Analysis
-
max time kernel
119s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
28-06-2024 00:34
Static task
static1
Behavioral task
behavioral1
Sample
4d2df2b7228fa2692eece06864323b3ba7991cd0d162559f6dba33e3897068fc_NeikiAnalytics.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
4d2df2b7228fa2692eece06864323b3ba7991cd0d162559f6dba33e3897068fc_NeikiAnalytics.exe
Resource
win10v2004-20240611-en
General
-
Target
4d2df2b7228fa2692eece06864323b3ba7991cd0d162559f6dba33e3897068fc_NeikiAnalytics.exe
-
Size
1.4MB
-
MD5
234ceb374bb65c55e6d6b5e947eb3c70
-
SHA1
b65f23705abc87cbec2eca1d20e2b7c9969f1af0
-
SHA256
4d2df2b7228fa2692eece06864323b3ba7991cd0d162559f6dba33e3897068fc
-
SHA512
a58f39478e3e1a5d34ae5b47077ed1ac91c7c6d252325bd0c37a7e2634780beecade8054c04f540612b005ea792a8f49f99746c1ed65dcd4e283c74e9ba81183
-
SSDEEP
12288:BwXAwhaoH/uLJOyo937vGFWxwFJI+yeuVb8r+ZP712Ii+51cjVWtVj5J:yQwh52JOt934J7Z6bQaj1BvUm9J
Malware Config
Signatures
-
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\System32\alg.exe 4d2df2b7228fa2692eece06864323b3ba7991cd0d162559f6dba33e3897068fc_NeikiAnalytics.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeTakeOwnershipPrivilege 1932 4d2df2b7228fa2692eece06864323b3ba7991cd0d162559f6dba33e3897068fc_NeikiAnalytics.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\4d2df2b7228fa2692eece06864323b3ba7991cd0d162559f6dba33e3897068fc_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\4d2df2b7228fa2692eece06864323b3ba7991cd0d162559f6dba33e3897068fc_NeikiAnalytics.exe"1⤵
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:1932