Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
09/05/2024, 12:10
Static task
static1
Behavioral task
behavioral1
Sample
31eccd2f6ee82765860dd3288008de70_NeikiAnalytics.dll
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
31eccd2f6ee82765860dd3288008de70_NeikiAnalytics.dll
Resource
win10v2004-20240426-en
General
-
Target
31eccd2f6ee82765860dd3288008de70_NeikiAnalytics.dll
-
Size
1.3MB
-
MD5
31eccd2f6ee82765860dd3288008de70
-
SHA1
d8986f9963c4c37b8d468ed31f2864d7e9e66d6b
-
SHA256
14642a096f590776f7b03609329f19d23b6ddc0833dee1dba5e5778f17ab0df0
-
SHA512
999fbf5be712bdc3327651a97dab89293026ded15be37706bb4ecd29083a01a8fdb13d3fabc2a84b62c695fe60c1afae60fa69e06ff768a95264bae8d8f5d8c7
-
SSDEEP
24576:a35IPsXceIr/dhTgggggggggggggggggggggggggggggggggggggggggggggggg4:apK5Z2
Malware Config
Signatures
-
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rundll32.exe -
Modifies registry class 12 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{2F09B9CC-A915-28B2-47C9-E0A512ABA8ED}\ = "Microsoft Word 6.0 - 7.0 Picture" rundll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{2F09B9CC-A915-28B2-47C9-E0A512ABA8ED}\AutoConvertTo rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{2F09B9CC-A915-28B2-47C9-E0A512ABA8ED}\AutoConvertTo\ = "{00020907-0000-0000-C000-000000000046}" rundll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{2F09B9CC-A915-28B2-47C9-E0A512ABA8ED}\DefaultIcon rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{2F09B9CC-A915-28B2-47C9-E0A512ABA8ED}\ProgId\ = "Word.Picture.6" rundll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{2F09B9CC-A915-28B2-47C9-E0A512ABA8ED}\TreatAs rundll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{2F09B9CC-A915-28B2-47C9-E0A512ABA8ED} rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{2F09B9CC-A915-28B2-47C9-E0A512ABA8ED}\DefaultIcon\ = "C:\\PROGRA~2\\MICROS~1\\Office14\\WINWORD.EXE,1" rundll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{2F09B9CC-A915-28B2-47C9-E0A512ABA8ED}\Insertable rundll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{2F09B9CC-A915-28B2-47C9-E0A512ABA8ED}\NotInsertable rundll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{2F09B9CC-A915-28B2-47C9-E0A512ABA8ED}\ProgId rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{2F09B9CC-A915-28B2-47C9-E0A512ABA8ED}\TreatAs\ = "{00020906-0000-0000-C000-000000000046}" rundll32.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: 33 2400 rundll32.exe Token: SeIncBasePriorityPrivilege 2400 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2388 wrote to memory of 2400 2388 rundll32.exe 28 PID 2388 wrote to memory of 2400 2388 rundll32.exe 28 PID 2388 wrote to memory of 2400 2388 rundll32.exe 28 PID 2388 wrote to memory of 2400 2388 rundll32.exe 28 PID 2388 wrote to memory of 2400 2388 rundll32.exe 28 PID 2388 wrote to memory of 2400 2388 rundll32.exe 28 PID 2388 wrote to memory of 2400 2388 rundll32.exe 28
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\31eccd2f6ee82765860dd3288008de70_NeikiAnalytics.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2388 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\31eccd2f6ee82765860dd3288008de70_NeikiAnalytics.dll,#12⤵
- Checks BIOS information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:2400
-