Analysis
-
max time kernel
117s -
max time network
117s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
13/06/2024, 21:14
Static task
static1
Behavioral task
behavioral1
Sample
878b9e6a50bb0b67c03bda6353350fb0_NeikiAnalytics.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
878b9e6a50bb0b67c03bda6353350fb0_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
878b9e6a50bb0b67c03bda6353350fb0_NeikiAnalytics.exe
-
Size
94KB
-
MD5
878b9e6a50bb0b67c03bda6353350fb0
-
SHA1
caad3397dd6e7972798acd91041882a090f3e255
-
SHA256
38b698604131295764773e5d8f66eee42411f66fa94360d74f49af81ff17c12d
-
SHA512
d9391f6296b5a820acb59c36bcf0adbd9c3c533a6fc0786b2e7d081aca2dcd8e39157823c7df3e39b2384fcb53d48e931d695c4e0d720f9ead27aee4fbd983a6
-
SSDEEP
1536:PGYU/W2/HG6QMauSV3ixJHABLrmhH7i9CO+WHg7zRZICrWaGZh7un:PfU/WF6QMauSuiWNi9CO+WARJrWNZI
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2648 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2212 wuauclt.exe -
Loads dropped DLL 1 IoCs
pid Process 1688 878b9e6a50bb0b67c03bda6353350fb0_NeikiAnalytics.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Window Update = "\"C:\\ProgramData\\Update\\wuauclt.exe\" /run" 878b9e6a50bb0b67c03bda6353350fb0_NeikiAnalytics.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1688 wrote to memory of 2212 1688 878b9e6a50bb0b67c03bda6353350fb0_NeikiAnalytics.exe 28 PID 1688 wrote to memory of 2212 1688 878b9e6a50bb0b67c03bda6353350fb0_NeikiAnalytics.exe 28 PID 1688 wrote to memory of 2212 1688 878b9e6a50bb0b67c03bda6353350fb0_NeikiAnalytics.exe 28 PID 1688 wrote to memory of 2212 1688 878b9e6a50bb0b67c03bda6353350fb0_NeikiAnalytics.exe 28 PID 1688 wrote to memory of 2648 1688 878b9e6a50bb0b67c03bda6353350fb0_NeikiAnalytics.exe 29 PID 1688 wrote to memory of 2648 1688 878b9e6a50bb0b67c03bda6353350fb0_NeikiAnalytics.exe 29 PID 1688 wrote to memory of 2648 1688 878b9e6a50bb0b67c03bda6353350fb0_NeikiAnalytics.exe 29 PID 1688 wrote to memory of 2648 1688 878b9e6a50bb0b67c03bda6353350fb0_NeikiAnalytics.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\878b9e6a50bb0b67c03bda6353350fb0_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\878b9e6a50bb0b67c03bda6353350fb0_NeikiAnalytics.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1688 -
C:\ProgramData\Update\wuauclt.exe"C:\ProgramData\Update\wuauclt.exe" /run2⤵
- Executes dropped EXE
PID:2212
-
-
C:\windows\SysWOW64\cmd.exe"C:\windows\system32\cmd.exe" /c del /q "C:\Users\Admin\AppData\Local\Temp\878b9e6a50bb0b67c03bda6353350fb0_NeikiAnalytics.exe" >> NUL2⤵
- Deletes itself
PID:2648
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
94KB
MD5ab6eecd1e70647e381ddfb71ef76e629
SHA12062d60d8167b64b5f7e48f84dbe901c8c9027c5
SHA256d0217e598f4657150333ba2402018a56262317e409e54248d92529926d27d0aa
SHA51225c69e0bcddf556d6bd399056b06f025c8e58504bcf572921a2befbb35571aea5b75bc9e8c65fa18114098710e0e1d1d0be081eaa2ba4e111b59273f7a4f3c1c