Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
01-06-2024 07:47
Static task
static1
Behavioral task
behavioral1
Sample
932cf8bebd0eaabbc02c7e2c7efba950_NeikiAnalytics.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
932cf8bebd0eaabbc02c7e2c7efba950_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
932cf8bebd0eaabbc02c7e2c7efba950_NeikiAnalytics.exe
-
Size
79KB
-
MD5
932cf8bebd0eaabbc02c7e2c7efba950
-
SHA1
b03ea42c6c84d78b761ee7a62e4c452141e74ca7
-
SHA256
8a1fdcb987c5270d77297ac90ae35f5ccd7880f2a6927730368f9c87293b8471
-
SHA512
48a2853a7950e58ed65c39898ab2bf889b0bd7f57a9e601a0f018808d89098033c1f392bd15c51b63bed1aa4f9e596cab382855339445e34eaa15bb80047c7b6
-
SSDEEP
1536:zvgcqudelDbTwHikBOQA8AkqUhMb2nuy5wgIP0CSJ+5y7B8GMGlZ5G:zvgjlbTwHikwGdqU7uy5w9WMy7N5G
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2220 [email protected] -
Loads dropped DLL 2 IoCs
pid Process 2132 cmd.exe 2132 cmd.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2288 wrote to memory of 2132 2288 932cf8bebd0eaabbc02c7e2c7efba950_NeikiAnalytics.exe 29 PID 2288 wrote to memory of 2132 2288 932cf8bebd0eaabbc02c7e2c7efba950_NeikiAnalytics.exe 29 PID 2288 wrote to memory of 2132 2288 932cf8bebd0eaabbc02c7e2c7efba950_NeikiAnalytics.exe 29 PID 2288 wrote to memory of 2132 2288 932cf8bebd0eaabbc02c7e2c7efba950_NeikiAnalytics.exe 29 PID 2132 wrote to memory of 2220 2132 cmd.exe 30 PID 2132 wrote to memory of 2220 2132 cmd.exe 30 PID 2132 wrote to memory of 2220 2132 cmd.exe 30 PID 2132 wrote to memory of 2220 2132 cmd.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\932cf8bebd0eaabbc02c7e2c7efba950_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\932cf8bebd0eaabbc02c7e2c7efba950_NeikiAnalytics.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2288 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c [email protected]2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2132 -
C:\Users\Admin\AppData\Local\Temp\[email protected]PID:2220
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
\Users\Admin\AppData\Local\Temp\[email protected]
Filesize79KB
MD50feb9163f072d9fc9d9b48eb3f1b017b
SHA15814387a91f516b7fa07a1cbd986d7c54ae8c1dd
SHA2567f56507e2642c0c265554de87aebf3d440c9503dc6715bfbb09e289a9bf4a09e
SHA512cd0c519c7b62c1c135863f70708c8f3d41dd6bb0f9b5ac7efd199986b0d2c344cb9997ec22368120aedbf820b4ce83a5779a7e11e886d8850e423fed5171bf19