Analysis
-
max time kernel
149s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
24-06-2024 13:37
Static task
static1
Behavioral task
behavioral1
Sample
7aab73569774be15157a1f0fc69ef80c3ff8e1c92c7a3436940150161abf89c2_NeikiAnalytics.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
7aab73569774be15157a1f0fc69ef80c3ff8e1c92c7a3436940150161abf89c2_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
7aab73569774be15157a1f0fc69ef80c3ff8e1c92c7a3436940150161abf89c2_NeikiAnalytics.exe
-
Size
42KB
-
MD5
ffe2a53d7730b2a3861da7335d2bc250
-
SHA1
44fe8b0c756c3001797c500a3fb182d4c97ad502
-
SHA256
7aab73569774be15157a1f0fc69ef80c3ff8e1c92c7a3436940150161abf89c2
-
SHA512
332ade7a124d962d838c6bb5958bbd6bcf1256f9015ea46e826eeb36a141799d29727d425fa6ecb97d041df8841ac07c24f728a3cded9d36d0d04efc37ed662d
-
SSDEEP
768:mUz4HXnmTggggggLvggggggggSvNltsdUk7Nz1XzTx6QXTDcVivMHG:BMH3lNMKkPzT8Qsk
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2176 zzyap.exe -
Loads dropped DLL 1 IoCs
pid Process 1540 7aab73569774be15157a1f0fc69ef80c3ff8e1c92c7a3436940150161abf89c2_NeikiAnalytics.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1540 wrote to memory of 2176 1540 7aab73569774be15157a1f0fc69ef80c3ff8e1c92c7a3436940150161abf89c2_NeikiAnalytics.exe 28 PID 1540 wrote to memory of 2176 1540 7aab73569774be15157a1f0fc69ef80c3ff8e1c92c7a3436940150161abf89c2_NeikiAnalytics.exe 28 PID 1540 wrote to memory of 2176 1540 7aab73569774be15157a1f0fc69ef80c3ff8e1c92c7a3436940150161abf89c2_NeikiAnalytics.exe 28 PID 1540 wrote to memory of 2176 1540 7aab73569774be15157a1f0fc69ef80c3ff8e1c92c7a3436940150161abf89c2_NeikiAnalytics.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\7aab73569774be15157a1f0fc69ef80c3ff8e1c92c7a3436940150161abf89c2_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\7aab73569774be15157a1f0fc69ef80c3ff8e1c92c7a3436940150161abf89c2_NeikiAnalytics.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1540 -
C:\Users\Admin\AppData\Local\Temp\zzyap.exe"C:\Users\Admin\AppData\Local\Temp\zzyap.exe"2⤵
- Executes dropped EXE
PID:2176
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
42KB
MD5aac6d98f5239a07fa59edf397b24eb2d
SHA11fdaada81bedc02e7cb7ab0a2c4dbfbce06d20d3
SHA256f9adb254312f7eb8455bf3a8c4438d90e89ee824b7a691c691597803ad6f5703
SHA512a16a73ba5e25859b61bdd8f9972a00645f8dfc7df64b0235ace1d9645fa396dbd5eb828502aea8cfaee4e1ec53410e42e109386243d83d46705a15f4cd6f17a4