Analysis
-
max time kernel
137s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
08/06/2024, 03:40
Static task
static1
Behavioral task
behavioral1
Sample
88945e6ce795d83ca10263b358f05200_NeikiAnalytics.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
88945e6ce795d83ca10263b358f05200_NeikiAnalytics.exe
Resource
win10v2004-20240226-en
General
-
Target
88945e6ce795d83ca10263b358f05200_NeikiAnalytics.exe
-
Size
203KB
-
MD5
88945e6ce795d83ca10263b358f05200
-
SHA1
b4274b9876df70ece20d430a6d3a6f98b19bb646
-
SHA256
0c176f08fe2324bfdc3a197ea885cac4d894965e1efc6e9c69acb9c3bb7d474b
-
SHA512
c988aef778f8381ae768480f44742e1e035e8c4809ae55cfe45826564635b18b66e55f35cc0173b85257316a25ecc9db09592123af397a66de9128e7dfa3a242
-
SSDEEP
3072:a2UVGcEwDz5xWfllnMXdUVnhbi6cyUBqpCdfpomY99dUdp2FkG+6Rs7UcELgUUnF:daz+lPnVUBVgKPELgUqwKoPsZ
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2768 88945e6ce795d83ca10263b358f05200_NeikiAnalytics.exe -
Executes dropped EXE 1 IoCs
pid Process 2768 88945e6ce795d83ca10263b358f05200_NeikiAnalytics.exe -
Program crash 5 IoCs
pid pid_target Process procid_target 4340 1504 WerFault.exe 91 2728 2768 WerFault.exe 95 2800 2768 WerFault.exe 95 1316 2768 WerFault.exe 95 2760 2768 WerFault.exe 95 -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1504 88945e6ce795d83ca10263b358f05200_NeikiAnalytics.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 2768 88945e6ce795d83ca10263b358f05200_NeikiAnalytics.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1504 wrote to memory of 2768 1504 88945e6ce795d83ca10263b358f05200_NeikiAnalytics.exe 95 PID 1504 wrote to memory of 2768 1504 88945e6ce795d83ca10263b358f05200_NeikiAnalytics.exe 95 PID 1504 wrote to memory of 2768 1504 88945e6ce795d83ca10263b358f05200_NeikiAnalytics.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\88945e6ce795d83ca10263b358f05200_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\88945e6ce795d83ca10263b358f05200_NeikiAnalytics.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:1504 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1504 -s 3562⤵
- Program crash
PID:4340
-
-
C:\Users\Admin\AppData\Local\Temp\88945e6ce795d83ca10263b358f05200_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\88945e6ce795d83ca10263b358f05200_NeikiAnalytics.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2768 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2768 -s 3523⤵
- Program crash
PID:2728
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2768 -s 7683⤵
- Program crash
PID:2800
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2768 -s 7883⤵
- Program crash
PID:1316
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2768 -s 7963⤵
- Program crash
PID:2760
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 1504 -ip 15041⤵PID:768
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 2768 -ip 27681⤵PID:1964
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 2768 -ip 27681⤵PID:1564
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 2768 -ip 27681⤵PID:3356
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=1344 --field-trial-handle=2276,i,11674642242468042059,14711253743544118298,262144 --variations-seed-version /prefetch:81⤵PID:564
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 2768 -ip 27681⤵PID:3084
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
203KB
MD52bef75cb85d2e8d6007fc65b4eee51f7
SHA1d8b306ed9fb7053652a169b0cf3387f7ab9a4130
SHA256c627b462634255e465597f9d94f5095d44f6a96299147e841746a10c23dea11a
SHA51232f916ae3950296dc3376627421c8d08bef4a11c5e41cbafb3d5d1e33a2b17cdb90ab50839753e1ab65959b1fb4e8bc0fd69725769ea9a13c8b93743f9329ce3