Analysis
-
max time kernel
149s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
09/05/2024, 15:12
Static task
static1
Behavioral task
behavioral1
Sample
6e4f08a9ad3277c5c57f2de49f1cbef0_NeikiAnalytics.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
6e4f08a9ad3277c5c57f2de49f1cbef0_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
6e4f08a9ad3277c5c57f2de49f1cbef0_NeikiAnalytics.exe
-
Size
88KB
-
MD5
6e4f08a9ad3277c5c57f2de49f1cbef0
-
SHA1
6b6601759d29e1d40b899716fddcb847f489ac0c
-
SHA256
5c510cf0d5afeebbac2cc1648702593334a23275d85dc29701f99e43e6b6e1de
-
SHA512
63ccea9ad7ba1c9c117bac3471863245b2df1cd0faf53ec35531d0a4a6b6683c01d2fbcf7e201347a121bfe11d1f99e395cbd1a193737d3510345898aa1da1be
-
SSDEEP
1536:ahUDofByDJWbMGcEFLPEPKOJUsy1+VMA:aIofBHbKMP0PvMA
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation 6e4f08a9ad3277c5c57f2de49f1cbef0_NeikiAnalytics.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation explorer.exe -
Executes dropped EXE 4 IoCs
pid Process 1052 explorer.exe 3292 explorer.exe 4928 explorer.exe 3960 explorer.exe -
resource yara_rule behavioral2/memory/3968-18-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/memory/3968-20-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/memory/3968-22-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/memory/3968-64-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/memory/3292-94-0x0000000000400000-0x000000000040B000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Video Driver = "C:\\Users\\Admin\\AppData\\Roaming\\config\\explorer.exe" reg.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 4268 set thread context of 3968 4268 6e4f08a9ad3277c5c57f2de49f1cbef0_NeikiAnalytics.exe 85 PID 1052 set thread context of 3292 1052 explorer.exe 96 PID 1052 set thread context of 4928 1052 explorer.exe 97 PID 4928 set thread context of 3960 4928 explorer.exe 98 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 3292 explorer.exe Token: SeDebugPrivilege 3292 explorer.exe Token: SeDebugPrivilege 3292 explorer.exe Token: SeDebugPrivilege 3292 explorer.exe Token: SeDebugPrivilege 3292 explorer.exe Token: SeDebugPrivilege 3292 explorer.exe Token: SeDebugPrivilege 3292 explorer.exe Token: SeDebugPrivilege 3292 explorer.exe Token: SeDebugPrivilege 3292 explorer.exe Token: SeDebugPrivilege 3292 explorer.exe Token: SeDebugPrivilege 3292 explorer.exe Token: SeDebugPrivilege 3292 explorer.exe Token: SeDebugPrivilege 3292 explorer.exe Token: SeDebugPrivilege 3292 explorer.exe Token: SeDebugPrivilege 3292 explorer.exe Token: SeDebugPrivilege 3292 explorer.exe Token: SeDebugPrivilege 3292 explorer.exe Token: SeDebugPrivilege 3292 explorer.exe Token: SeDebugPrivilege 3292 explorer.exe Token: SeDebugPrivilege 3292 explorer.exe Token: SeDebugPrivilege 3292 explorer.exe Token: SeDebugPrivilege 3292 explorer.exe Token: SeDebugPrivilege 3292 explorer.exe Token: SeDebugPrivilege 3292 explorer.exe Token: SeDebugPrivilege 3292 explorer.exe Token: SeDebugPrivilege 3292 explorer.exe Token: SeDebugPrivilege 3292 explorer.exe Token: SeDebugPrivilege 3292 explorer.exe Token: SeDebugPrivilege 3292 explorer.exe Token: SeDebugPrivilege 3292 explorer.exe Token: SeDebugPrivilege 3292 explorer.exe Token: SeDebugPrivilege 3292 explorer.exe Token: SeDebugPrivilege 3292 explorer.exe Token: SeDebugPrivilege 3292 