Analysis
-
max time kernel
51s -
max time network
58s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
19-06-2024 14:30
Static task
static1
Behavioral task
behavioral1
Sample
c41572b34a2a0bdc769b6e2b6c45d050_NeikiAnalytics.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
c41572b34a2a0bdc769b6e2b6c45d050_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
c41572b34a2a0bdc769b6e2b6c45d050_NeikiAnalytics.exe
-
Size
223KB
-
MD5
c41572b34a2a0bdc769b6e2b6c45d050
-
SHA1
9a9c62d862b5e8dbf78a59fb077054c2731316f1
-
SHA256
e1c53516ede1b1f3bff13d3103648ccd52bcb962093c06153eacd2132ff36429
-
SHA512
7315ecf622955701b8d06e1a09ceaf789f0bc3760544a448ba5f1924dd964295379d91f1aa4e3ed67a3b46824cb79f3463eb8a06450148bebb9f7c45b85bcaaf
-
SSDEEP
6144:vNcDxu3qErl0KKgLn42bk6adl5HjYbiWd:VcDxQqQ0KKgBbVa3BjLWd
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3052 c41572b34a2a0bdc769b6e2b6c45d050_NeikiAnalytics.exe -
Executes dropped EXE 1 IoCs
pid Process 3052 c41572b34a2a0bdc769b6e2b6c45d050_NeikiAnalytics.exe -
Program crash 2 IoCs
pid pid_target Process procid_target 2552 760 WerFault.exe 80 3900 3052 WerFault.exe 88 -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 760 c41572b34a2a0bdc769b6e2b6c45d050_NeikiAnalytics.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 3052 c41572b34a2a0bdc769b6e2b6c45d050_NeikiAnalytics.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 760 wrote to memory of 3052 760 c41572b34a2a0bdc769b6e2b6c45d050_NeikiAnalytics.exe 88 PID 760 wrote to memory of 3052 760 c41572b34a2a0bdc769b6e2b6c45d050_NeikiAnalytics.exe 88 PID 760 wrote to memory of 3052 760 c41572b34a2a0bdc769b6e2b6c45d050_NeikiAnalytics.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\c41572b34a2a0bdc769b6e2b6c45d050_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\c41572b34a2a0bdc769b6e2b6c45d050_NeikiAnalytics.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:760 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 760 -s 3962⤵
- Program crash
PID:2552
-
-
C:\Users\Admin\AppData\Local\Temp\c41572b34a2a0bdc769b6e2b6c45d050_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\c41572b34a2a0bdc769b6e2b6c45d050_NeikiAnalytics.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:3052 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3052 -s 3643⤵
- Program crash
PID:3900
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 760 -ip 7601⤵PID:4744
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 3052 -ip 30521⤵PID:1700
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
223KB
MD5e19778f62790c6cc5f9ab935500af2c3
SHA149eebde07a134c5c7c85788c4048f3e86780cb99
SHA2561833c6fb1741324184c6cd6142c9d9d246434980fba2ee14b322a88f408b680e
SHA512a14b957afc28027dd34aaa94081971c13caf74bd80b1fe22c6f21baa4d79fe3874e7c7764f96aacca31cd1f6e7a6dafea0098f8c37595994a8935a853eee70fb