Analysis
-
max time kernel
79s -
max time network
99s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
19/06/2024, 14:07
Static task
static1
Behavioral task
behavioral1
Sample
c294439e67724482a2f08b3d1f69ff30_NeikiAnalytics.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
c294439e67724482a2f08b3d1f69ff30_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
c294439e67724482a2f08b3d1f69ff30_NeikiAnalytics.exe
-
Size
192KB
-
MD5
c294439e67724482a2f08b3d1f69ff30
-
SHA1
3f7dc0393f10ac361298ea333a5077846248e1ad
-
SHA256
19a909311a01f5f4f8e5d37aae945f4cefa708ce242b8766080093897d77f1aa
-
SHA512
527d4f99cb05871a5f8554340974d339a1bda3f613351f51476c5f213bc59340c07dce41c5841c0f8a8bde355b37fff4124b0237d5c0b9285e2c17d759734290
-
SSDEEP
3072:JfdsQcYyjxdK20qEFO8c2UikGIVjnK7CyERPSICnpLn22h6z7z5ICDj7:04SvZ0lFlc2UJVjnK70RPBaLphe5
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 4044 c294439e67724482a2f08b3d1f69ff30_NeikiAnalytics.exe -
Executes dropped EXE 1 IoCs
pid Process 4044 c294439e67724482a2f08b3d1f69ff30_NeikiAnalytics.exe -
Program crash 2 IoCs
pid pid_target Process procid_target 4568 4852 WerFault.exe 81 744 4044 WerFault.exe 88 -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4852 c294439e67724482a2f08b3d1f69ff30_NeikiAnalytics.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 4044 c294439e67724482a2f08b3d1f69ff30_NeikiAnalytics.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4852 wrote to memory of 4044 4852 c294439e67724482a2f08b3d1f69ff30_NeikiAnalytics.exe 88 PID 4852 wrote to memory of 4044 4852 c294439e67724482a2f08b3d1f69ff30_NeikiAnalytics.exe 88 PID 4852 wrote to memory of 4044 4852 c294439e67724482a2f08b3d1f69ff30_NeikiAnalytics.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\c294439e67724482a2f08b3d1f69ff30_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\c294439e67724482a2f08b3d1f69ff30_NeikiAnalytics.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:4852 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4852 -s 3962⤵
- Program crash
PID:4568
-
-
C:\Users\Admin\AppData\Local\Temp\c294439e67724482a2f08b3d1f69ff30_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\c294439e67724482a2f08b3d1f69ff30_NeikiAnalytics.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:4044 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4044 -s 3683⤵
- Program crash
PID:744
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4852 -ip 48521⤵PID:1828
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 596 -p 4044 -ip 40441⤵PID:4580
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
192KB
MD551af58d6bf958993d2b12b6d1b4b808e
SHA1edc8936a4dd9bedb7b0509c4ab909b65fa9c42f6
SHA25674408644069e62dbc1a6d746232e638389ccab1e2f5fd76887f90e37c53fba91
SHA51212057201d49ae5c424c05ff45bd593b6a072aab2636b33aaba92a4d88ed5a4bb8687b984c59a88d004640a826b5273702b8daec4af7c50db6105020eb15da50a