Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
29/06/2024, 00:04
Static task
static1
Behavioral task
behavioral1
Sample
370b65413453b74e6e2f27089d22f300793f334be4ffb5126ad099fb84c3688c_NeikiAnalytics.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
370b65413453b74e6e2f27089d22f300793f334be4ffb5126ad099fb84c3688c_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
370b65413453b74e6e2f27089d22f300793f334be4ffb5126ad099fb84c3688c_NeikiAnalytics.exe
-
Size
255KB
-
MD5
77fa5885f9dad1234298a7d0cb4360c0
-
SHA1
ff51f0a03d6239e9d3f3a5e08e29bcd063b65edc
-
SHA256
370b65413453b74e6e2f27089d22f300793f334be4ffb5126ad099fb84c3688c
-
SHA512
0ecc1c9aae3aa5a28d54acd7c38fd984210142b0048bf950f54c457b11c1155102358388329e09f745b60e5107c3dac69c3731d201d7e8d9680706df79f93a08
-
SSDEEP
6144:NC7SbM+GCWglWkYVZ7C0uCV5TveQq88c5iMczg2870V:TdlCV/9GQrlkg287o
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2188 370b65413453b74e6e2f27089d22f300793f334be4ffb5126ad099fb84c3688c_NeikiAnalytics.exe -
Executes dropped EXE 1 IoCs
pid Process 2188 370b65413453b74e6e2f27089d22f300793f334be4ffb5126ad099fb84c3688c_NeikiAnalytics.exe -
Loads dropped DLL 1 IoCs
pid Process 1976 370b65413453b74e6e2f27089d22f300793f334be4ffb5126ad099fb84c3688c_NeikiAnalytics.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1976 370b65413453b74e6e2f27089d22f300793f334be4ffb5126ad099fb84c3688c_NeikiAnalytics.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 2188 370b65413453b74e6e2f27089d22f300793f334be4ffb5126ad099fb84c3688c_NeikiAnalytics.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1976 wrote to memory of 2188 1976 370b65413453b74e6e2f27089d22f300793f334be4ffb5126ad099fb84c3688c_NeikiAnalytics.exe 29 PID 1976 wrote to memory of 2188 1976 370b65413453b74e6e2f27089d22f300793f334be4ffb5126ad099fb84c3688c_NeikiAnalytics.exe 29 PID 1976 wrote to memory of 2188 1976 370b65413453b74e6e2f27089d22f300793f334be4ffb5126ad099fb84c3688c_NeikiAnalytics.exe 29 PID 1976 wrote to memory of 2188 1976 370b65413453b74e6e2f27089d22f300793f334be4ffb5126ad099fb84c3688c_NeikiAnalytics.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\370b65413453b74e6e2f27089d22f300793f334be4ffb5126ad099fb84c3688c_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\370b65413453b74e6e2f27089d22f300793f334be4ffb5126ad099fb84c3688c_NeikiAnalytics.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:1976 -
C:\Users\Admin\AppData\Local\Temp\370b65413453b74e6e2f27089d22f300793f334be4ffb5126ad099fb84c3688c_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\370b65413453b74e6e2f27089d22f300793f334be4ffb5126ad099fb84c3688c_NeikiAnalytics.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2188
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
\Users\Admin\AppData\Local\Temp\370b65413453b74e6e2f27089d22f300793f334be4ffb5126ad099fb84c3688c_NeikiAnalytics.exe
Filesize255KB
MD55a336e4daf653bbc72bed32a05f5a5b3
SHA1098bcef80d1af8c378587817fa1589ee00f7027c
SHA256b7882a2bed5bf6f5f8eb20390f24a60a6c49185c7c6bf3878596328f88b8a2a3
SHA512d9497e8f6eee9933666fc65b607469c8cab2733ec69702e45111c76348181a029254139c268cd8ce7a026d03b8c93695d58ed3a468ff3c1fb9baa0221fc216e4