Analysis
-
max time kernel
118s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
25/06/2024, 04:20
Static task
static1
Behavioral task
behavioral1
Sample
2e488c4fe772838523ef7e86a4583eee7047519947655289cd0d063b64aebb04_NeikiAnalytics.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
2e488c4fe772838523ef7e86a4583eee7047519947655289cd0d063b64aebb04_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
2e488c4fe772838523ef7e86a4583eee7047519947655289cd0d063b64aebb04_NeikiAnalytics.exe
-
Size
702KB
-
MD5
2a290f94606090f3ed1df2fa623ad990
-
SHA1
228784f7b74d06d6d97ea2dda58a6846f96819a8
-
SHA256
2e488c4fe772838523ef7e86a4583eee7047519947655289cd0d063b64aebb04
-
SHA512
e0a096fa2b0a9247a2ce635b581007a11bec8e47285143ad881b9cc4db226778c4772f51cde03eee9dd06d5805448167c493fa77ec5382e4686b906d3e5e49e2
-
SSDEEP
12288:eSYFz/TuGt/sB1KcYmqgZvAMlUoUjG+YKtMfnkOeZb5JYiNAgAPh:OFjFt/sBlDqgZQd6XKtiMJYiPU
Malware Config
Signatures
-
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\System32\alg.exe 2e488c4fe772838523ef7e86a4583eee7047519947655289cd0d063b64aebb04_NeikiAnalytics.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeTakeOwnershipPrivilege 2380 2e488c4fe772838523ef7e86a4583eee7047519947655289cd0d063b64aebb04_NeikiAnalytics.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2e488c4fe772838523ef7e86a4583eee7047519947655289cd0d063b64aebb04_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\2e488c4fe772838523ef7e86a4583eee7047519947655289cd0d063b64aebb04_NeikiAnalytics.exe"1⤵
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:2380