Analysis
-
max time kernel
91s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
30-06-2024 22:11
Static task
static1
Behavioral task
behavioral1
Sample
1e0e606718e3632ea3a077fbe1f5f4130b0c0f5a992eccd7ab9f8d488ea07bb5_NeikiAnalytics.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
1e0e606718e3632ea3a077fbe1f5f4130b0c0f5a992eccd7ab9f8d488ea07bb5_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
1e0e606718e3632ea3a077fbe1f5f4130b0c0f5a992eccd7ab9f8d488ea07bb5_NeikiAnalytics.exe
-
Size
203KB
-
MD5
8e33d7465eb655572089a24f5b002d00
-
SHA1
dcd0153971d4d52f9d33e7fb848b3faab4ea8f3a
-
SHA256
1e0e606718e3632ea3a077fbe1f5f4130b0c0f5a992eccd7ab9f8d488ea07bb5
-
SHA512
f214e4c449631dc60110bcf09f57eaa6cb4e0519c5c192a5f7e4ddc13c6ba0b15799f1eafb03bb6e941127a7e1a4277609c37155876af53cc656e2f4dbc6ef56
-
SSDEEP
6144:SeKZO+yn1c2pYAQxfltLL1dvyeYOWMBBVMWDaABkr+G1B78:MZO7ONAQxNtLxd9V9rBkr+G1BA
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1808 1e0e606718e3632ea3a077fbe1f5f4130b0c0f5a992eccd7ab9f8d488ea07bb5_NeikiAnalytics.exe -
Executes dropped EXE 1 IoCs
pid Process 1808 1e0e606718e3632ea3a077fbe1f5f4130b0c0f5a992eccd7ab9f8d488ea07bb5_NeikiAnalytics.exe -
Program crash 2 IoCs
pid pid_target Process procid_target 2252 4620 WerFault.exe 79 2476 1808 WerFault.exe 84 -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4620 1e0e606718e3632ea3a077fbe1f5f4130b0c0f5a992eccd7ab9f8d488ea07bb5_NeikiAnalytics.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 1808 1e0e606718e3632ea3a077fbe1f5f4130b0c0f5a992eccd7ab9f8d488ea07bb5_NeikiAnalytics.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4620 wrote to memory of 1808 4620 1e0e606718e3632ea3a077fbe1f5f4130b0c0f5a992eccd7ab9f8d488ea07bb5_NeikiAnalytics.exe 84 PID 4620 wrote to memory of 1808 4620 1e0e606718e3632ea3a077fbe1f5f4130b0c0f5a992eccd7ab9f8d488ea07bb5_NeikiAnalytics.exe 84 PID 4620 wrote to memory of 1808 4620 1e0e606718e3632ea3a077fbe1f5f4130b0c0f5a992eccd7ab9f8d488ea07bb5_NeikiAnalytics.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\1e0e606718e3632ea3a077fbe1f5f4130b0c0f5a992eccd7ab9f8d488ea07bb5_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\1e0e606718e3632ea3a077fbe1f5f4130b0c0f5a992eccd7ab9f8d488ea07bb5_NeikiAnalytics.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:4620 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4620 -s 3962⤵
- Program crash
PID:2252
-
-
C:\Users\Admin\AppData\Local\Temp\1e0e606718e3632ea3a077fbe1f5f4130b0c0f5a992eccd7ab9f8d488ea07bb5_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\1e0e606718e3632ea3a077fbe1f5f4130b0c0f5a992eccd7ab9f8d488ea07bb5_NeikiAnalytics.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:1808 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1808 -s 3643⤵
- Program crash
PID:2476
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4620 -ip 46201⤵PID:5084
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 1808 -ip 18081⤵PID:3124
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\1e0e606718e3632ea3a077fbe1f5f4130b0c0f5a992eccd7ab9f8d488ea07bb5_NeikiAnalytics.exe
Filesize203KB
MD5fafcd597d2235e5a222833e1527e9fba
SHA19c1657df1ae500eb43ddb2efbc8d69e7f9a21c14
SHA256e231abea6745ab5bd8829a43fd455609e2c9f7deb5303cce662f84374f0297e7
SHA5125c1f54f1c36dbcff9c8fd4f71e3e30760645cc547a8eaa99a1ac4e5d403fcf52f028cb088ca7ebcb7e16118d22524f3381373448cf1b35459cf577ce95dc3187