Malware Analysis Report

2025-08-06 00:22

Sample ID 240607-tgvdksbg52
Target 6a50d6f0a171c7e8f70f665fa9906670_NeikiAnalytics.exe
SHA256 3ce8cae47b4f17a99b86df765b3b30fab00a6afba6d843360b26fb93bc7b2dce
Tags
upx
score
7/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
7/10

SHA256

3ce8cae47b4f17a99b86df765b3b30fab00a6afba6d843360b26fb93bc7b2dce

Threat Level: Shows suspicious behavior

The file 6a50d6f0a171c7e8f70f665fa9906670_NeikiAnalytics.exe was found to be: Shows suspicious behavior.

Malicious Activity Summary

upx

UPX packed file

Unsigned PE

MITRE ATT&CK

N/A

Analysis: static1

Detonation Overview

Reported

2024-06-07 16:02

Signatures

UPX packed file

upx
Description Indicator Process Target
N/A N/A N/A N/A

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-06-07 16:02

Reported

2024-06-07 16:04

Platform

win7-20240419-en

Max time kernel

140s

Max time network

123s

Command Line

"C:\Users\Admin\AppData\Local\Temp\6a50d6f0a171c7e8f70f665fa9906670_NeikiAnalytics.exe"

Signatures

UPX packed file

upx
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Processes

C:\Users\Admin\AppData\Local\Temp\6a50d6f0a171c7e8f70f665fa9906670_NeikiAnalytics.exe

"C:\Users\Admin\AppData\Local\Temp\6a50d6f0a171c7e8f70f665fa9906670_NeikiAnalytics.exe"

Network

Country Destination Domain Proto
US 8.8.8.8:53 wecan.hasthe.technology udp
US 172.67.183.40:80 wecan.hasthe.technology tcp
US 172.67.183.40:80 wecan.hasthe.technology tcp
US 172.67.183.40:80 wecan.hasthe.technology tcp
US 172.67.183.40:80 wecan.hasthe.technology tcp

Files

memory/1340-0-0x0000000000400000-0x000000000042A000-memory.dmp

memory/1340-1-0x0000000000400000-0x000000000042A000-memory.dmp

memory/1340-7-0x0000000000400000-0x000000000042A000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\rifaien2-eKPFC52X4sFb4v03.exe

MD5 e37d0d36beeb27d3d94e9b73c68b35eb
SHA1 417eb47eacf33b1b8dfa5f1b6174d6f63d9a2774
SHA256 0ed63c36b5847517c4e18002191cdadcf48e8bae9a0be21c6d5794faa6ce29bf
SHA512 311710e2737918b419161104fc3a0652bc36e1d3130f289c9199b7ff727172bc0c46efde6faf7027d26fa81444aae005c5aacb2521582d4c743b678abba4e6e8

memory/1340-14-0x0000000000400000-0x000000000042A000-memory.dmp

memory/1340-21-0x0000000000400000-0x000000000042A000-memory.dmp

memory/1340-28-0x0000000000400000-0x000000000042A000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2024-06-07 16:02

Reported

2024-06-07 16:04

Platform

win10v2004-20240226-en

Max time kernel

143s

Max time network

151s

Command Line

"C:\Users\Admin\AppData\Local\Temp\6a50d6f0a171c7e8f70f665fa9906670_NeikiAnalytics.exe"

Signatures

UPX packed file

upx
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Processes

C:\Users\Admin\AppData\Local\Temp\6a50d6f0a171c7e8f70f665fa9906670_NeikiAnalytics.exe

"C:\Users\Admin\AppData\Local\Temp\6a50d6f0a171c7e8f70f665fa9906670_NeikiAnalytics.exe"

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=1340 --field-trial-handle=2236,i,5367110156796017614,12594004256180761011,262144 --variations-seed-version /prefetch:8

Network

Country Destination Domain Proto
US 8.8.8.8:53 154.239.44.20.in-addr.arpa udp
US 8.8.8.8:53 145.83.221.88.in-addr.arpa udp
US 8.8.8.8:53 67.31.126.40.in-addr.arpa udp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
US 8.8.8.8:53 58.55.71.13.in-addr.arpa udp
US 20.231.121.79:80 tcp
US 8.8.8.8:53 udp
US 8.8.8.8:53 103.169.127.40.in-addr.arpa udp
US 8.8.8.8:53 18.31.95.13.in-addr.arpa udp
US 8.8.8.8:53 wecan.hasthe.technology udp
US 172.67.183.40:80 wecan.hasthe.technology tcp
US 8.8.8.8:53 40.183.67.172.in-addr.arpa udp
US 13.107.246.64:443 tcp
US 172.67.183.40:80 wecan.hasthe.technology tcp
US 8.8.8.8:53 105.83.221.88.in-addr.arpa udp
US 8.8.8.8:53 21.236.111.52.in-addr.arpa udp
US 172.67.183.40:80 wecan.hasthe.technology tcp
US 172.67.183.40:80 wecan.hasthe.technology tcp
US 8.8.8.8:53 169.117.168.52.in-addr.arpa udp

Files

memory/1576-0-0x0000000000400000-0x000000000042A000-memory.dmp

memory/1576-1-0x0000000000400000-0x000000000042A000-memory.dmp

memory/1576-8-0x0000000000400000-0x000000000042A000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\rifaien2-2pnDaKMM8wlDjXbx.exe

MD5 38bb3b80c653d503ae6b1f824f0ce23f
SHA1 a6642187395e7e06a01fb69e9ec68ab4d3dfc8b9
SHA256 fb926daa8a49c309941c346e44c5696055eada70354d2d047376e958f90c2eee
SHA512 35f31c4cdf608b7d66a5f5a67381a8b7ebf4625d0d6f794a39036d7a8a5d8dac6379a878d70d00062dc6bbaa96848c8b14d9cc98db05db53d79de046a3729eba

memory/1576-15-0x0000000000400000-0x000000000042A000-memory.dmp

memory/1576-18-0x0000000000400000-0x000000000042A000-memory.dmp

memory/1576-29-0x0000000000400000-0x000000000042A000-memory.dmp