Analysis

  • max time kernel
    140s
  • max time network
    140s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240611-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25-06-2024 10:32

General

  • Target

    545ea7771ec7fb0d3334ac8b19220e922285c905028e61da07fefbef07b3153e_NeikiAnalytics.exe

  • Size

    412KB

  • MD5

    c90a75d5cae2eaf645d66265c642c690

  • SHA1

    d8ff038dcd88f0049715cc487d8f66e80e461aeb

  • SHA256

    545ea7771ec7fb0d3334ac8b19220e922285c905028e61da07fefbef07b3153e

  • SHA512

    d5c72cbc08ad42f03df9ba77571d994892956a10bde395ecddc0badc5e1f8aaa0ded9f670c91538d13bcd20c060907ec24e2188254b4e7fb8268aa3a49a58496

  • SSDEEP

    12288:G6NDmf76HJmN9+OGzSpKEWsrlVk3HTREacg4Clr3:GOqOHJmN9+OGzSpKEWsrlVk3HTREacgx

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Program crash 2 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of UnmapMainImage 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\545ea7771ec7fb0d3334ac8b19220e922285c905028e61da07fefbef07b3153e_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\545ea7771ec7fb0d3334ac8b19220e922285c905028e61da07fefbef07b3153e_NeikiAnalytics.exe"
    1⤵
    • Suspicious behavior: RenamesItself
    • Suspicious use of WriteProcessMemory
    PID:4776
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 4776 -s 396
      2⤵
      • Program crash
      PID:1420
    • C:\Users\Admin\AppData\Local\Temp\545ea7771ec7fb0d3334ac8b19220e922285c905028e61da07fefbef07b3153e_NeikiAnalytics.exe
      C:\Users\Admin\AppData\Local\Temp\545ea7771ec7fb0d3334ac8b19220e922285c905028e61da07fefbef07b3153e_NeikiAnalytics.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Suspicious use of UnmapMainImage
      PID:3976
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3976 -s 368
        3⤵
        • Program crash
        PID:1540
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4776 -ip 4776
    1⤵
      PID:1568
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 3976 -ip 3976
      1⤵
        PID:2032

      Network

      MITRE ATT&CK Matrix

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\545ea7771ec7fb0d3334ac8b19220e922285c905028e61da07fefbef07b3153e_NeikiAnalytics.exe

        Filesize

        412KB

        MD5

        273cd3e057f262207a26290a185c0bcd

        SHA1

        215fb7e806a4349bf0a15b569b060e0e6cd4a84d

        SHA256

        1cc036478eccff94b373cdd7cc99d1f85069007c6e8fca176b401708667e9550

        SHA512

        8c8c84cda713d41ceebb8aa11c814f433df3e5888e682ea7f55e0915fed19a13932c6f1b359b4b06616208cb343b409e2237a0ef410dcf22388b8f4ca36e0fde

      • memory/3976-7-0x0000000000400000-0x0000000000439000-memory.dmp

        Filesize

        228KB

      • memory/3976-8-0x0000000000400000-0x000000000041A000-memory.dmp

        Filesize

        104KB

      • memory/3976-13-0x00000000014C0000-0x00000000014F9000-memory.dmp

        Filesize

        228KB

      • memory/4776-0-0x0000000000400000-0x0000000000439000-memory.dmp

        Filesize

        228KB

      • memory/4776-6-0x0000000000400000-0x0000000000439000-memory.dmp

        Filesize

        228KB