Analysis Overview
SHA256
7bcb88ad577d198eda1c02616a26cb4c0e75b4d59969f9f7da003b59a719724c
Threat Level: Shows suspicious behavior
The file 65edb8fda300fc0a57df7821cf7ec940_NeikiAnalytics.exe was found to be: Shows suspicious behavior.
Malicious Activity Summary
Deletes itself
Executes dropped EXE
Loads dropped DLL
Program crash
Unsigned PE
Suspicious behavior: RenamesItself
Suspicious use of UnmapMainImage
Suspicious use of WriteProcessMemory
MITRE ATT&CK
Analysis: static1
Detonation Overview
Reported
2024-06-13 06:34
Signatures
Unsigned PE
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Analysis: behavioral1
Detonation Overview
Submitted
2024-06-13 06:34
Reported
2024-06-13 06:37
Platform
win7-20240611-en
Max time kernel
121s
Max time network
122s
Command Line
Signatures
Deletes itself
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\65edb8fda300fc0a57df7821cf7ec940_NeikiAnalytics.exe | N/A |
Executes dropped EXE
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\65edb8fda300fc0a57df7821cf7ec940_NeikiAnalytics.exe | N/A |
Loads dropped DLL
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\65edb8fda300fc0a57df7821cf7ec940_NeikiAnalytics.exe | N/A |
Suspicious behavior: RenamesItself
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\65edb8fda300fc0a57df7821cf7ec940_NeikiAnalytics.exe | N/A |
Suspicious use of UnmapMainImage
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\65edb8fda300fc0a57df7821cf7ec940_NeikiAnalytics.exe | N/A |
Suspicious use of WriteProcessMemory
| Description | Indicator | Process | Target |
| PID 2196 wrote to memory of 1272 | N/A | C:\Users\Admin\AppData\Local\Temp\65edb8fda300fc0a57df7821cf7ec940_NeikiAnalytics.exe | C:\Users\Admin\AppData\Local\Temp\65edb8fda300fc0a57df7821cf7ec940_NeikiAnalytics.exe |
| PID 2196 wrote to memory of 1272 | N/A | C:\Users\Admin\AppData\Local\Temp\65edb8fda300fc0a57df7821cf7ec940_NeikiAnalytics.exe | C:\Users\Admin\AppData\Local\Temp\65edb8fda300fc0a57df7821cf7ec940_NeikiAnalytics.exe |
| PID 2196 wrote to memory of 1272 | N/A | C:\Users\Admin\AppData\Local\Temp\65edb8fda300fc0a57df7821cf7ec940_NeikiAnalytics.exe | C:\Users\Admin\AppData\Local\Temp\65edb8fda300fc0a57df7821cf7ec940_NeikiAnalytics.exe |
| PID 2196 wrote to memory of 1272 | N/A | C:\Users\Admin\AppData\Local\Temp\65edb8fda300fc0a57df7821cf7ec940_NeikiAnalytics.exe | C:\Users\Admin\AppData\Local\Temp\65edb8fda300fc0a57df7821cf7ec940_NeikiAnalytics.exe |
Processes
C:\Users\Admin\AppData\Local\Temp\65edb8fda300fc0a57df7821cf7ec940_NeikiAnalytics.exe
"C:\Users\Admin\AppData\Local\Temp\65edb8fda300fc0a57df7821cf7ec940_NeikiAnalytics.exe"
C:\Users\Admin\AppData\Local\Temp\65edb8fda300fc0a57df7821cf7ec940_NeikiAnalytics.exe
C:\Users\Admin\AppData\Local\Temp\65edb8fda300fc0a57df7821cf7ec940_NeikiAnalytics.exe
Network
Files
memory/2196-0-0x0000000000400000-0x0000000000443000-memory.dmp
\Users\Admin\AppData\Local\Temp\65edb8fda300fc0a57df7821cf7ec940_NeikiAnalytics.exe
| MD5 | 72a76b16ff52a942abfdf03e6e101988 |
| SHA1 | e6d22957929b694f72404ea764a103b10ce6d42c |
| SHA256 | a30cfcde587edd868a59874e65f1518c71461f0e98cbabc4b1c8314eb5477097 |
| SHA512 | daf4d0074b1114d36059025d792e01b94aa3589eac6c5ab215dca8be66adece668c778330359cb7ad88a6eafc4762a1fdac5045827f30a8f887d348df5b776ac |
memory/1272-11-0x0000000000400000-0x000000000041A000-memory.dmp
memory/1272-10-0x0000000000400000-0x0000000000443000-memory.dmp
memory/1272-16-0x00000000001B0000-0x00000000001F3000-memory.dmp
memory/2196-8-0x0000000000400000-0x0000000000443000-memory.dmp
memory/1272-17-0x0000000000400000-0x0000000000443000-memory.dmp
