Analysis
-
max time kernel
148s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
25-06-2024 11:18
Static task
static1
Behavioral task
behavioral1
Sample
593122734026fa4263c6d30aadbf069ba8d89a86a7455596c6c5b9d9686887c4_NeikiAnalytics.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
593122734026fa4263c6d30aadbf069ba8d89a86a7455596c6c5b9d9686887c4_NeikiAnalytics.exe
Resource
win10v2004-20240226-en
General
-
Target
593122734026fa4263c6d30aadbf069ba8d89a86a7455596c6c5b9d9686887c4_NeikiAnalytics.exe
-
Size
3.0MB
-
MD5
711447ef8b390e33f11acc2329ee3dd0
-
SHA1
1489a6574eb70f05096aea2a4692563d28d1f8a5
-
SHA256
593122734026fa4263c6d30aadbf069ba8d89a86a7455596c6c5b9d9686887c4
-
SHA512
4e949a4b12fb56cf6be45ebc121968d6095a7213c3a14b59aa05303cd96d26b93d8e9ad51b2e86b9b4a2393aeeac35573073fad41e3af9104a02c2cdd0b236cc
-
SSDEEP
49152:R4OM6V64Ks5kDiopgGgr1GblGkUmmXON7j5GLMg/gRbOEdeQBXWaJHdfT:Rj1kPDiB1GJGpmmG71GLCdXfHp
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 464 593122734026fa4263c6d30aadbf069ba8d89a86a7455596c6c5b9d9686887c4_NeikiAnalytics.exe -
Executes dropped EXE 1 IoCs
pid Process 464 593122734026fa4263c6d30aadbf069ba8d89a86a7455596c6c5b9d9686887c4_NeikiAnalytics.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 26 pastebin.com 25 pastebin.com -
Program crash 15 IoCs
pid pid_target Process procid_target 2472 3304 WerFault.exe 91 3888 464 WerFault.exe 96 3944 464 WerFault.exe 96 3000 464 WerFault.exe 96 3528 464 WerFault.exe 96 2428 464 WerFault.exe 96 3460 464 WerFault.exe 96 5084 464 WerFault.exe 96 3324 464 WerFault.exe 96 1820 464 WerFault.exe 96 4700 464 WerFault.exe 96 216 464 WerFault.exe 96 1164 464 WerFault.exe 96 4144 464 WerFault.exe 96 2124 464 WerFault.exe 96 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 464 593122734026fa4263c6d30aadbf069ba8d89a86a7455596c6c5b9d9686887c4_NeikiAnalytics.exe 464 593122734026fa4263c6d30aadbf069ba8d89a86a7455596c6c5b9d9686887c4_NeikiAnalytics.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3304 593122734026fa4263c6d30aadbf069ba8d89a86a7455596c6c5b9d9686887c4_NeikiAnalytics.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 464 593122734026fa4263c6d30aadbf069ba8d89a86a7455596c6c5b9d9686887c4_NeikiAnalytics.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3304 wrote to memory of 464 3304 593122734026fa4263c6d30aadbf069ba8d89a86a7455596c6c5b9d9686887c4_NeikiAnalytics.exe 96 PID 3304 wrote to memory of 464 3304 593122734026fa4263c6d30aadbf069ba8d89a86a7455596c6c5b9d9686887c4_NeikiAnalytics.exe 96 PID 3304 wrote to memory of 464 3304 593122734026fa4263c6d30aadbf069ba8d89a86a7455596c6c5b9d9686887c4_NeikiAnalytics.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\593122734026fa4263c6d30aadbf069ba8d89a86a7455596c6c5b9d9686887c4_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\593122734026fa4263c6d30aadbf069ba8d89a86a7455596c6c5b9d9686887c4_NeikiAnalytics.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:3304 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3304 -s 3442⤵
- Program crash
PID:2472
-
-
C:\Users\Admin\AppData\Local\Temp\593122734026fa4263c6d30aadbf069ba8d89a86a7455596c6c5b9d9686887c4_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\593122734026fa4263c6d30aadbf069ba8d89a86a7455596c6c5b9d9686887c4_NeikiAnalytics.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
PID:464 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 464 -s 3443⤵
- Program crash
PID:3888
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 464 -s 6283⤵
- Program crash
PID:3944
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 464 -s 6363⤵
- Program crash
PID:3000
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 464 -s 6683⤵
- Program crash
PID:3528
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 464 -s 7683⤵
- Program crash
PID:2428
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 464 -s 9203⤵
- Program crash
PID:3460
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 464 -s 14003⤵
- Program crash
PID:5084
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 464 -s 14843⤵
- Program crash
PID:3324
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 464 -s 14043⤵
- Program crash
PID:1820
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 464 -s 16523⤵
- Program crash
PID:4700
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 464 -s 16483⤵
- Program crash
PID:216
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 464 -s 15523⤵
- Program crash
PID:1164
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 464 -s 16443⤵
- Program crash
PID:4144
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 464 -s 6523⤵
- Program crash
PID:2124
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 360 -p 3304 -ip 33041⤵PID:4764
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 464 -ip 4641⤵PID:4184
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 464 -ip 4641⤵PID:1680
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 464 -ip 4641⤵PID:4548
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 464 -ip 4641⤵PID:4436
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 464 -ip 4641⤵PID:1708
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 488 -p 464 -ip 4641⤵PID:3752
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 464 -ip 4641⤵PID:1552
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 464 -ip 4641⤵PID:2668
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 464 -ip 4641⤵PID:4352
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 572 -p 464 -ip 4641⤵PID:404
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 572 -p 464 -ip 4641⤵PID:2100
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 464 -ip 4641⤵PID:3852
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4136 --field-trial-handle=3192,i,2785050981002401924,4037047756083432660,262144 --variations-seed-version /prefetch:81⤵PID:3528
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 568 -p 464 -ip 4641⤵PID:4996
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 464 -ip 4641⤵PID:3568
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\593122734026fa4263c6d30aadbf069ba8d89a86a7455596c6c5b9d9686887c4_NeikiAnalytics.exe
Filesize3.0MB
MD576024bd20277673445f27e2cf3459bc0
SHA13505a6a99cf266675100e5716877e2f31f483280
SHA2564399f29fa4e64017b0250d81f65b183b69009ef3433b84926fa401f6c5a09a84
SHA512bbec7476ffd1fe8e35962c943477178042694453d65691d89f9c5c3a1c42f99c35f095b287f4109d8ebbbbd8b5a4f3a36095834b1c363d776dc1014d57264b79