Analysis
-
max time kernel
148s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
30/06/2024, 19:59
Static task
static1
Behavioral task
behavioral1
Sample
143923747fbb5bf31a677d3066b520032c100f1e7232d37d1f6bd9ed402ef9ea_NeikiAnalytics.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
143923747fbb5bf31a677d3066b520032c100f1e7232d37d1f6bd9ed402ef9ea_NeikiAnalytics.exe
Resource
win10v2004-20240226-en
General
-
Target
143923747fbb5bf31a677d3066b520032c100f1e7232d37d1f6bd9ed402ef9ea_NeikiAnalytics.exe
-
Size
688KB
-
MD5
f7a7d8f8e8619b136facd9f6b8dfcc30
-
SHA1
74228f252b20821a66161bf631fe06fd7186b4b2
-
SHA256
143923747fbb5bf31a677d3066b520032c100f1e7232d37d1f6bd9ed402ef9ea
-
SHA512
ce82dffc02360783b48136367889b09edf44744ef67f4fffda3bdc34a571215f648a38304427eba592bab891b1377098e43811e665e7a96326952e482fb777b0
-
SSDEEP
12288:S1/aGLDCMNpNAkoSzZWD8ayX2MQCw7D0oxY0zgLjTdl9mYdOmBUji1NcJ8h4V3kK:S1/aGLDCM4D8ayGM/LnlK1jiG8h4Nk3a
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1620 pgqul.exe -
Loads dropped DLL 2 IoCs
pid Process 1028 143923747fbb5bf31a677d3066b520032c100f1e7232d37d1f6bd9ed402ef9ea_NeikiAnalytics.exe 1028 143923747fbb5bf31a677d3066b520032c100f1e7232d37d1f6bd9ed402ef9ea_NeikiAnalytics.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Windows\CurrentVersion\Run\Microsoft® Windows® Operating System = "C:\\ProgramData\\pgqul.exe" pgqul.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1028 wrote to memory of 1620 1028 143923747fbb5bf31a677d3066b520032c100f1e7232d37d1f6bd9ed402ef9ea_NeikiAnalytics.exe 28 PID 1028 wrote to memory of 1620 1028 143923747fbb5bf31a677d3066b520032c100f1e7232d37d1f6bd9ed402ef9ea_NeikiAnalytics.exe 28 PID 1028 wrote to memory of 1620 1028 143923747fbb5bf31a677d3066b520032c100f1e7232d37d1f6bd9ed402ef9ea_NeikiAnalytics.exe 28 PID 1028 wrote to memory of 1620 1028 143923747fbb5bf31a677d3066b520032c100f1e7232d37d1f6bd9ed402ef9ea_NeikiAnalytics.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\143923747fbb5bf31a677d3066b520032c100f1e7232d37d1f6bd9ed402ef9ea_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\143923747fbb5bf31a677d3066b520032c100f1e7232d37d1f6bd9ed402ef9ea_NeikiAnalytics.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1028 -
C:\ProgramData\pgqul.exe"C:\ProgramData\pgqul.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:1620
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
688KB
MD5e05fea5ab12e36d0c7f1aae50e9f6915
SHA1f7d9b368303ab821cc20da765ec3d13921ddf144
SHA256142620c7c5b87ed6c44a9600bcefc25136d26e2bd91fefb7aa3499f4253b5b96
SHA51221af6edd50545434fdee5d7be761d363ba69134573ee75f984263304c8f3d790ef13239aabbf1f2d7c0ab37b067212f4402bac40db410b6985e135ebe43d8ff8
-
Filesize
269KB
MD5ca9dfac0aff393d7ad3732c18bf722be
SHA10bbb7be6293e7fd953293d9e7d5ad0cbfbc81e75
SHA256dc2214022e8be1e51c69f9554ad5e5da74e9a9f7ec8fd2f08b3e5c9f0bb01423
SHA51285d4e203983608671fdeb61cdc7e6bd79389001a4c427f1d473de5298a737e65c6f0c6f1243a64b5608349684a180c79516519632beb33a67b44ff3e446d75c3
-
Filesize
418KB
MD5118f4099d8751d811d092eb3f99d3aed
SHA1c05daa62fcc6e4e426a58188dba95916a2663d4c
SHA25650b4af2608afbf2d8c7d729a70a35a14e58ceffce0fa3a6758a455c65c21a273
SHA5124413229f73f39e4e1191786095d0edf91173f045f29dafb847aedd727b5771599645d80890472a367eb3123c45503034ec78dc72a864c1bf0163068fe6a19ba5