Analysis
-
max time kernel
119s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
02/06/2024, 22:45
Static task
static1
Behavioral task
behavioral1
Sample
7a2aae5d2c97fdcbb07dba27f65b9500_NeikiAnalytics.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
7a2aae5d2c97fdcbb07dba27f65b9500_NeikiAnalytics.exe
Resource
win10v2004-20240426-en
General
-
Target
7a2aae5d2c97fdcbb07dba27f65b9500_NeikiAnalytics.exe
-
Size
448KB
-
MD5
7a2aae5d2c97fdcbb07dba27f65b9500
-
SHA1
363bf3be6301cb5cf84cc64ab4934889352b66af
-
SHA256
5f31eb41b89bd80f44590b179f5bb6eb46686afdfa31cdf0edfb5036d94b3ab3
-
SHA512
51b3d9b8a8c912b7c39ed545a12782b7e61138b847f75ae9856bbbd1bca2d1b9096c9ef42cfc5d5b264b1463a35c4e6cba1eab25bf49a6bae18a179977f0b568
-
SSDEEP
6144:X/RaEzt93AkUZOiGJXFG0cWhV40saiigCD4H2cHwXWNzDw:X/htVjVDcWhVQ5zCD4TyWN4
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1420 7a2aae5d2c97fdcbb07dba27f65b9500_NeikiAnalytics.exe -
Executes dropped EXE 1 IoCs
pid Process 1420 7a2aae5d2c97fdcbb07dba27f65b9500_NeikiAnalytics.exe -
Loads dropped DLL 1 IoCs
pid Process 2416 7a2aae5d2c97fdcbb07dba27f65b9500_NeikiAnalytics.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2416 7a2aae5d2c97fdcbb07dba27f65b9500_NeikiAnalytics.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 1420 7a2aae5d2c97fdcbb07dba27f65b9500_NeikiAnalytics.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2416 wrote to memory of 1420 2416 7a2aae5d2c97fdcbb07dba27f65b9500_NeikiAnalytics.exe 29 PID 2416 wrote to memory of 1420 2416 7a2aae5d2c97fdcbb07dba27f65b9500_NeikiAnalytics.exe 29 PID 2416 wrote to memory of 1420 2416 7a2aae5d2c97fdcbb07dba27f65b9500_NeikiAnalytics.exe 29 PID 2416 wrote to memory of 1420 2416 7a2aae5d2c97fdcbb07dba27f65b9500_NeikiAnalytics.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\7a2aae5d2c97fdcbb07dba27f65b9500_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\7a2aae5d2c97fdcbb07dba27f65b9500_NeikiAnalytics.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:2416 -
C:\Users\Admin\AppData\Local\Temp\7a2aae5d2c97fdcbb07dba27f65b9500_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\7a2aae5d2c97fdcbb07dba27f65b9500_NeikiAnalytics.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:1420
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
448KB
MD5d1d4e7b1cb7da4042baca7caba1275ce
SHA1d868e9ad4d23e56077228dcbad828b2944a76cfb
SHA25620b04b0837bf4b4753e18c00151cb67785410a89e20216aa928814523d20f7b9
SHA5127727c420bbf7e1adaa10336224444bce2352bf5b7b6055b3e386a6065d4eb68f5c3e068ad731c4ffd42c33105d6512121dd5fffe0fcc7f1439ab9705fafdc082