Analysis
-
max time kernel
119s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
01-07-2024 04:07
Static task
static1
Behavioral task
behavioral1
Sample
342e4c5558f96ae0d5da658a3a8264967039285079611c26ace2cf950a8b0ea2_NeikiAnalytics.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
342e4c5558f96ae0d5da658a3a8264967039285079611c26ace2cf950a8b0ea2_NeikiAnalytics.exe
Resource
win10v2004-20240226-en
General
-
Target
342e4c5558f96ae0d5da658a3a8264967039285079611c26ace2cf950a8b0ea2_NeikiAnalytics.exe
-
Size
85KB
-
MD5
5a81bc1750bc9785b3aefa3de0c58340
-
SHA1
29fcf5b7272b36ea48d9b8252d610e7d17de1a21
-
SHA256
342e4c5558f96ae0d5da658a3a8264967039285079611c26ace2cf950a8b0ea2
-
SHA512
0fc4c21c8ec1b470a04eb6955a451dfcd0a1c8835ccb0ec290a4252d5240ac3d1b4debd9bd6ef154f7d3706393ace7b2de4367c4a16dac0f161e012d62ebff9b
-
SSDEEP
1536:ldd0YXOQFinmQH+iSfBgE78/thOYsuN7htqisKldR:tXnemQeiSZgC8/7OYsuN7bnV
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
342e4c5558f96ae0d5da658a3a8264967039285079611c26ace2cf950a8b0ea2_NeikiAnalytics.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Runonce = "C:\\Windows\\system32\\runouce.exe" 342e4c5558f96ae0d5da658a3a8264967039285079611c26ace2cf950a8b0ea2_NeikiAnalytics.exe -
Drops file in System32 directory 2 IoCs
Processes:
342e4c5558f96ae0d5da658a3a8264967039285079611c26ace2cf950a8b0ea2_NeikiAnalytics.exedescription ioc process File created C:\Windows\SysWOW64\runouce.exe 342e4c5558f96ae0d5da658a3a8264967039285079611c26ace2cf950a8b0ea2_NeikiAnalytics.exe File opened for modification C:\Windows\SysWOW64\runouce.exe 342e4c5558f96ae0d5da658a3a8264967039285079611c26ace2cf950a8b0ea2_NeikiAnalytics.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
342e4c5558f96ae0d5da658a3a8264967039285079611c26ace2cf950a8b0ea2_NeikiAnalytics.exedescription pid process target process PID 2432 wrote to memory of 1864 2432 342e4c5558f96ae0d5da658a3a8264967039285079611c26ace2cf950a8b0ea2_NeikiAnalytics.exe 342e4c5558f96ae0d5da658a3a8264967039285079611c26ace2cf950a8b0ea2_NeikiAnalytics.exe PID 2432 wrote to memory of 1864 2432 342e4c5558f96ae0d5da658a3a8264967039285079611c26ace2cf950a8b0ea2_NeikiAnalytics.exe 342e4c5558f96ae0d5da658a3a8264967039285079611c26ace2cf950a8b0ea2_NeikiAnalytics.exe PID 2432 wrote to memory of 1864 2432 342e4c5558f96ae0d5da658a3a8264967039285079611c26ace2cf950a8b0ea2_NeikiAnalytics.exe 342e4c5558f96ae0d5da658a3a8264967039285079611c26ace2cf950a8b0ea2_NeikiAnalytics.exe PID 2432 wrote to memory of 1864 2432 342e4c5558f96ae0d5da658a3a8264967039285079611c26ace2cf950a8b0ea2_NeikiAnalytics.exe 342e4c5558f96ae0d5da658a3a8264967039285079611c26ace2cf950a8b0ea2_NeikiAnalytics.exe PID 2432 wrote to memory of 1864 2432 342e4c5558f96ae0d5da658a3a8264967039285079611c26ace2cf950a8b0ea2_NeikiAnalytics.exe 342e4c5558f96ae0d5da658a3a8264967039285079611c26ace2cf950a8b0ea2_NeikiAnalytics.exe PID 2432 wrote to memory of 1864 2432 342e4c5558f96ae0d5da658a3a8264967039285079611c26ace2cf950a8b0ea2_NeikiAnalytics.exe 342e4c5558f96ae0d5da658a3a8264967039285079611c26ace2cf950a8b0ea2_NeikiAnalytics.exe PID 2432 wrote to memory of 1864 2432 342e4c5558f96ae0d5da658a3a8264967039285079611c26ace2cf950a8b0ea2_NeikiAnalytics.exe 342e4c5558f96ae0d5da658a3a8264967039285079611c26ace2cf950a8b0ea2_NeikiAnalytics.exe PID 2432 wrote to memory of 1192 2432 342e4c5558f96ae0d5da658a3a8264967039285079611c26ace2cf950a8b0ea2_NeikiAnalytics.exe Explorer.EXE PID 2432 wrote to memory of 1192 2432 342e4c5558f96ae0d5da658a3a8264967039285079611c26ace2cf950a8b0ea2_NeikiAnalytics.exe Explorer.EXE
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
-
C:\Users\Admin\AppData\Local\Temp\342e4c5558f96ae0d5da658a3a8264967039285079611c26ace2cf950a8b0ea2_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\342e4c5558f96ae0d5da658a3a8264967039285079611c26ace2cf950a8b0ea2_NeikiAnalytics.exe"2⤵
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\342e4c5558f96ae0d5da658a3a8264967039285079611c26ace2cf950a8b0ea2_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\342e4c5558f96ae0d5da658a3a8264967039285079611c26ace2cf950a8b0ea2_NeikiAnalytics.exe"3⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1192-6-0x0000000002D00000-0x0000000002D01000-memory.dmpFilesize
4KB
-
memory/1192-5-0x0000000002D00000-0x0000000002D01000-memory.dmpFilesize
4KB
-
memory/1864-2-0x0000000000FB0000-0x0000000000FC8000-memory.dmpFilesize
96KB
-
memory/1864-3-0x0000000000FB0000-0x0000000000FC8000-memory.dmpFilesize
96KB
-
memory/2432-0-0x0000000000FB0000-0x0000000000FC8000-memory.dmpFilesize
96KB
-
memory/2432-1-0x0000000000090000-0x00000000000A8000-memory.dmpFilesize
96KB
-
memory/2432-7-0x0000000000FB0000-0x0000000000FC8000-memory.dmpFilesize
96KB