Analysis
-
max time kernel
93s -
max time network
94s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
30/06/2024, 00:21
Static task
static1
Behavioral task
behavioral1
Sample
125fb7af301fa02ae24caaf4b85af3371b3881fa382b07d829dc1e7f63d69455_NeikiAnalytics.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
125fb7af301fa02ae24caaf4b85af3371b3881fa382b07d829dc1e7f63d69455_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
125fb7af301fa02ae24caaf4b85af3371b3881fa382b07d829dc1e7f63d69455_NeikiAnalytics.exe
-
Size
190KB
-
MD5
10a03e15e4439b27d84f361886827700
-
SHA1
962f350e25e927d8e9b063dc8741cd90da3dafd7
-
SHA256
125fb7af301fa02ae24caaf4b85af3371b3881fa382b07d829dc1e7f63d69455
-
SHA512
6fef880d3988abeb602a4af6fd6dbd70c495d28b9499fc15c9f3f15d39db584c504ec9b37d83b339d93e211a3c71ff83fff1596a80bb782db89fa84083804569
-
SSDEEP
3072:2CbVq5ATcuTVwk4iHzK5m72gnpULbbvdq/kwYhXV/GUaf0ff62NvvQUFeKJ3mc+i:2CbVq6Au5n4iHzF72OpEbvdqBYKl4x3r
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3472 125fb7af301fa02ae24caaf4b85af3371b3881fa382b07d829dc1e7f63d69455_NeikiAnalytics.exe -
Executes dropped EXE 1 IoCs
pid Process 3472 125fb7af301fa02ae24caaf4b85af3371b3881fa382b07d829dc1e7f63d69455_NeikiAnalytics.exe -
Program crash 2 IoCs
pid pid_target Process procid_target 3824 4888 WerFault.exe 80 1672 3472 WerFault.exe 85 -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4888 125fb7af301fa02ae24caaf4b85af3371b3881fa382b07d829dc1e7f63d69455_NeikiAnalytics.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 3472 125fb7af301fa02ae24caaf4b85af3371b3881fa382b07d829dc1e7f63d69455_NeikiAnalytics.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4888 wrote to memory of 3472 4888 125fb7af301fa02ae24caaf4b85af3371b3881fa382b07d829dc1e7f63d69455_NeikiAnalytics.exe 85 PID 4888 wrote to memory of 3472 4888 125fb7af301fa02ae24caaf4b85af3371b3881fa382b07d829dc1e7f63d69455_NeikiAnalytics.exe 85 PID 4888 wrote to memory of 3472 4888 125fb7af301fa02ae24caaf4b85af3371b3881fa382b07d829dc1e7f63d69455_NeikiAnalytics.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\125fb7af301fa02ae24caaf4b85af3371b3881fa382b07d829dc1e7f63d69455_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\125fb7af301fa02ae24caaf4b85af3371b3881fa382b07d829dc1e7f63d69455_NeikiAnalytics.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:4888 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4888 -s 3962⤵
- Program crash
PID:3824
-
-
C:\Users\Admin\AppData\Local\Temp\125fb7af301fa02ae24caaf4b85af3371b3881fa382b07d829dc1e7f63d69455_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\125fb7af301fa02ae24caaf4b85af3371b3881fa382b07d829dc1e7f63d69455_NeikiAnalytics.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:3472 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3472 -s 3643⤵
- Program crash
PID:1672
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4888 -ip 48881⤵PID:4668
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 3472 -ip 34721⤵PID:3288
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\125fb7af301fa02ae24caaf4b85af3371b3881fa382b07d829dc1e7f63d69455_NeikiAnalytics.exe
Filesize190KB
MD5f3bc9bad271e2ec924cdbf5b903badbe
SHA1f04816224addb76903537ee19cc3cda200273b06
SHA25622741786901764c06cc807b49255cd22c7ba791379849c95d7162da75f90857a
SHA5126ac3a1bb5e9028894360a95e857298292c2daf44f93a408140d4c096e86475f4fe7b1ca7275f5bb563ce83f1e21cc65eee9ab02a5a3ef0d3511f38066d5e1200