Analysis
-
max time kernel
147s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
11-06-2024 21:03
Static task
static1
Behavioral task
behavioral1
Sample
030016b776afb21658171c863faa49d0_NeikiAnalytics.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
030016b776afb21658171c863faa49d0_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
030016b776afb21658171c863faa49d0_NeikiAnalytics.exe
-
Size
204KB
-
MD5
030016b776afb21658171c863faa49d0
-
SHA1
948a513b271fcd99a3c385ab9d0b4c04572a517b
-
SHA256
38b1fe391e86a9851ae2118d3a9f497b02d0ca056d6bac4d0ff20dda70188ef3
-
SHA512
9cfdb607a731540bf5686373e0b04534402b80f498fab690b647b6f6f63aa2e60c944c5b6c4f796b3cdc269724f44ad126a3508d9757693efd1fb7553fbd9ca0
-
SSDEEP
6144:z1T2qtO0emEUYJIbKfG/ay3pl8thxBw0:z15M0emEUYftXBw0
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 4376 wrote to memory of 4548 4376 030016b776afb21658171c863faa49d0_NeikiAnalytics.exe 86 PID 4376 wrote to memory of 4548 4376 030016b776afb21658171c863faa49d0_NeikiAnalytics.exe 86 PID 4548 wrote to memory of 4684 4548 csc.exe 87 PID 4548 wrote to memory of 4684 4548 csc.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\030016b776afb21658171c863faa49d0_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\030016b776afb21658171c863faa49d0_NeikiAnalytics.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4376 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\1yru5qqi\1yru5qqi.cmdline"2⤵
- Suspicious use of WriteProcessMemory
PID:4548 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES7697.tmp" "c:\Users\Admin\AppData\Local\Temp\1yru5qqi\CSC3A8F2E1CB21749A19B29B0CBEBB0DED0.TMP"3⤵PID:4684
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4KB
MD542b32d758d9ac8e9dd651bb2fe1d0754
SHA1738881c2f126fc984492c79e6494c338220fcef4
SHA256ea96f9bf9a5225fe4a170a9839990f772dcf74747cf9812c5ab679aa00a6fa99
SHA512b2d6e24e3c9ac76a22d304ed0a8368a4eef1b7383b27af48369d32f5ddfb872ec917f3104b38837549be6abde50572f85408db8c1d6616a0a7ce3e3de907b94e
-
Filesize
1KB
MD5a647884399af213001fd79b97a3ca1da
SHA1a84bb0dd2c7ed520c450579f72e38f1f40f311ea
SHA256174fb5548eb7b2ada6bee016e2883c5b97371fbe5c5d619a804909f963e43436
SHA5125c809b53d190f1d2917489e0224c967bb8e0359540b49f49dd6073d1652956b3284ecfc6b7c5c20502864c035cf5525b814366da282cd8ce9460ec23d35fcbf8
-
Filesize
1KB
MD5f420ebb3150f0764331a33377a7451b8
SHA18ed9b9d610e8ab76aea82a3830ad31059517630b
SHA256dfb6ab38744b3a4e17cf7fa75b3126e88cbeabc907008f3921ff41c523a99a27
SHA512b92767736261cb7c10f58576c44e62cd0d105e90e139b376d52ccb5cb7ca189205a1f7d7a5fec5d739f8763eded8b5c55b9057217fe9a55b1e151dc700760cbd
-
Filesize
208B
MD5be57d7b59ac93f1fff158d74ce5348a2
SHA1c74d498515555fb16e1e1e9f046dc59e44306223
SHA256fc1eacb92624e043080e087d8a4e4ddc77328fd4387bb10eb6a75adab9757e88
SHA512d84d5e1214ea6a368d64aff3449a0b84e78f989e1cb88c729d1b26481bb50c073fe4c8303b18a6b3d3ea5868f1d2672ebd9aaada2a42394de4085afd935991f4
-
Filesize
652B
MD55c7c05462f175fd94501b4eb30f242d0
SHA1986c3210929e62621711db97ca20c429f2d10c41
SHA256b29b1fa8ec3036ef61334ef6426525f615db375c93aa86e3cf9c8776fb7fed7f
SHA512215a2aebe2149fbeb21a772aafdb3bdd64ce9ca16dfc4511b813f1f192301e23cb1c5bc4f418d70adc0381b9721da4653777b21d41950dfeb2cb00f49e93c40f