Analysis

  • max time kernel
    122s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240611-en
  • resource tags

    arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system
  • submitted
    13/06/2024, 03:17

General

  • Target

    5a322e657609a4730ef2057c15df3e10_NeikiAnalytics.exe

  • Size

    362KB

  • MD5

    5a322e657609a4730ef2057c15df3e10

  • SHA1

    a9af70e87f2d98094245a74aa7780c94227189af

  • SHA256

    117de6efd63cdfad607486ee0392acd66b5f6005581142af1ffd9c50ff6ce623

  • SHA512

    c65fd1d707468db5ef12fe3362b2968d87e7f4678245be45591b60bb74165a8ac1780aea3fdb20b9e0fcbf4f2892a153c379d3d62f3027ad02591837af7b411f

  • SSDEEP

    6144:Qex3ib5xitNmBovxaK9y0pRSemjOFp4wg2k/JrAV40saiigCUlhu9a6r/V:zVvBMemjOy72qJrAVQ5zCUlh+auV

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of UnmapMainImage 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5a322e657609a4730ef2057c15df3e10_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\5a322e657609a4730ef2057c15df3e10_NeikiAnalytics.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: RenamesItself
    • Suspicious use of WriteProcessMemory
    PID:2092
    • C:\Users\Admin\AppData\Local\Temp\5a322e657609a4730ef2057c15df3e10_NeikiAnalytics.exe
      C:\Users\Admin\AppData\Local\Temp\5a322e657609a4730ef2057c15df3e10_NeikiAnalytics.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Suspicious use of UnmapMainImage
      PID:2192

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\5a322e657609a4730ef2057c15df3e10_NeikiAnalytics.exe

    Filesize

    362KB

    MD5

    14e10f3fa59e4364f56298a719c98593

    SHA1

    87628fa2f0afe84125c19efc2c64e4721050fed1

    SHA256

    efe8f689d2b56bcb5c4a55ee76b097f72dd9e7e74585361be915768792d2b1a9

    SHA512

    98ce14648cbda3345c2fd83259af19ac77dac42b654cf91b02c608ee2912c730285b915045040b417097746e3bd2337e964734d20a2fbcb25915c2c71c31f29d

  • memory/2092-0-0x0000000000400000-0x0000000000443000-memory.dmp

    Filesize

    268KB

  • memory/2092-8-0x0000000000130000-0x0000000000173000-memory.dmp

    Filesize

    268KB

  • memory/2092-10-0x0000000000400000-0x0000000000443000-memory.dmp

    Filesize

    268KB

  • memory/2192-11-0x0000000000400000-0x0000000000443000-memory.dmp

    Filesize

    268KB

  • memory/2192-13-0x0000000000400000-0x000000000041A000-memory.dmp

    Filesize

    104KB

  • memory/2192-17-0x0000000000130000-0x0000000000173000-memory.dmp

    Filesize

    268KB

  • memory/2192-18-0x0000000000400000-0x0000000000443000-memory.dmp

    Filesize

    268KB