Analysis
-
max time kernel
150s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
28/06/2024, 23:55
Static task
static1
Behavioral task
behavioral1
Sample
357e826628e7ff17de461568dd5e589d6c7f44b77ea218f92b100a23aca1cf1b_NeikiAnalytics.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
357e826628e7ff17de461568dd5e589d6c7f44b77ea218f92b100a23aca1cf1b_NeikiAnalytics.exe
Resource
win10v2004-20240611-en
General
-
Target
357e826628e7ff17de461568dd5e589d6c7f44b77ea218f92b100a23aca1cf1b_NeikiAnalytics.exe
-
Size
688KB
-
MD5
71085241bc90a1b54107e258884b26b0
-
SHA1
866142121778ed0e6ae44c0563e6c4b14ce024d5
-
SHA256
357e826628e7ff17de461568dd5e589d6c7f44b77ea218f92b100a23aca1cf1b
-
SHA512
f69de7ebd6184f2eeb883b9e73a762d6c952daa3a345387775fdf2fdef04b00c59d738df671ae7a33c4f68792db490efbbfd511bf47930087e14c24da5ea2328
-
SSDEEP
12288:S1/aGLDCMNpNAkoSzZWD8ayX2MQCw7D0n5wdov5RNC2TSDS0YnZRZQsQG2n7Y:S1/aGLDCM4D8ayGMLqdov5RNC2TSDS0K
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2416 dcdans.exe -
Loads dropped DLL 2 IoCs
pid Process 2208 357e826628e7ff17de461568dd5e589d6c7f44b77ea218f92b100a23aca1cf1b_NeikiAnalytics.exe 2208 357e826628e7ff17de461568dd5e589d6c7f44b77ea218f92b100a23aca1cf1b_NeikiAnalytics.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Windows\CurrentVersion\Run\Microsoft® Windows® Operating System = "C:\\ProgramData\\dcdans.exe" dcdans.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2208 wrote to memory of 2416 2208 357e826628e7ff17de461568dd5e589d6c7f44b77ea218f92b100a23aca1cf1b_NeikiAnalytics.exe 28 PID 2208 wrote to memory of 2416 2208 357e826628e7ff17de461568dd5e589d6c7f44b77ea218f92b100a23aca1cf1b_NeikiAnalytics.exe 28 PID 2208 wrote to memory of 2416 2208 357e826628e7ff17de461568dd5e589d6c7f44b77ea218f92b100a23aca1cf1b_NeikiAnalytics.exe 28 PID 2208 wrote to memory of 2416 2208 357e826628e7ff17de461568dd5e589d6c7f44b77ea218f92b100a23aca1cf1b_NeikiAnalytics.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\357e826628e7ff17de461568dd5e589d6c7f44b77ea218f92b100a23aca1cf1b_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\357e826628e7ff17de461568dd5e589d6c7f44b77ea218f92b100a23aca1cf1b_NeikiAnalytics.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2208 -
C:\ProgramData\dcdans.exe"C:\ProgramData\dcdans.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:2416
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
688KB
MD529d35ceb1c07bcbc7f3f53cb1ede6345
SHA117cb9305830aaefa83c0dd5617d43bd968cbae06
SHA256b647090ddf66d58c96d441cc935fe6aebbf08f82647bf549d2c37827ec5b6902
SHA512b80d0a7cf367dac0f27b19de1065b43d6b3b36ac4e063eda4df0489a796e48966ea3d54458d7c01323552ac79a646ca7b56d3a2f596dad0f600170935aa6822a
-
Filesize
269KB
MD5ca9dfac0aff393d7ad3732c18bf722be
SHA10bbb7be6293e7fd953293d9e7d5ad0cbfbc81e75
SHA256dc2214022e8be1e51c69f9554ad5e5da74e9a9f7ec8fd2f08b3e5c9f0bb01423
SHA51285d4e203983608671fdeb61cdc7e6bd79389001a4c427f1d473de5298a737e65c6f0c6f1243a64b5608349684a180c79516519632beb33a67b44ff3e446d75c3
-
Filesize
418KB
MD5f7b7d709ea7ccb6b809ebeeea30d6c52
SHA1062438bb6560b542a29a886f8344c4678d40fcc2
SHA2561acfdc079f779c07ef8769ae56f5e4882088d9492958724fd94630d0cc738957
SHA51255bae64b38567f8119ec06caf961e04208deafd1ab879a494e0b2b68271d8e616cf7b8f353bc95ee3c283cfa365c975330fc7106d280b70c632227e20e06dfb0