Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
01-07-2024 11:34
Behavioral task
behavioral1
Sample
4ec45853c9876597054b2cc6d381ee2c57c16252524a4c2576eba63ac3ecfe4e_NeikiAnalytics.exe
Resource
win7-20240221-en
General
-
Target
4ec45853c9876597054b2cc6d381ee2c57c16252524a4c2576eba63ac3ecfe4e_NeikiAnalytics.exe
-
Size
2.0MB
-
MD5
6dd2533a23eb8806934a108e02863660
-
SHA1
86835f091c1bc6e2813756d024bafcd7efea046a
-
SHA256
4ec45853c9876597054b2cc6d381ee2c57c16252524a4c2576eba63ac3ecfe4e
-
SHA512
4f6a822dbca274ce61df139d3a446c75f6b3858085392015bfee699f6f8b0ef6fd6000eb1c7279455e47ede128ae66ea40660897c2d4d24983548ef5e520cfa9
-
SSDEEP
49152:u/vAtANIZNnXoCsgpENzeTQIKEMao62Htz5L4lzs9x6POsez2:uX+msNnFsgpEM0IKEZaj3oOda
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral1/memory/2076-12-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2076-13-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2076-23-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2076-22-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2076-14-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2076-27-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2076-56-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2076-53-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2076-51-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2076-49-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2076-47-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2076-45-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2076-43-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2076-42-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2076-39-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2076-37-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2076-35-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2076-34-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2076-31-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2076-30-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2076-25-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2076-19-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2076-18-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2076-15-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2076-55-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2076-59-0x0000000010000000-0x000000001003E000-memory.dmp upx -
Processes:
resource yara_rule behavioral1/memory/2076-0-0x0000000000400000-0x0000000000911000-memory.dmp vmprotect behavioral1/memory/2076-9-0x0000000000400000-0x0000000000911000-memory.dmp vmprotect behavioral1/memory/2076-58-0x0000000000400000-0x0000000000911000-memory.dmp vmprotect -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
4ec45853c9876597054b2cc6d381ee2c57c16252524a4c2576eba63ac3ecfe4e_NeikiAnalytics.exepid process 2076 4ec45853c9876597054b2cc6d381ee2c57c16252524a4c2576eba63ac3ecfe4e_NeikiAnalytics.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
Processes:
4ec45853c9876597054b2cc6d381ee2c57c16252524a4c2576eba63ac3ecfe4e_NeikiAnalytics.exepid process 2076 4ec45853c9876597054b2cc6d381ee2c57c16252524a4c2576eba63ac3ecfe4e_NeikiAnalytics.exe 2076 4ec45853c9876597054b2cc6d381ee2c57c16252524a4c2576eba63ac3ecfe4e_NeikiAnalytics.exe 2076 4ec45853c9876597054b2cc6d381ee2c57c16252524a4c2576eba63ac3ecfe4e_NeikiAnalytics.exe 2076 4ec45853c9876597054b2cc6d381ee2c57c16252524a4c2576eba63ac3ecfe4e_NeikiAnalytics.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\4ec45853c9876597054b2cc6d381ee2c57c16252524a4c2576eba63ac3ecfe4e_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\4ec45853c9876597054b2cc6d381ee2c57c16252524a4c2576eba63ac3ecfe4e_NeikiAnalytics.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/2076-0-0x0000000000400000-0x0000000000911000-memory.dmpFilesize
5.1MB
-
memory/2076-3-0x0000000077150000-0x0000000077151000-memory.dmpFilesize
4KB
-
memory/2076-1-0x0000000077150000-0x0000000077151000-memory.dmpFilesize
4KB
-
memory/2076-7-0x0000000074E30000-0x0000000074E31000-memory.dmpFilesize
4KB
-
memory/2076-9-0x0000000000400000-0x0000000000911000-memory.dmpFilesize
5.1MB
-
memory/2076-11-0x0000000074E30000-0x0000000074E31000-memory.dmpFilesize
4KB
-
memory/2076-12-0x0000000010000000-0x000000001003E000-memory.dmpFilesize
248KB
-
memory/2076-13-0x0000000010000000-0x000000001003E000-memory.dmpFilesize
248KB
-
memory/2076-23-0x0000000010000000-0x000000001003E000-memory.dmpFilesize
248KB
-
memory/2076-22-0x0000000010000000-0x000000001003E000-memory.dmpFilesize
248KB
-
memory/2076-14-0x0000000010000000-0x000000001003E000-memory.dmpFilesize
248KB
-
memory/2076-27-0x0000000010000000-0x000000001003E000-memory.dmpFilesize
248KB
-
memory/2076-57-0x0000000077150000-0x0000000077151000-memory.dmpFilesize
4KB
-
memory/2076-56-0x0000000010000000-0x000000001003E000-memory.dmpFilesize
248KB
-
memory/2076-53-0x0000000010000000-0x000000001003E000-memory.dmpFilesize
248KB
-
memory/2076-51-0x0000000010000000-0x000000001003E000-memory.dmpFilesize
248KB
-
memory/2076-49-0x0000000010000000-0x000000001003E000-memory.dmpFilesize
248KB
-
memory/2076-47-0x0000000010000000-0x000000001003E000-memory.dmpFilesize
248KB
-
memory/2076-45-0x0000000010000000-0x000000001003E000-memory.dmpFilesize
248KB
-
memory/2076-43-0x0000000010000000-0x000000001003E000-memory.dmpFilesize
248KB
-
memory/2076-42-0x0000000010000000-0x000000001003E000-memory.dmpFilesize
248KB
-
memory/2076-39-0x0000000010000000-0x000000001003E000-memory.dmpFilesize
248KB
-
memory/2076-37-0x0000000010000000-0x000000001003E000-memory.dmpFilesize
248KB
-
memory/2076-35-0x0000000010000000-0x000000001003E000-memory.dmpFilesize
248KB
-
memory/2076-34-0x0000000010000000-0x000000001003E000-memory.dmpFilesize
248KB
-
memory/2076-31-0x0000000010000000-0x000000001003E000-memory.dmpFilesize
248KB
-
memory/2076-30-0x0000000010000000-0x000000001003E000-memory.dmpFilesize
248KB
-
memory/2076-25-0x0000000010000000-0x000000001003E000-memory.dmpFilesize
248KB
-
memory/2076-19-0x0000000010000000-0x000000001003E000-memory.dmpFilesize
248KB
-
memory/2076-18-0x0000000010000000-0x000000001003E000-memory.dmpFilesize
248KB
-
memory/2076-15-0x0000000010000000-0x000000001003E000-memory.dmpFilesize
248KB
-
memory/2076-55-0x0000000010000000-0x000000001003E000-memory.dmpFilesize
248KB
-
memory/2076-58-0x0000000000400000-0x0000000000911000-memory.dmpFilesize
5.1MB
-
memory/2076-59-0x0000000010000000-0x000000001003E000-memory.dmpFilesize
248KB