Analysis
-
max time kernel
120s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
16/06/2024, 22:14
Static task
static1
Behavioral task
behavioral1
Sample
123f11252c6e40e405b249d1f8858b30_NeikiAnalytics.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
123f11252c6e40e405b249d1f8858b30_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
123f11252c6e40e405b249d1f8858b30_NeikiAnalytics.exe
-
Size
94KB
-
MD5
123f11252c6e40e405b249d1f8858b30
-
SHA1
9fb6142f9bb69c857a0495533562707a2f2f2988
-
SHA256
3309965bbbc34f7625292088430beb262df11e2b6c61b21a271e7518b596a4df
-
SHA512
cbcc43461535b0eb1c9eacd62162284acd26374ca9992a015c9d9bcca0f3a1b1999fc95c68e0715e84736fb5322deb1724273ce3db3a95d76d72b6f5f6c613c7
-
SSDEEP
1536:klu5FmKjvqCfZVh+zAcWHbaOBtISepzTSuGLVtdtR27CXzAhkr0zZZdjsa:kq8AR+Mp7dMHz9+jR2dhc0zZZRx
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2936 123f11252c6e40e405b249d1f8858b30_NeikiAnalytics.exe -
Executes dropped EXE 1 IoCs
pid Process 2936 123f11252c6e40e405b249d1f8858b30_NeikiAnalytics.exe -
Loads dropped DLL 1 IoCs
pid Process 1176 123f11252c6e40e405b249d1f8858b30_NeikiAnalytics.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1176 123f11252c6e40e405b249d1f8858b30_NeikiAnalytics.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1176 123f11252c6e40e405b249d1f8858b30_NeikiAnalytics.exe 2936 123f11252c6e40e405b249d1f8858b30_NeikiAnalytics.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1176 wrote to memory of 2936 1176 123f11252c6e40e405b249d1f8858b30_NeikiAnalytics.exe 29 PID 1176 wrote to memory of 2936 1176 123f11252c6e40e405b249d1f8858b30_NeikiAnalytics.exe 29 PID 1176 wrote to memory of 2936 1176 123f11252c6e40e405b249d1f8858b30_NeikiAnalytics.exe 29 PID 1176 wrote to memory of 2936 1176 123f11252c6e40e405b249d1f8858b30_NeikiAnalytics.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\123f11252c6e40e405b249d1f8858b30_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\123f11252c6e40e405b249d1f8858b30_NeikiAnalytics.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1176 -
C:\Users\Admin\AppData\Local\Temp\123f11252c6e40e405b249d1f8858b30_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\123f11252c6e40e405b249d1f8858b30_NeikiAnalytics.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2936
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
94KB
MD530567505c41effa42e0f21d75678735d
SHA1d6e5df793908e30ea91bfdfb5a6075e8fb86fae7
SHA2560f22f06c9e0a14e3edab51c4b3f2e706e58aeec9f7bbb1e7f44f7aa026d6ca4a
SHA5126e456850e52fb7e801a3b1ada73ee367b052391e5f9917e82eba75ed2d45ac410b0077507fab9dbb6e0064e538ddf7f2cad182bcd79d63dedf6cd847f844bc08