Analysis
-
max time kernel
147s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
28-06-2024 19:56
Behavioral task
behavioral1
Sample
a8e2327878ce96f53d0629645bafb29195210b0061df7aed2b7aa43b3ccbc1bb_NeikiAnalytics.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
a8e2327878ce96f53d0629645bafb29195210b0061df7aed2b7aa43b3ccbc1bb_NeikiAnalytics.exe
Resource
win10v2004-20240611-en
General
-
Target
a8e2327878ce96f53d0629645bafb29195210b0061df7aed2b7aa43b3ccbc1bb_NeikiAnalytics.exe
-
Size
5.3MB
-
MD5
f9845d0393ae32ad62f942d86bcb5250
-
SHA1
fe0ef9adfdf9150917d522cfbf007233d0b59ea8
-
SHA256
a8e2327878ce96f53d0629645bafb29195210b0061df7aed2b7aa43b3ccbc1bb
-
SHA512
9ace006214adf986f232ad87b6363df289526ef659ac9f4be00bb1d9938a78555d8d18f4f5def5dc6f6682bdfb2ddfce9dfacd110f7d181d8b079dc481e3d6ac
-
SSDEEP
98304:Q4UuJam8M/k/0n+415zScTqve6DOAsqnYddV8aN/n/avNFz:v/Imz/Znj86NpN/n/avN5
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
gtxpdgoqkgfcmc.exepid process 4156 gtxpdgoqkgfcmc.exe -
Processes:
resource yara_rule C:\Program Files (x86)\zcealo\gtxpdgoqkgfcmc.exe vmprotect -
Drops file in Program Files directory 1 IoCs
Processes:
a8e2327878ce96f53d0629645bafb29195210b0061df7aed2b7aa43b3ccbc1bb_NeikiAnalytics.exedescription ioc process File created C:\Program Files (x86)\zcealo\gtxpdgoqkgfcmc.exe a8e2327878ce96f53d0629645bafb29195210b0061df7aed2b7aa43b3ccbc1bb_NeikiAnalytics.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
a8e2327878ce96f53d0629645bafb29195210b0061df7aed2b7aa43b3ccbc1bb_NeikiAnalytics.exedescription pid process target process PID 4416 wrote to memory of 4156 4416 a8e2327878ce96f53d0629645bafb29195210b0061df7aed2b7aa43b3ccbc1bb_NeikiAnalytics.exe gtxpdgoqkgfcmc.exe PID 4416 wrote to memory of 4156 4416 a8e2327878ce96f53d0629645bafb29195210b0061df7aed2b7aa43b3ccbc1bb_NeikiAnalytics.exe gtxpdgoqkgfcmc.exe PID 4416 wrote to memory of 4156 4416 a8e2327878ce96f53d0629645bafb29195210b0061df7aed2b7aa43b3ccbc1bb_NeikiAnalytics.exe gtxpdgoqkgfcmc.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\a8e2327878ce96f53d0629645bafb29195210b0061df7aed2b7aa43b3ccbc1bb_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\a8e2327878ce96f53d0629645bafb29195210b0061df7aed2b7aa43b3ccbc1bb_NeikiAnalytics.exe"1⤵
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\zcealo\gtxpdgoqkgfcmc.exe"C:\Program Files (x86)\zcealo\gtxpdgoqkgfcmc.exe"2⤵
- Executes dropped EXE
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Program Files (x86)\zcealo\gtxpdgoqkgfcmc.exeFilesize
5.3MB
MD53e173de9c57084932e02368124eeb7da
SHA15f5257f6821839525ab4852bafdd12735b3b8c9f
SHA2568f0b11275fabeedce6f85fdd28239b10237db628554dc01fd56b21ef98edd132
SHA512a98df9665f7f2a7f078c91d81bd9aad19cddfc878f7e70c082db53b77036f562d398bf73f143a3c254a05d416d71b1d18aed8007c9af5d4ab7a0c9f91bda4003