Analysis
-
max time kernel
150s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
01/07/2024, 04:32
Static task
static1
Behavioral task
behavioral1
Sample
358d086a1dabc264d721aba0710842f4bb69becf5b397b88bb83d1f91ec6a14a_NeikiAnalytics.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
358d086a1dabc264d721aba0710842f4bb69becf5b397b88bb83d1f91ec6a14a_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
358d086a1dabc264d721aba0710842f4bb69becf5b397b88bb83d1f91ec6a14a_NeikiAnalytics.exe
-
Size
198KB
-
MD5
3cd6dd6fe0a69f59341cb29878d6fec0
-
SHA1
1b4198d2549f4bf295b5b187c61e72d8b73cb470
-
SHA256
358d086a1dabc264d721aba0710842f4bb69becf5b397b88bb83d1f91ec6a14a
-
SHA512
fa79b6bca2a5d78abdd6b086497cdf7df260bbe843ff62b72a4e09f8e034efb3d7794970f4958f30886d6f433c2696bad3c518075b64f2ce7abd6cfea71dd52e
-
SSDEEP
768:h/5inm+cd5rHemPXkqUEpgjVuvios1rPr4adL0NqOJMU60+ppQ1TTGfLrPsED3Vv:hRsvcdcZjosnvWZ6LQ1ErYTjipvF2G
Malware Config
Extracted
Protocol: ftp- Host:
ftp.tripod.com - Port:
21 - Username:
griptoloji - Password:
741852
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2932 jusched.exe -
Loads dropped DLL 2 IoCs
pid Process 2420 358d086a1dabc264d721aba0710842f4bb69becf5b397b88bb83d1f91ec6a14a_NeikiAnalytics.exe 2420 358d086a1dabc264d721aba0710842f4bb69becf5b397b88bb83d1f91ec6a14a_NeikiAnalytics.exe -
Drops file in Program Files directory 3 IoCs
description ioc Process File created C:\Program Files (x86)\Java\jre-09\bin\jusched.exe 358d086a1dabc264d721aba0710842f4bb69becf5b397b88bb83d1f91ec6a14a_NeikiAnalytics.exe File opened for modification C:\Program Files (x86)\Java\jre-09\bin\jusched.exe 358d086a1dabc264d721aba0710842f4bb69becf5b397b88bb83d1f91ec6a14a_NeikiAnalytics.exe File created C:\Program Files (x86)\Java\jre-09\bin\UF 358d086a1dabc264d721aba0710842f4bb69becf5b397b88bb83d1f91ec6a14a_NeikiAnalytics.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2932 jusched.exe 2932 jusched.exe 2932 jusched.exe 2932 jusched.exe 2932 jusched.exe 2932 jusched.exe 2932 jusched.exe 2932 jusched.exe 2932 jusched.exe 2932 jusched.exe 2932 jusched.exe 2932 jusched.exe 2932 jusched.exe 2932 jusched.exe 2932 jusched.exe 2932 jusched.exe 2932 jusched.exe 2932 jusched.exe 2932 jusched.exe 2932 jusched.exe 2932 jusched.exe 2932 jusched.exe 2932 jusched.exe 2932 jusched.exe 2932 jusched.exe 2932 jusched.exe 2932 jusched.exe 2932 jusched.exe 2932 jusched.exe 2932 jusched.exe 2932 jusched.exe 2932 jusched.exe 2932 jusched.exe 2932 jusched.exe 2932 jusched.exe 2932 jusched.exe 2932 jusched.exe 2932 jusched.exe 2932 jusched.exe 2932 jusched.exe 2932 jusched.exe 2932 jusched.exe 2932 jusched.exe 2932 jusched.exe 2932 jusched.exe 2932 jusched.exe 2932 jusched.exe 2932 jusched.exe 2932 jusched.exe 2932 jusched.exe 2932 jusched.exe 2932 jusched.exe 2932 jusched.exe 2932 jusched.exe 2932 jusched.exe 2932 jusched.exe 2932 jusched.exe 2932 jusched.exe 2932 jusched.exe 2932 jusched.exe 2932 jusched.exe 2932 jusched.exe 2932 jusched.exe 2932 jusched.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2420 wrote to memory of 2932 2420 358d086a1dabc264d721aba0710842f4bb69becf5b397b88bb83d1f91ec6a14a_NeikiAnalytics.exe 28 PID 2420 wrote to memory of 2932 2420 358d086a1dabc264d721aba0710842f4bb69becf5b397b88bb83d1f91ec6a14a_NeikiAnalytics.exe 28 PID 2420 wrote to memory of 2932 2420 358d086a1dabc264d721aba0710842f4bb69becf5b397b88bb83d1f91ec6a14a_NeikiAnalytics.exe 28 PID 2420 wrote to memory of 2932 2420 358d086a1dabc264d721aba0710842f4bb69becf5b397b88bb83d1f91ec6a14a_NeikiAnalytics.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\358d086a1dabc264d721aba0710842f4bb69becf5b397b88bb83d1f91ec6a14a_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\358d086a1dabc264d721aba0710842f4bb69becf5b397b88bb83d1f91ec6a14a_NeikiAnalytics.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:2420 -
C:\Program Files (x86)\Java\jre-09\bin\jusched.exe"C:\Program Files (x86)\Java\jre-09\bin\jusched.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2932
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
198KB
MD594d2db2647ede87ebe50607f3d68639c
SHA1aed1c025b79a55978af427e4009cf16bd3217c99
SHA2567ab90ff68e1c390a621c046e55bb5b5739ec94e9c347ddd84a536af86f765030
SHA5123616ecf8740976a039c1c729c2255efeba539072b31e201683367a92f2993d0e260c1894288dbb404e8b91806c554aff24fa4738fa56da525a22ce74c836d750