Analysis
-
max time kernel
118s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
03-06-2024 13:29
Static task
static1
Behavioral task
behavioral1
Sample
a4fc2b9519492ecd7e73d901f2ef77e0_NeikiAnalytics.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
a4fc2b9519492ecd7e73d901f2ef77e0_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
a4fc2b9519492ecd7e73d901f2ef77e0_NeikiAnalytics.exe
-
Size
1.5MB
-
MD5
a4fc2b9519492ecd7e73d901f2ef77e0
-
SHA1
b5b6302b872e30b62327abbe2ccf7023d027fe2e
-
SHA256
4d39ce6b9300d9d25bfb6e359a608a759f1a1c7a03aa80d36ef07f919dd7e4fb
-
SHA512
20584cb22235d1bf9ad5f57bc04af671910b7f34d1c8dfbee9bc4b9409b94cd6df1b11876af0669b4b32d535ab5d6e0495c32563f27b1b4d62ec2d4596253614
-
SSDEEP
24576:TaxDUeQlylmA+Yd0Qv81mkA0LZmN1DUZmSordfq6Ph2kkkkK4kXkkkkkkkkhLX32:TaxDG791ogZmXYZmSadfqkbazR0vI
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2184 2424.tmp -
Executes dropped EXE 1 IoCs
pid Process 2184 2424.tmp -
Loads dropped DLL 1 IoCs
pid Process 2156 a4fc2b9519492ecd7e73d901f2ef77e0_NeikiAnalytics.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2156 wrote to memory of 2184 2156 a4fc2b9519492ecd7e73d901f2ef77e0_NeikiAnalytics.exe 28 PID 2156 wrote to memory of 2184 2156 a4fc2b9519492ecd7e73d901f2ef77e0_NeikiAnalytics.exe 28 PID 2156 wrote to memory of 2184 2156 a4fc2b9519492ecd7e73d901f2ef77e0_NeikiAnalytics.exe 28 PID 2156 wrote to memory of 2184 2156 a4fc2b9519492ecd7e73d901f2ef77e0_NeikiAnalytics.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\a4fc2b9519492ecd7e73d901f2ef77e0_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\a4fc2b9519492ecd7e73d901f2ef77e0_NeikiAnalytics.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2156 -
C:\Users\Admin\AppData\Local\Temp\2424.tmp"C:\Users\Admin\AppData\Local\Temp\2424.tmp"2⤵
- Deletes itself
- Executes dropped EXE
PID:2184
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.5MB
MD55941bbbfbb2ece3759dc91e32081a7b9
SHA11326b79a8600838219042cabece423a4cf947013
SHA256ddad778cc1a8e44caaaba15d0cacba53b7cf6285019b32b7d8927dd6c9e1d765
SHA512461123c4a00a229cffffd099aa253f28f0197488ce1944d0d115ac0f509664ddd3e5eb74d782b88e29dcc68a8b642e1419b96144248bd6a0fc743dd069f5295a