Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
24/06/2024, 15:39
Behavioral task
behavioral1
Sample
89366cc5057ede24f4841be5722aabe0a6b5b7747a94ace42b4524ee6f4143c9_NeikiAnalytics.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
89366cc5057ede24f4841be5722aabe0a6b5b7747a94ace42b4524ee6f4143c9_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
89366cc5057ede24f4841be5722aabe0a6b5b7747a94ace42b4524ee6f4143c9_NeikiAnalytics.exe
-
Size
56KB
-
MD5
fcec7fde7201f7743ef9a6501563d200
-
SHA1
8aa5253a248129f1c401b269c1e2cfbdd563be82
-
SHA256
89366cc5057ede24f4841be5722aabe0a6b5b7747a94ace42b4524ee6f4143c9
-
SHA512
59ef43ff7ecff2a8a4bc196712fb920c6725e9e5e9c7450afe28f0a914e3958b0fe1ad55f1b76ef4f2c87e34a49bdfb8b80c2bb3337ef47b9873094fc6e2581a
-
SSDEEP
1536:ZFP6k/N5ga9+6xvu12zOsDy/syC5DzvR:yI5f1vu1AOMGG5J
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 292 89366cc5057ede24f4841be5722aabe0a6b5b7747a94ace42b4524ee6f4143c9_NeikiAnalytics.exe -
Executes dropped EXE 1 IoCs
pid Process 292 89366cc5057ede24f4841be5722aabe0a6b5b7747a94ace42b4524ee6f4143c9_NeikiAnalytics.exe -
Loads dropped DLL 1 IoCs
pid Process 2424 89366cc5057ede24f4841be5722aabe0a6b5b7747a94ace42b4524ee6f4143c9_NeikiAnalytics.exe -
resource yara_rule behavioral1/memory/2424-0-0x0000000000400000-0x000000000043A000-memory.dmp upx behavioral1/files/0x000d0000000122eb-10.dat upx behavioral1/memory/292-17-0x0000000000400000-0x000000000043A000-memory.dmp upx behavioral1/memory/2424-14-0x0000000000180000-0x00000000001BA000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2424 89366cc5057ede24f4841be5722aabe0a6b5b7747a94ace42b4524ee6f4143c9_NeikiAnalytics.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2424 89366cc5057ede24f4841be5722aabe0a6b5b7747a94ace42b4524ee6f4143c9_NeikiAnalytics.exe 292 89366cc5057ede24f4841be5722aabe0a6b5b7747a94ace42b4524ee6f4143c9_NeikiAnalytics.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2424 wrote to memory of 292 2424 89366cc5057ede24f4841be5722aabe0a6b5b7747a94ace42b4524ee6f4143c9_NeikiAnalytics.exe 29 PID 2424 wrote to memory of 292 2424 89366cc5057ede24f4841be5722aabe0a6b5b7747a94ace42b4524ee6f4143c9_NeikiAnalytics.exe 29 PID 2424 wrote to memory of 292 2424 89366cc5057ede24f4841be5722aabe0a6b5b7747a94ace42b4524ee6f4143c9_NeikiAnalytics.exe 29 PID 2424 wrote to memory of 292 2424 89366cc5057ede24f4841be5722aabe0a6b5b7747a94ace42b4524ee6f4143c9_NeikiAnalytics.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\89366cc5057ede24f4841be5722aabe0a6b5b7747a94ace42b4524ee6f4143c9_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\89366cc5057ede24f4841be5722aabe0a6b5b7747a94ace42b4524ee6f4143c9_NeikiAnalytics.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2424 -
C:\Users\Admin\AppData\Local\Temp\89366cc5057ede24f4841be5722aabe0a6b5b7747a94ace42b4524ee6f4143c9_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\89366cc5057ede24f4841be5722aabe0a6b5b7747a94ace42b4524ee6f4143c9_NeikiAnalytics.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:292
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
\Users\Admin\AppData\Local\Temp\89366cc5057ede24f4841be5722aabe0a6b5b7747a94ace42b4524ee6f4143c9_NeikiAnalytics.exe
Filesize56KB
MD5ccbf6c6e5f2d0247a94e21b1dd006b6b
SHA17e696bdebe1c424fdf32b99e84a6424c88c868cb
SHA256a6939d8925144e1912db3d4b3bdf6f74c33df6c6dfb1849d121b3f2719f241a9
SHA512ba3f725099be525058c711829b20ba6478f62af29f9e5041609ca74c65d0f36bec57635f9f1a9d120831a72c60f33d9999e47d569308e0ceeca7d6f6a0475362