfa156863c6ddf5332a04bf4915265def8c920fd3dc6875840e7ddea3af833ebd542cd3a86bfa60aba2b5e0be