Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
05/06/2024, 01:55
Static task
static1
Behavioral task
behavioral1
Sample
28b69e2a4eee2c64364e76325cc66810_NeikiAnalytics.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
28b69e2a4eee2c64364e76325cc66810_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
28b69e2a4eee2c64364e76325cc66810_NeikiAnalytics.exe
-
Size
178KB
-
MD5
28b69e2a4eee2c64364e76325cc66810
-
SHA1
71a317927b301a10dda2fb04073f8803cd9c1859
-
SHA256
32059364835f9a515044506d3cb6b93d789ffcfe9ab23f06a5f3f3fb5b24efef
-
SHA512
70197657c18a23e9a64e701cc5c87c39454f8dbf83608ebde768e34e5410b125ac75fc959137c9721a107311de5590b86fa1e15f060b31b85c92cc23ecdeaa6d
-
SSDEEP
3072:+nOn7t7XpdpCCTg/sxFgJzAG7u+C731AeNEPjpjQ8S9ros5TNeZGdBuB2M3RAzBe:+KpdcCrT4AGe73tNqjtQpn3uB20RAlZ8
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2924 northstar.exe -
Loads dropped DLL 2 IoCs
pid Process 2884 28b69e2a4eee2c64364e76325cc66810_NeikiAnalytics.exe 2884 28b69e2a4eee2c64364e76325cc66810_NeikiAnalytics.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2924 northstar.exe 2924 northstar.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2884 wrote to memory of 2924 2884 28b69e2a4eee2c64364e76325cc66810_NeikiAnalytics.exe 28 PID 2884 wrote to memory of 2924 2884 28b69e2a4eee2c64364e76325cc66810_NeikiAnalytics.exe 28 PID 2884 wrote to memory of 2924 2884 28b69e2a4eee2c64364e76325cc66810_NeikiAnalytics.exe 28 PID 2884 wrote to memory of 2924 2884 28b69e2a4eee2c64364e76325cc66810_NeikiAnalytics.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\28b69e2a4eee2c64364e76325cc66810_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\28b69e2a4eee2c64364e76325cc66810_NeikiAnalytics.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2884 -
C:\Users\Admin\AppData\Local\Temp\nsd1067.tmp\northstar.exeC:\Users\Admin\AppData\Local\Temp\nsd1067.tmp\northstar.exe /dT201303201513 /u4dc90721-0888-4db0-a2e5-20545bc06f26 /e28423222⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2924
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
10KB
MD520ee82203544c4f831a7dc1650e7ec51
SHA1671affb8e32f06777483782197173af254e02548
SHA25669a00c14562ea5a71f6196b307292fa6d8b1a2fc02368020f40c84b3b0a1a83a
SHA5124dabcc0cfebb36cfe57fa05777224f45c04c84031cfecf4184bd95d2b148ce18a6c91655320e69c1709e740a261e1e25effc8395fed91d0fc61b18f9a9f7685f
-
Filesize
257KB
MD5a767c2de2a3aa84e70da1230b2dd8f26
SHA192fc3b006b30b37e699d0cd1069391f3edd09fc8
SHA256272ee7f5bffe70f329cfe9fcd7d61eb7a34c4dc2c5de3a6f5fd078962dcde7d3
SHA5122beb66dad6db97d856cfe05daef19f3368c310ae10f27b90a541ae3be2ac15d6de0c2983df6d3b0f9722240bbd39e80ab9f0ef57e00eae16b72f3c98742e0496