explorer.exe Token: SeDebugPrivilege 3292 explorer.exe Token: SeDebugPrivilege 3292 explorer.exe Token: SeDebugPrivilege 3292 explorer.exe Token: SeDebugPrivilege 3292 explorer.exe Token: SeDebugPrivilege 3292 explorer.exe Token: SeDebugPrivilege 3292 explorer.exe Token: SeDebugPrivilege 3292 explorer.exe Token: SeDebugPrivilege 3292 explorer.exe Token: SeDebugPrivilege 3292 explorer.exe Token: SeDebugPrivilege 3292 explorer.exe Token: SeDebugPrivilege 3292 explorer.exe Token: SeDebugPrivilege 3292 explorer.exe Token: SeDebugPrivilege 3292 explorer.exe Token: SeDebugPrivilege 3292 explorer.exe Token: SeDebugPrivilege 3292 explorer.exe Token: SeDebugPrivilege 3292 explorer.exe Token: SeDebugPrivilege 3292 explorer.exe Token: SeDebugPrivilege 3292 explorer.exe Token: SeDebugPrivilege 3292 explorer.exe Token: SeDebugPrivilege 3292 explorer.exe Token: SeDebugPrivilege 3292 explorer.exe Token: SeDebugPrivilege 3292 explorer.exe Token: SeDebugPrivilege 3292 explorer.exe Token: SeDebugPrivilege 3292 explorer.exe Token: SeDebugPrivilege 3292 explorer.exe Token: SeDebugPrivilege 3292 explorer.exe Token: SeDebugPrivilege 3292 explorer.exe Token: SeDebugPrivilege 3292 explorer.exe Token: SeDebugPrivilege 3292 explorer.exe Token: SeDebugPrivilege 3292 explorer.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 4268 6e4f08a9ad3277c5c57f2de49f1cbef0_NeikiAnalytics.exe 3968 6e4f08a9ad3277c5c57f2de49f1cbef0_NeikiAnalytics.exe 1052 explorer.exe 3292 explorer.exe -
Suspicious use of WriteProcessMemory 39 IoCs
description pid Process procid_target PID 4268 wrote to memory of 3968 4268 6e4f08a9ad3277c5c57f2de49f1cbef0_NeikiAnalytics.exe 85 PID 4268 wrote to memory of 3968 4268 6e4f08a9ad3277c5c57f2de49f1cbef0_NeikiAnalytics.exe 85 PID 4268 wrote to memory of 3968 4268 6e4f08a9ad3277c5c57f2de49f1cbef0_NeikiAnalytics.exe 85 PID 4268 wrote to memory of 3968 4268 6e4f08a9ad3277c5c57f2de49f1cbef0_NeikiAnalytics.exe 85 PID 4268 wrote to memory of 3968 4268 6e4f08a9ad3277c5c57f2de49f1cbef0_NeikiAnalytics.exe 85 PID 4268 wrote to memory of 3968 4268 6e4f08a9ad3277c5c57f2de49f1cbef0_NeikiAnalytics.exe 85 PID 4268 wrote to memory of 3968 4268 6e4f08a9ad3277c5c57f2de49f1cbef0_NeikiAnalytics.exe 85 PID 4268 wrote to memory of 3968 4268 6e4f08a9ad3277c5c57f2de49f1cbef0_NeikiAnalytics.exe 85 PID 3968 wrote to memory of 1388 3968 6e4f08a9ad3277c5c57f2de49f1cbef0_NeikiAnalytics.exe 88 PID 3968 wrote to memory of 1388 3968 6e4f08a9ad3277c5c57f2de49f1cbef0_NeikiAnalytics.exe 88 PID 3968 wrote to memory of 1388 3968 6e4f08a9ad3277c5c57f2de49f1cbef0_NeikiAnalytics.exe 88 PID 1388 wrote to memory of 3764 1388 cmd.exe 91 PID 1388 wrote to memory of 3764 1388 cmd.exe 91 PID 1388 wrote to memory of 3764 1388 cmd.exe 91 PID 3968 wrote to memory of 1052 3968 6e4f08a9ad3277c5c57f2de49f1cbef0_NeikiAnalytics.exe 92 PID 3968 wrote to memory of 1052 3968 6e4f08a9ad3277c5c57f2de49f1cbef0_NeikiAnalytics.exe 92 PID 3968 wrote to memory of 1052 3968 6e4f08a9ad3277c5c57f2de49f1cbef0_NeikiAnalytics.exe 92 PID 1052 wrote to memory of 3292 1052 explorer.exe 96 PID 1052 wrote to memory of 3292 1052 explorer.exe 96 PID 1052 wrote to memory of 3292 1052 explorer.exe 96 PID 1052 wrote to memory of 3292 1052 explorer.exe 96 PID 1052 wrote to memory of 3292 1052 explorer.exe 96 PID 1052 wrote to memory of 3292 1052 