Analysis
-
max time kernel
41s -
max time network
52s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
01-07-2024 04:44
Static task
static1
Behavioral task
behavioral1
Sample
36370484068ac0c239680d855c7aeaf26adcfcbcef75364d3069945dbdb015c1_NeikiAnalytics.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
36370484068ac0c239680d855c7aeaf26adcfcbcef75364d3069945dbdb015c1_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
36370484068ac0c239680d855c7aeaf26adcfcbcef75364d3069945dbdb015c1_NeikiAnalytics.exe
-
Size
73KB
-
MD5
332ab99c0007a221dee532195c042500
-
SHA1
26a533eac8c79fe31cfc8d044c7b3fc0cb9ae959
-
SHA256
36370484068ac0c239680d855c7aeaf26adcfcbcef75364d3069945dbdb015c1
-
SHA512
da7def01ed59c2e8a6f5820ffea263fa5e489bbf00720bac2ccc5fb7d94a741154820634874ddce7ac8a4829196388c8267bcf8091a2bfb8c19b2639f69fb00b
-
SSDEEP
1536:hbbhvDD8qtK5QPqfhVWbdsmA+RjPFLC+e5hcy0ZGUGf2g:h57LNPqfcxA+HFshxOg
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4696 [email protected] -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4548 wrote to memory of 860 4548 36370484068ac0c239680d855c7aeaf26adcfcbcef75364d3069945dbdb015c1_NeikiAnalytics.exe 82 PID 4548 wrote to memory of 860 4548 36370484068ac0c239680d855c7aeaf26adcfcbcef75364d3069945dbdb015c1_NeikiAnalytics.exe 82 PID 4548 wrote to memory of 860 4548 36370484068ac0c239680d855c7aeaf26adcfcbcef75364d3069945dbdb015c1_NeikiAnalytics.exe 82 PID 860 wrote to memory of 4696 860 cmd.exe 83 PID 860 wrote to memory of 4696 860 cmd.exe 83 PID 860 wrote to memory of 4696 860 cmd.exe 83 PID 4696 wrote to memory of 1876 4696 [email protected] 84 PID 4696 wrote to memory of 1876 4696 [email protected] 84 PID 4696 wrote to memory of 1876 4696 [email protected] 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\36370484068ac0c239680d855c7aeaf26adcfcbcef75364d3069945dbdb015c1_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\36370484068ac0c239680d855c7aeaf26adcfcbcef75364d3069945dbdb015c1_NeikiAnalytics.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4548 -
C:\Windows\SysWOW64\cmd.exePID:860
-
C:\Users\Admin\AppData\Local\Temp\[email protected]PID:4696
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c 00.exe4⤵PID:1876
-
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\[email protected]
Filesize73KB
MD53a62ed71ae6f53ee2207a75363833bdd
SHA14dac5dac2a18d7ca949ec4478299c0824c83176f
SHA2562022772299da29ebdabd81e6ee0bfaaff704d2c8610ef75651c78da385a37966
SHA512c8ca3a57bbd3a1ce9b1b059f36767465c1e8bf886bd51c26f17a3b23c860a3f2661b7ad72385235eebdf59b925ce8c00362c174d538d085616411451f9bbfbc6
-
Filesize
2KB
MD57b621943a35e7f39cf89f50cc48d7b94
SHA12858a28cf60f38025fffcd0ba2ecfec8511c197d
SHA256bef04c2f89dc115ce2763558933dba1767bf30cda6856d335ae68955923f9991
SHA5124169e664ad4e7e6891a05ceed78465e0ec44879b37fc0de97c014945e10c161f6bfb040efc24edc136e69bb115b2a1327b04cefb58141f712da856129872e8f1