Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
25/06/2024, 22:33
Behavioral task
behavioral1
Sample
1b720f9f24b00c8c765f281bb5c3cfab228ff5325d6c3dd012488a77c647983c_NeikiAnalytics.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
1b720f9f24b00c8c765f281bb5c3cfab228ff5325d6c3dd012488a77c647983c_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
1b720f9f24b00c8c765f281bb5c3cfab228ff5325d6c3dd012488a77c647983c_NeikiAnalytics.exe
-
Size
6.8MB
-
MD5
79d9423502a9f99e7f2ab88361483b30
-
SHA1
50fda6b7d426eea3d8e1e61bad1a38c7ecd7f4d0
-
SHA256
1b720f9f24b00c8c765f281bb5c3cfab228ff5325d6c3dd012488a77c647983c
-
SHA512
37db94c95ceb34c2baa11a3ed43b198c8aa02c3338d2caab60d1e728d6a9620c31469e77ba5fed6801925dc4f953f74d305f27bd32e7d716f42774c866b8f753
-
SSDEEP
98304:llg4444444444444444444444444444444444444444444J:lz
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1584 svrwsc.exe -
resource yara_rule behavioral1/memory/1844-0-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/files/0x00090000000122d6-4.dat upx behavioral1/memory/1584-5-0x0000000000400000-0x000000000042A000-memory.dmp upx -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\svrwsc.exe 1b720f9f24b00c8c765f281bb5c3cfab228ff5325d6c3dd012488a77c647983c_NeikiAnalytics.exe File created C:\Windows\SysWOW64\svrwsc.exe svrwsc.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\1b720f9f24b00c8c765f281bb5c3cfab228ff5325d6c3dd012488a77c647983c_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\1b720f9f24b00c8c765f281bb5c3cfab228ff5325d6c3dd012488a77c647983c_NeikiAnalytics.exe"1⤵
- Drops file in System32 directory
PID:1844
-
C:\Windows\SysWOW64\svrwsc.exeC:\Windows\SysWOW64\svrwsc.exe1⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1584
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
7.2MB
MD537f12f5860c748ca8a2deb8913b094f8
SHA1d8a12bf0e54ec5ad33b893312532bb0bc6e73947
SHA2562bf6fcd868ac4cb5bb6be80f62b1707e49bd2dd5a0d7dae1a22fa0b759142196
SHA5127449f86701852a1b6bee752138967a47015cf20329560ff05ce9c64150b45cfa684d163fc9b3ebbe679b5f3edf0571f8afedeec7f24ea9ce0f1ac3d5bc5b9872