Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
04-07-2024 16:57
Behavioral task
behavioral1
Sample
748f98d4289c294ee45a7b8a6c9aa9c0NeikiAnalytics.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
748f98d4289c294ee45a7b8a6c9aa9c0NeikiAnalytics.exe
Resource
win10v2004-20240611-en
General
-
Target
748f98d4289c294ee45a7b8a6c9aa9c0NeikiAnalytics.exe
-
Size
7.4MB
-
MD5
748f98d4289c294ee45a7b8a6c9aa9c0
-
SHA1
255b8f45a7e994abc1cb3fa97f7d09041888011c
-
SHA256
74f7d78429b1bca9516da39343118b371d14e6fdb25b8708ff3d32391c84ab8c
-
SHA512
a4a838f2cedaeb17d61bae3808adc20a8fbaeec48d8a423240c3eb18509f73782822ed499642840a64212196c1f15af7101975c9362576ff9ef257a1095825aa
-
SSDEEP
196608:SrH5P9VjurErvI9pWjgfPvzm6gsFEB4Auq:YlNurEUWjC3zDb84Auq
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 2600 748f98d4289c294ee45a7b8a6c9aa9c0NeikiAnalytics.exe -
resource yara_rule behavioral1/files/0x00060000000160f8-22.dat upx -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1260 wrote to memory of 2600 1260 748f98d4289c294ee45a7b8a6c9aa9c0NeikiAnalytics.exe 28 PID 1260 wrote to memory of 2600 1260 748f98d4289c294ee45a7b8a6c9aa9c0NeikiAnalytics.exe 28 PID 1260 wrote to memory of 2600 1260 748f98d4289c294ee45a7b8a6c9aa9c0NeikiAnalytics.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\748f98d4289c294ee45a7b8a6c9aa9c0NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\748f98d4289c294ee45a7b8a6c9aa9c0NeikiAnalytics.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1260 -
C:\Users\Admin\AppData\Local\Temp\748f98d4289c294ee45a7b8a6c9aa9c0NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\748f98d4289c294ee45a7b8a6c9aa9c0NeikiAnalytics.exe"2⤵
- Loads dropped DLL
PID:2600
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.6MB
MD5ccdbd8027f165575a66245f8e9d140de
SHA1d91786422ce1f1ad35c528d1c4cd28b753a81550
SHA256503cd34daed4f6d320731b368bbd940dbac1ff7003321a47d81d81d199cca971
SHA512870b54e4468db682b669887aeef1ffe496f3f69b219bda2405ac502d2dcd67b6542db6190ea6774abf1db5a7db429ce8f6d2fc5e88363569f15cf4df78da2311