Analysis: behavioral2
Detonation Overview
Submitted
2024-06-13 06:34
Reported
2024-06-13 06:37
Platform
win10v2004-20240611-en
Max time kernel
93s
Max time network
150s
Command Line
Signatures
Deletes itself
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\65edb8fda300fc0a57df7821cf7ec940_NeikiAnalytics.exe | N/A |
Executes dropped EXE
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\65edb8fda300fc0a57df7821cf7ec940_NeikiAnalytics.exe | N/A |
Program crash
Suspicious behavior: RenamesItself
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\65edb8fda300fc0a57df7821cf7ec940_NeikiAnalytics.exe | N/A |
Suspicious use of UnmapMainImage
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\65edb8fda300fc0a57df7821cf7ec940_NeikiAnalytics.exe | N/A |
Suspicious use of WriteProcessMemory
| Description | Indicator | Process | Target |
| PID 4504 wrote to memory of 1280 | N/A | C:\Users\Admin\AppData\Local\Temp\65edb8fda300fc0a57df7821cf7ec940_NeikiAnalytics.exe | C:\Users\Admin\AppData\Local\Temp\65edb8fda300fc0a57df7821cf7ec940_NeikiAnalytics.exe |
| PID 4504 wrote to memory of 1280 | N/A | C:\Users\Admin\AppData\Local\Temp\65edb8fda300fc0a57df7821cf7ec940_NeikiAnalytics.exe | C:\Users\Admin\AppData\Local\Temp\65edb8fda300fc0a57df7821cf7ec940_NeikiAnalytics.exe |
| PID 4504 wrote to memory of 1280 | N/A | C:\Users\Admin\AppData\Local\Temp\65edb8fda300fc0a57df7821cf7ec940_NeikiAnalytics.exe | C:\Users\Admin\AppData\Local\Temp\65edb8fda300fc0a57df7821cf7ec940_NeikiAnalytics.exe |
Processes
C:\Users\Admin\AppData\Local\Temp\65edb8fda300fc0a57df7821cf7ec940_NeikiAnalytics.exe
"C:\Users\Admin\AppData\Local\Temp\65edb8fda300fc0a57df7821cf7ec940_NeikiAnalytics.exe"
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4504 -ip 4504
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 4504 -s 396
C:\Users\Admin\AppData\Local\Temp\65edb8fda300fc0a57df7821cf7ec940_NeikiAnalytics.exe
C:\Users\Admin\AppData\Local\Temp\65edb8fda300fc0a57df7821cf7ec940_NeikiAnalytics.exe
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 1280 -ip 1280
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 1280 -s 364
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | g.bing.com | udp |
| US | 204.79.197.237:443 | g.bing.com | tcp |
| NL | 23.62.61.59:443 | www.bing.com | tcp |
| US | 8.8.8.8:53 | 68.32.126.40.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 138.107.17.2.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 237.197.79.204.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 59.61.62.23.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 50.23.12.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 15.164.165.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 0.205.248.87.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 13.227.111.52.in-addr.arpa | udp |
Files
memory/4504-0-0x0000000000400000-0x0000000000443000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\65edb8fda300fc0a57df7821cf7ec940_NeikiAnalytics.exe
| MD5 | 76e3370ccdbdf22603b92adc2d1d3623 |
| SHA1 | 0967210e4a295e14a88b7f2fca3ebcae4e225e32 |
| SHA256 | 4e786d656169a562feb6c517664ef24fc2ac83ee1fd83bd0dc1a2e4db25191cd |
| SHA512 | cb6d173ea6b9886f59ab2d4bcf33f076b077a0badb8f4eed052de522b6bcd970eb6e1cd5b571d51fe8cfb906ccd1fd09eebe26b764943dea76a73c28e245e34b |
memory/4504-6-0x0000000000400000-0x0000000000443000-memory.dmp
memory/1280-7-0x0000000000400000-0x0000000000443000-memory.dmp
memory/1280-8-0x0000000000400000-0x000000000041A000-memory.dmp
memory/1280-13-0x00000000014A0000-0x00000000014E3000-memory.dmp
memory/1280-14-0x0000000000400000-0x0000000000443000-memory.dmp