Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
03-06-2024 21:45
Static task
static1
Behavioral task
behavioral1
Sample
06a2a6fa40d1f299702dfb294c050d10_NeikiAnalytics.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
06a2a6fa40d1f299702dfb294c050d10_NeikiAnalytics.exe
Resource
win10v2004-20240426-en
General
-
Target
06a2a6fa40d1f299702dfb294c050d10_NeikiAnalytics.exe
-
Size
7.0MB
-
MD5
06a2a6fa40d1f299702dfb294c050d10
-
SHA1
4ab5b1accc1ca77f5e0b705af6a6a00588ea9269
-
SHA256
350575504587404ee49f88a7ebfcdc9564c9578424ac0d155cd298e3b66641a7
-
SHA512
f586d83a5f8c34747ecf97486a5fe00e98309abbae20019f35eaf2de1528774917e8d4132e6c919b04af6215803ff44b12f935d13ac67a3303bf197e2b0672c7
-
SSDEEP
98304:emhd1UryezG2MmYh6DMDyt8V7wQqZUha5jtSyZIUbn:elTqWQDc82QbaZtliK
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2292 1526.tmp -
Executes dropped EXE 1 IoCs
pid Process 2292 1526.tmp -
Loads dropped DLL 2 IoCs
pid Process 3020 06a2a6fa40d1f299702dfb294c050d10_NeikiAnalytics.exe 3020 06a2a6fa40d1f299702dfb294c050d10_NeikiAnalytics.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3020 wrote to memory of 2292 3020 06a2a6fa40d1f299702dfb294c050d10_NeikiAnalytics.exe 28 PID 3020 wrote to memory of 2292 3020 06a2a6fa40d1f299702dfb294c050d10_NeikiAnalytics.exe 28 PID 3020 wrote to memory of 2292 3020 06a2a6fa40d1f299702dfb294c050d10_NeikiAnalytics.exe 28 PID 3020 wrote to memory of 2292 3020 06a2a6fa40d1f299702dfb294c050d10_NeikiAnalytics.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\06a2a6fa40d1f299702dfb294c050d10_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\06a2a6fa40d1f299702dfb294c050d10_NeikiAnalytics.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:3020 -
C:\Users\Admin\AppData\Local\Temp\1526.tmp"C:\Users\Admin\AppData\Local\Temp\1526.tmp" --splashC:\Users\Admin\AppData\Local\Temp\06a2a6fa40d1f299702dfb294c050d10_NeikiAnalytics.exe 8C6A45894C08DEBCABBF66D3B7041780987EB8770D26DAE231C559A743E5986B27EE0FAB97361CABF2B384E2563441FC1C5D837E02F4E1C9132E0BCEE58D4FEF2⤵
- Deletes itself
- Executes dropped EXE
PID:2292
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
7.0MB
MD5e657fe1314626833e89c2dc6a3155575
SHA16dbc78a99c5be6a08ab98d8cc912e462cbf82e2d
SHA2561a83b231d3db34b867567ee74d8c0b215ade0a3d36a74818585c4fe1305d64af
SHA5120be792087e35e430ddf97f12ba198a0f55f10942548d70c143b2a77dc00aa4ee9c01658c9aa650b79f20c1e545b24da70fcf9b1f564a74b99719a43011a92ee6