Analysis
-
max time kernel
118s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
13/06/2024, 06:10
Static task
static1
Behavioral task
behavioral1
Sample
6489b4ceac77c3bf4685d7c16c113ac0_NeikiAnalytics.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
6489b4ceac77c3bf4685d7c16c113ac0_NeikiAnalytics.exe
Resource
win10v2004-20240611-en
General
-
Target
6489b4ceac77c3bf4685d7c16c113ac0_NeikiAnalytics.exe
-
Size
56KB
-
MD5
6489b4ceac77c3bf4685d7c16c113ac0
-
SHA1
ee00f69e4ee20fe6eb597e7cd9948238d56f3bd7
-
SHA256
50aeab4bcd0135c166d6ba87b17363f3fe4e5398d67b68bf44f241a70b6cfaa1
-
SHA512
ff89a7674cbaeeff93129233a262851ba602bcee1e5a22a1b43f7144eedc59c77d534aa6154472a9826a4e37da7aa94091dc2abea673cdd9acd27c659925546b
-
SSDEEP
768:MApQr0DWvdFJI34HGxusOy9Rp1pLeAxoeC48PqK1OtaP6cCFzENREMZ7vC2t3:MAaJJlTsh7pWezEPJB+OW2N
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2076 sal.exe -
Loads dropped DLL 2 IoCs
pid Process 2160 6489b4ceac77c3bf4685d7c16c113ac0_NeikiAnalytics.exe 2160 6489b4ceac77c3bf4685d7c16c113ac0_NeikiAnalytics.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created \??\c:\windows\SysWOW64\sal.exe 6489b4ceac77c3bf4685d7c16c113ac0_NeikiAnalytics.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2160 wrote to memory of 2076 2160 6489b4ceac77c3bf4685d7c16c113ac0_NeikiAnalytics.exe 28 PID 2160 wrote to memory of 2076 2160 6489b4ceac77c3bf4685d7c16c113ac0_NeikiAnalytics.exe 28 PID 2160 wrote to memory of 2076 2160 6489b4ceac77c3bf4685d7c16c113ac0_NeikiAnalytics.exe 28 PID 2160 wrote to memory of 2076 2160 6489b4ceac77c3bf4685d7c16c113ac0_NeikiAnalytics.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\6489b4ceac77c3bf4685d7c16c113ac0_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\6489b4ceac77c3bf4685d7c16c113ac0_NeikiAnalytics.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2160 -
C:\windows\SysWOW64\sal.exe"C:\windows\system32\sal.exe"2⤵
- Executes dropped EXE
PID:2076
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
56KB
MD534fc023408e49d0f99e89d95008a204a
SHA1c737841dd56c219e285ac6b7f17b8a94e297736d
SHA256b5a11f758a80ac14488a5dffbf325621496cf884d0317ae91649d9fa6be772f5
SHA512601e6a251060b805a5d19c68d4c966107443074b1a96b14ca6ecc88847aff2f054895607723b76bdf49faa738caa66cde0a3ad23c3a2e5193ee87cdea974187e