Analysis
-
max time kernel
117s -
max time network
117s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
25/06/2024, 23:34
Behavioral task
behavioral1
Sample
246bf2a185b172d9495de494750eda2fa6e85c0dd44def2fcae9473a5e53d538_NeikiAnalytics.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
246bf2a185b172d9495de494750eda2fa6e85c0dd44def2fcae9473a5e53d538_NeikiAnalytics.exe
Resource
win10v2004-20240611-en
General
-
Target
246bf2a185b172d9495de494750eda2fa6e85c0dd44def2fcae9473a5e53d538_NeikiAnalytics.exe
-
Size
59KB
-
MD5
f93578bd6bebe2b5f8825db989cca1a0
-
SHA1
dd1f0779ad4af9a5847d3b55a94803bab73d8788
-
SHA256
246bf2a185b172d9495de494750eda2fa6e85c0dd44def2fcae9473a5e53d538
-
SHA512
a6e9c65ea4d3056b988a43bbf125edc7e32172d5ded1a8c0ab3ee9ede4547f8d3e16ae70c42b40f04bea66a8a9cfc4b6ba04735192dab0a04ee43d9ae6131448
-
SSDEEP
768:HZgO6moL8ifXzCknHwgHbH84J7bPBLszy2Y/nnXvvJ1GS7jc0uWEJ8/r+j58GQ:5gODivrnHFvJ71aMfBR7LEJ8w5
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2772 246bf2a185b172d9495de494750eda2fa6e85c0dd44def2fcae9473a5e53d538_NeikiAnalytics.exe -
Executes dropped EXE 1 IoCs
pid Process 2772 246bf2a185b172d9495de494750eda2fa6e85c0dd44def2fcae9473a5e53d538_NeikiAnalytics.exe -
Loads dropped DLL 1 IoCs
pid Process 2236 246bf2a185b172d9495de494750eda2fa6e85c0dd44def2fcae9473a5e53d538_NeikiAnalytics.exe -
resource yara_rule behavioral1/memory/2236-0-0x0000000000400000-0x000000000043D000-memory.dmp upx behavioral1/files/0x000c0000000141a1-10.dat upx behavioral1/memory/2772-16-0x0000000000400000-0x000000000043D000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2236 246bf2a185b172d9495de494750eda2fa6e85c0dd44def2fcae9473a5e53d538_NeikiAnalytics.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2236 246bf2a185b172d9495de494750eda2fa6e85c0dd44def2fcae9473a5e53d538_NeikiAnalytics.exe 2772 246bf2a185b172d9495de494750eda2fa6e85c0dd44def2fcae9473a5e53d538_NeikiAnalytics.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2236 wrote to memory of 2772 2236 246bf2a185b172d9495de494750eda2fa6e85c0dd44def2fcae9473a5e53d538_NeikiAnalytics.exe 29 PID 2236 wrote to memory of 2772 2236 246bf2a185b172d9495de494750eda2fa6e85c0dd44def2fcae9473a5e53d538_NeikiAnalytics.exe 29 PID 2236 wrote to memory of 2772 2236 246bf2a185b172d9495de494750eda2fa6e85c0dd44def2fcae9473a5e53d538_NeikiAnalytics.exe 29 PID 2236 wrote to memory of 2772 2236 246bf2a185b172d9495de494750eda2fa6e85c0dd44def2fcae9473a5e53d538_NeikiAnalytics.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\246bf2a185b172d9495de494750eda2fa6e85c0dd44def2fcae9473a5e53d538_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\246bf2a185b172d9495de494750eda2fa6e85c0dd44def2fcae9473a5e53d538_NeikiAnalytics.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2236 -
C:\Users\Admin\AppData\Local\Temp\246bf2a185b172d9495de494750eda2fa6e85c0dd44def2fcae9473a5e53d538_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\246bf2a185b172d9495de494750eda2fa6e85c0dd44def2fcae9473a5e53d538_NeikiAnalytics.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2772
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
\Users\Admin\AppData\Local\Temp\246bf2a185b172d9495de494750eda2fa6e85c0dd44def2fcae9473a5e53d538_NeikiAnalytics.exe
Filesize59KB
MD51b457f3eb72d865342ea849bfb6864ee
SHA17b83c9d00ba192ea84222c720b4873104c96ca90
SHA256203cc78c24a0f5ea9a6f51f0a71eb89373377805933f9394d428c3addcdb3c65
SHA512761ba68d634fec8b9bf46b881a7ea501665ca5c3c82a9df626d3eeba911fd25ff9abf644dc191727ef0d597abfa0c5e8d4a11f79ff41bbeb7b890cd99d1eda75