Analysis
-
max time kernel
121s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
14/06/2024, 00:02
Static task
static1
Behavioral task
behavioral1
Sample
91f7b584ebca97a0f989f574273fbbf0_NeikiAnalytics.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
91f7b584ebca97a0f989f574273fbbf0_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
91f7b584ebca97a0f989f574273fbbf0_NeikiAnalytics.exe
-
Size
7.8MB
-
MD5
91f7b584ebca97a0f989f574273fbbf0
-
SHA1
47cc8bf5fe9047217893dcf0b141e5c8f6063eb5
-
SHA256
2b5597f915a27461039c741e5640340fd9a483866ea13ebc00baafc346144abc
-
SHA512
5065aa325221f6c1f9dc57c631b77198ec530706edb6e20f2cfaab3c83f40faa7c502a2cc371fa1312dd7aa274b21ee1e35e3b76c93192ecf8e4641ce88e3d3d
-
SSDEEP
98304:emhd1UryeWHaQjbX6Im0uSNV7wQqZUha5jtSyZIUb:el2HaQiDSN2QbaZtli
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2040 341B.tmp -
Executes dropped EXE 1 IoCs
pid Process 2040 341B.tmp -
Loads dropped DLL 2 IoCs
pid Process 2240 91f7b584ebca97a0f989f574273fbbf0_NeikiAnalytics.exe 2240 91f7b584ebca97a0f989f574273fbbf0_NeikiAnalytics.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2240 wrote to memory of 2040 2240 91f7b584ebca97a0f989f574273fbbf0_NeikiAnalytics.exe 28 PID 2240 wrote to memory of 2040 2240 91f7b584ebca97a0f989f574273fbbf0_NeikiAnalytics.exe 28 PID 2240 wrote to memory of 2040 2240 91f7b584ebca97a0f989f574273fbbf0_NeikiAnalytics.exe 28 PID 2240 wrote to memory of 2040 2240 91f7b584ebca97a0f989f574273fbbf0_NeikiAnalytics.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\91f7b584ebca97a0f989f574273fbbf0_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\91f7b584ebca97a0f989f574273fbbf0_NeikiAnalytics.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2240 -
C:\Users\Admin\AppData\Local\Temp\341B.tmp"C:\Users\Admin\AppData\Local\Temp\341B.tmp" --splashC:\Users\Admin\AppData\Local\Temp\91f7b584ebca97a0f989f574273fbbf0_NeikiAnalytics.exe 87119F502A6D5B3A78CE11B6E7C74C1E2207DA46399C3EAB552DD2B8088A36A94DD1D21C51E17C009AEE8B454120FC7AFF8A0AC6C02318FB3647C654B1C4EDF52⤵
- Deletes itself
- Executes dropped EXE
PID:2040
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
7.8MB
MD544bdf48b015b4d1aa2d5bac8248a811b
SHA139465512e1946ee0d68b64cf57b3db081dde5219
SHA256e38358e8a44b4eb2425e53a17cc013367520d85feaf5158831c1f9ea381b6baa
SHA512750c48797eece020384ecee70606aa35cf8dedeffe77779bf342ce999eaeefdb409d3ad4faf223a3f5243a5a4ccf11b8f9cf186ad494a9bf88a4dccd758b9135