explorer.exe 96 PID 1052 wrote to memory of 3292 1052 explorer.exe 96 PID 1052 wrote to memory of 3292 1052 explorer.exe 96 PID 1052 wrote to memory of 4928 1052 explorer.exe 97 PID 1052 wrote to memory of 4928 1052 explorer.exe 97 PID 1052 wrote to memory of 4928 1052 explorer.exe 97 PID 1052 wrote to memory of 4928 1052 explorer.exe 97 PID 1052 wrote to memory of 4928 1052 explorer.exe 97 PID 1052 wrote to memory of 4928 1052 explorer.exe 97 PID 1052 wrote to memory of 4928 1052 explorer.exe 97 PID 4928 wrote to memory of 3960 4928 explorer.exe 98 PID 4928 wrote to memory of 3960 4928 explorer.exe 98 PID 4928 wrote to memory of 3960 4928 explorer.exe 98 PID 4928 wrote to memory of 3960 4928 explorer.exe 98 PID 4928 wrote to memory of 3960 4928 explorer.exe 98 PID 4928 wrote to memory of 3960 4928 explorer.exe 98 PID 4928 wrote to memory of 3960 4928 explorer.exe 98
Processes
-
C:\Users\Admin\AppData\Local\Temp\6e4f08a9ad3277c5c57f2de49f1cbef0_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\6e4f08a9ad3277c5c57f2de49f1cbef0_NeikiAnalytics.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4268 -
C:\Users\Admin\AppData\Local\Temp\6e4f08a9ad3277c5c57f2de49f1cbef0_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\6e4f08a9ad3277c5c57f2de49f1cbef0_NeikiAnalytics.exe"2⤵
- Checks computer location settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3968 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\KOACF.bat" "3⤵
- Suspicious use of WriteProcessMemory
PID:1388 -
C:\Windows\SysWOW64\reg.exeREG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "Video Driver" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\config\explorer.exe" /f4⤵
- Adds Run key to start application
PID:3764
-
-
-
C:\Users\Admin\AppData\Roaming\config\explorer.exe"C:\Users\Admin\AppData\Roaming\config\explorer.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1052 -
C:\Users\Admin\AppData\Roaming\config\explorer.exe"C:\Users\Admin\AppData\Roaming\config\explorer.exe"4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:3292
-
-
C:\Users\Admin\AppData\Roaming\config\explorer.exe"C:\Users\Admin\AppData\Roaming\config\explorer.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4928 -
C:\Users\Admin\AppData\Roaming\config\explorer.exe"C:\Users\Admin\AppData\Roaming\config\explorer.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
PID:3960
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
294B
MD585a640021189a52b929bbf68a114f160
SHA1d34cda2e28b4e97376e2a093dd19f185e8f988b8
SHA25681dd11f4ed47ee6c85aa4b4bf8edef31fa99ec9295770c3ea64f6ad7fbe8d74b
SHA51278ef596216836e398265021805b49107b43ca8ed47c83ab2fa50e3065cb683f47ea5dd5122ecb1a2ded8e5c34e55d5ce300ea81e5bd622d1f4ed629cf6d971f1
-
Filesize
149B
MD5fc1798b7c7938454220fda837a76f354
SHA1b232912930b2bc24ff18bf7ecd58f872bbe01ea0
SHA2567f0a5917b5aca9c5beb153aad0ef95bf0aeafb83768da5b086c3f029ba42d7c8
SHA512d1abdd45a8e5d33893b9d19424174a07feed145d2e6b4be318ab5fde503f850579a4a101a010f30e16ecde2c7123f45357a8341214655321ee0f0097ca911331
-
Filesize
88KB
MD5b70650b4ff8ae621f00432d72f70acd0
SHA13bbfcfe34b5a467753bd85f5ef331f35b1b208dc
SHA256eaae7d861e3ec611547af4d5fc53affe5c0f30693a6ee213abb18afddd81f669
SHA512a0fc1e8f3bb8f9f84177637d3a768aa4414be63a3efa57e03b7aaeaee8dbf03cee8d87c1f3de4907ce332317b50d3890ccc39c64c5df96b6e9a4ee76b0ffcf49