Analysis
-
max time kernel
118s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
03-06-2024 05:14
Static task
static1
Behavioral task
behavioral1
Sample
9cada12cd5ba821592a6088539070a40_NeikiAnalytics.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
9cada12cd5ba821592a6088539070a40_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
9cada12cd5ba821592a6088539070a40_NeikiAnalytics.exe
-
Size
7.0MB
-
MD5
9cada12cd5ba821592a6088539070a40
-
SHA1
4eb11e3e967c73fd7cadd8ba71f7ac17026d7945
-
SHA256
2677b46b30e4ac7ee199d0016d395e840b68fff4723327c98ffbfde18c87157e
-
SHA512
5bd20a2c656d0e04065e6a7e9ad8dc1fa8e56228e496f6070b4caba8d8af711c37cb487e08c09778f64f345cc4d38820017f0dc8e397c03030ab0243574e4870
-
SSDEEP
98304:emhd1UryeglZMEJb3NV7wQqZUha5jtSyZIUbn:elTEl3N2QbaZtliK
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3028 2359.tmp -
Executes dropped EXE 1 IoCs
pid Process 3028 2359.tmp -
Loads dropped DLL 2 IoCs
pid Process 2944 9cada12cd5ba821592a6088539070a40_NeikiAnalytics.exe 2944 9cada12cd5ba821592a6088539070a40_NeikiAnalytics.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2944 wrote to memory of 3028 2944 9cada12cd5ba821592a6088539070a40_NeikiAnalytics.exe 28 PID 2944 wrote to memory of 3028 2944 9cada12cd5ba821592a6088539070a40_NeikiAnalytics.exe 28 PID 2944 wrote to memory of 3028 2944 9cada12cd5ba821592a6088539070a40_NeikiAnalytics.exe 28 PID 2944 wrote to memory of 3028 2944 9cada12cd5ba821592a6088539070a40_NeikiAnalytics.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\9cada12cd5ba821592a6088539070a40_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\9cada12cd5ba821592a6088539070a40_NeikiAnalytics.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2944 -
C:\Users\Admin\AppData\Local\Temp\2359.tmp"C:\Users\Admin\AppData\Local\Temp\2359.tmp" --splashC:\Users\Admin\AppData\Local\Temp\9cada12cd5ba821592a6088539070a40_NeikiAnalytics.exe 28161EE631271A9FC0C6BBE69916844C771D3CA31378197920656779F058C73CAE889A441E559BCF955B64630470EB297C25122E1606BFF1FF35E516B2E7A0122⤵
- Deletes itself
- Executes dropped EXE
PID:3028
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
7.0MB
MD5596800f207990a241d1a408e0385f665
SHA161c877553998c28a42a899dc87680c105f183014
SHA256dc7bb90e1bb27b2cd7cce27243a9bf04f3fd1d279387ad96e52a134f761298a0
SHA512c7c54223c1bb9b7a3c8aa7eb0b41045a3d04dcc5a83424019397df56a25bf20f442c2eb0820b78f53f149bec4aa0493ae664621e2dc39d524e80e6b836f3c720