Malware Analysis Report

2025-01-18 01:16

Sample ID 240613-hbzkkaxerc
Target 65edb8fda300fc0a57df7821cf7ec940_NeikiAnalytics.exe
SHA256 7bcb88ad577d198eda1c02616a26cb4c0e75b4d59969f9f7da003b59a719724c
Tags
score
7/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
7/10

SHA256

7bcb88ad577d198eda1c02616a26cb4c0e75b4d59969f9f7da003b59a719724c

Threat Level: Shows suspicious behavior

The file 65edb8fda300fc0a57df7821cf7ec940_NeikiAnalytics.exe was found to be: Shows suspicious behavior.

Malicious Activity Summary


Deletes itself

Executes dropped EXE

Loads dropped DLL

Program crash

Unsigned PE

Suspicious behavior: RenamesItself

Suspicious use of UnmapMainImage

Suspicious use of WriteProcessMemory

MITRE ATT&CK

N/A

Analysis: static1

Detonation Overview

Reported

2024-06-13 06:34

Signatures

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-06-13 06:34

Reported

2024-06-13 06:37

Platform

win7-20240611-en

Max time kernel

121s

Max time network

122s

Command Line

"C:\Users\Admin\AppData\Local\Temp\65edb8fda300fc0a57df7821cf7ec940_NeikiAnalytics.exe"

Signatures

Deletes itself

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\65edb8fda300fc0a57df7821cf7ec940_NeikiAnalytics.exe N/A

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\65edb8fda300fc0a57df7821cf7ec940_NeikiAnalytics.exe N/A

Loads dropped DLL

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\65edb8fda300fc0a57df7821cf7ec940_NeikiAnalytics.exe N/A

Suspicious behavior: RenamesItself

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\65edb8fda300fc0a57df7821cf7ec940_NeikiAnalytics.exe N/A

Suspicious use of UnmapMainImage

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\65edb8fda300fc0a57df7821cf7ec940_NeikiAnalytics.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\65edb8fda300fc0a57df7821cf7ec940_NeikiAnalytics.exe

"C:\Users\Admin\AppData\Local\Temp\65edb8fda300fc0a57df7821cf7ec940_NeikiAnalytics.exe"

C:\Users\Admin\AppData\Local\Temp\65edb8fda300fc0a57df7821cf7ec940_NeikiAnalytics.exe

C:\Users\Admin\AppData\Local\Temp\65edb8fda300fc0a57df7821cf7ec940_NeikiAnalytics.exe

Network

N/A

Files

memory/2196-0-0x0000000000400000-0x0000000000443000-memory.dmp

\Users\Admin\AppData\Local\Temp\65edb8fda300fc0a57df7821cf7ec940_NeikiAnalytics.exe

MD5 72a76b16ff52a942abfdf03e6e101988
SHA1 e6d22957929b694f72404ea764a103b10ce6d42c
SHA256 a30cfcde587edd868a59874e65f1518c71461f0e98cbabc4b1c8314eb5477097
SHA512 daf4d0074b1114d36059025d792e01b94aa3589eac6c5ab215dca8be66adece668c778330359cb7ad88a6eafc4762a1fdac5045827f30a8f887d348df5b776ac

memory/1272-11-0x0000000000400000-0x000000000041A000-memory.dmp

memory/1272-10-0x0000000000400000-0x0000000000443000-memory.dmp

memory/1272-16-0x00000000001B0000-0x00000000001F3000-memory.dmp

memory/2196-8-0x0000000000400000-0x0000000000443000-memory.dmp

memory/1272-17-0x0000000000400000-0x0000000000443000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2024-06-13 06:34

Reported

2024-06-13 06:37

Platform

win10v2004-20240611-en

Max time kernel

93s

Max time network

150s

Command Line

"C:\Users\Admin\AppData\Local\Temp\65edb8fda300fc0a57df7821cf7ec940_NeikiAnalytics.exe"

Signatures

Deletes itself

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\65edb8fda300fc0a57df7821cf7ec940_NeikiAnalytics.exe N/A

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\65edb8fda300fc0a57df7821cf7ec940_NeikiAnalytics.exe N/A

Suspicious behavior: RenamesItself

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\65edb8fda300fc0a57df7821cf7ec940_NeikiAnalytics.exe N/A

Suspicious use of UnmapMainImage

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\65edb8fda300fc0a57df7821cf7ec940_NeikiAnalytics.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\65edb8fda300fc0a57df7821cf7ec940_NeikiAnalytics.exe

"C:\Users\Admin\AppData\Local\Temp\65edb8fda300fc0a57df7821cf7ec940_NeikiAnalytics.exe"

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4504 -ip 4504

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 4504 -s 396

C:\Users\Admin\AppData\Local\Temp\65edb8fda300fc0a57df7821cf7ec940_NeikiAnalytics.exe

C:\Users\Admin\AppData\Local\Temp\65edb8fda300fc0a57df7821cf7ec940_NeikiAnalytics.exe

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 1280 -ip 1280

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 1280 -s 364

Network

Country Destination Domain Proto
US 8.8.8.8:53 g.bing.com udp
US 204.79.197.237:443 g.bing.com tcp
NL 23.62.61.59:443 www.bing.com tcp
US 8.8.8.8:53 68.32.126.40.in-addr.arpa udp
US 8.8.8.8:53 138.107.17.2.in-addr.arpa udp
US 8.8.8.8:53 237.197.79.204.in-addr.arpa udp
US 8.8.8.8:53 59.61.62.23.in-addr.arpa udp
US 8.8.8.8:53 50.23.12.20.in-addr.arpa udp
US 8.8.8.8:53 15.164.165.52.in-addr.arpa udp
US 8.8.8.8:53 0.205.248.87.in-addr.arpa udp
US 8.8.8.8:53 13.227.111.52.in-addr.arpa udp

Files

memory/4504-0-0x0000000000400000-0x0000000000443000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\65edb8fda300fc0a57df7821cf7ec940_NeikiAnalytics.exe

MD5 76e3370ccdbdf22603b92adc2d1d3623
SHA1 0967210e4a295e14a88b7f2fca3ebcae4e225e32
SHA256 4e786d656169a562feb6c517664ef24fc2ac83ee1fd83bd0dc1a2e4db25191cd
SHA512 cb6d173ea6b9886f59ab2d4bcf33f076b077a0badb8f4eed052de522b6bcd970eb6e1cd5b571d51fe8cfb906ccd1fd09eebe26b764943dea76a73c28e245e34b

memory/4504-6-0x0000000000400000-0x0000000000443000-memory.dmp

memory/1280-7-0x0000000000400000-0x0000000000443000-memory.dmp

memory/1280-8-0x0000000000400000-0x000000000041A000-memory.dmp

memory/1280-13-0x00000000014A0000-0x00000000014E3000-memory.dmp

memory/1280-14-0x0000000000400000-0x0000000000443000-memory.dmp