Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
01-07-2024 05:10
Behavioral task
behavioral1
Sample
37d3cd361c9397cba3683b15d9e9cfd86ffbcc98163e27a284c5378a30d8153c_NeikiAnalytics.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
37d3cd361c9397cba3683b15d9e9cfd86ffbcc98163e27a284c5378a30d8153c_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
37d3cd361c9397cba3683b15d9e9cfd86ffbcc98163e27a284c5378a30d8153c_NeikiAnalytics.exe
-
Size
200KB
-
MD5
1ba410a4d501e51c47f5800c8972a490
-
SHA1
ce38962b8467d7a26bae03256e1cda19aac6aacd
-
SHA256
37d3cd361c9397cba3683b15d9e9cfd86ffbcc98163e27a284c5378a30d8153c
-
SHA512
9518e1ca24d8ba036a4ff7f1ebc64a1335736d6fef1f6e263e09d67d60f04307a7a77e2f99f32324fcae6de9cda98363f362d716b63945ca9fb86b4c084492b7
-
SSDEEP
1536:V7Zf/FAxTWY1++PJHJXA/OsIZfzc3/Q8zxtjm8sg7Zf/FAxTWY1++PJHJXA/OsIH:fnyiQSoojmHgnyiQSoojmHhHV
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral1/memory/1708-0-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/1708-6-0x0000000000400000-0x000000000040B000-memory.dmp upx -
Drops file in System32 directory 2 IoCs
Processes:
37d3cd361c9397cba3683b15d9e9cfd86ffbcc98163e27a284c5378a30d8153c_NeikiAnalytics.exedescription ioc process File created C:\Windows\SysWOW64\Zombie.exe 37d3cd361c9397cba3683b15d9e9cfd86ffbcc98163e27a284c5378a30d8153c_NeikiAnalytics.exe File opened for modification C:\Windows\SysWOW64\Zombie.exe 37d3cd361c9397cba3683b15d9e9cfd86ffbcc98163e27a284c5378a30d8153c_NeikiAnalytics.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\37d3cd361c9397cba3683b15d9e9cfd86ffbcc98163e27a284c5378a30d8153c_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\37d3cd361c9397cba3683b15d9e9cfd86ffbcc98163e27a284c5378a30d8153c_NeikiAnalytics.exe"1⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Zombie.exe"C:\Windows\system32\Zombie.exe"2⤵