Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
09-05-2024 16:14
Behavioral task
behavioral1
Sample
858e7b34265dbcd0dc8970a76e402c50_NeikiAnalytics.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
858e7b34265dbcd0dc8970a76e402c50_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
858e7b34265dbcd0dc8970a76e402c50_NeikiAnalytics.exe
-
Size
608KB
-
MD5
858e7b34265dbcd0dc8970a76e402c50
-
SHA1
ad084d49ca4bac8002e8db21bb2f5989e0061b0c
-
SHA256
c24d5e8142bf5b1394a23bc5b08f19b9d2366bd558bd2adaecdeada2edc9186f
-
SHA512
f9e6a62d750646ba2746d3ce51fd6366ca99849fa1772368c9d345a75494db3a41b553856566f8c8b74012d18af28e9642057fe8ba684038d600f4c0ef222d28
-
SSDEEP
12288:QBG8Z5eJocFYE1nm2q/u45KX0bgcq0em/SQoz/Q:UG8Kqp
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/5084-0-0x0000000000400000-0x000000000049A000-memory.dmp upx behavioral2/memory/5084-13-0x0000000000400000-0x000000000049A000-memory.dmp upx behavioral2/files/0x00080000000233f1-16.dat upx -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 5084 set thread context of 1128 5084 858e7b34265dbcd0dc8970a76e402c50_NeikiAnalytics.exe 82 -
Modifies registry key 1 TTPs 1 IoCs
pid Process 636 reg.exe -
Suspicious use of WriteProcessMemory 19 IoCs
description pid Process procid_target PID 5084 wrote to memory of 1128 5084 858e7b34265dbcd0dc8970a76e402c50_NeikiAnalytics.exe 82 PID 5084 wrote to memory of 1128 5084 858e7b34265dbcd0dc8970a76e402c50_NeikiAnalytics.exe 82 PID 5084 wrote to memory of 1128 5084 858e7b34265dbcd0dc8970a76e402c50_NeikiAnalytics.exe 82 PID 5084 wrote to memory of 1128 5084 858e7b34265dbcd0dc8970a76e402c50_NeikiAnalytics.exe 82 PID 5084 wrote to memory of 1128 5084 858e7b34265dbcd0dc8970a76e402c50_NeikiAnalytics.exe 82 PID 5084 wrote to memory of 1128 5084 858e7b34265dbcd0dc8970a76e402c50_NeikiAnalytics.exe 82 PID 5084 wrote to memory of 1128 5084 858e7b34265dbcd0dc8970a76e402c50_NeikiAnalytics.exe 82 PID 1128 wrote to memory of 3004 1128 858e7b34265dbcd0dc8970a76e402c50_NeikiAnalytics.exe 83 PID 1128 wrote to memory of 3004 1128 858e7b34265dbcd0dc8970a76e402c50_NeikiAnalytics.exe 83 PID 1128 wrote to memory of 3004 1128 858e7b34265dbcd0dc8970a76e402c50_NeikiAnalytics.exe 83 PID 5084 wrote to memory of 3668 5084 858e7b34265dbcd0dc8970a76e402c50_NeikiAnalytics.exe 86 PID 5084 wrote to memory of 3668 5084 858e7b34265dbcd0dc8970a76e402c50_NeikiAnalytics.exe 86 PID 5084 wrote to memory of 3668 5084 858e7b34265dbcd0dc8970a76e402c50_NeikiAnalytics.exe 86 PID 3004 wrote to memory of 636 3004 cmd.exe 88 PID 3004 wrote to memory of 636 3004 cmd.exe 88 PID 3004 wrote to memory of 636 3004 cmd.exe 88 PID 3004 wrote to memory of 216 3004 cmd.exe 89 PID 3004 wrote to memory of 216 3004 cmd.exe 89 PID 3004 wrote to memory of 216 3004 cmd.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\858e7b34265dbcd0dc8970a76e402c50_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\858e7b34265dbcd0dc8970a76e402c50_NeikiAnalytics.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:5084 -
C:\Users\Admin\AppData\Local\Temp\858e7b34265dbcd0dc8970a76e402c50_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\858e7b34265dbcd0dc8970a76e402c50_NeikiAnalytics.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:1128 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\Start.bat3⤵
- Suspicious use of WriteProcessMemory
PID:3004 -
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\Associations /v ModRiskFileTypes /t REG_SZ /d .exe /f4⤵
- Modifies registry key
PID:636
-
-
C:\Windows\SysWOW64\gpupdate.exegpupdate /force4⤵PID:216
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\jnduf.bat2⤵PID:3668
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
200B
MD59cedeb0b293d2b5491225ef3d9eb2a8b
SHA1b607ef9bd319b6ec696c8dab8a314998d133298b
SHA2563fc59706783a0778da9121da52a63e34e47c82f436d5b14943e14fb418fd4f08
SHA512ec7d4544e32b1ea460895b1037a9eca2529eed45d6ee1644f83dfc4d4ad8f7c32a811ee4627bc6b243fb5d5c9e3e2b22060d6a2903692830ff1f114d2b9f3cfc
-
Filesize
307B
MD574151f19ce6de4b064f9c17389d9a901
SHA18859864d62d16eeb7323676c6b6dc636006029f9
SHA25668154e1b2e13e1f323370ed730e2a9d9cb8c1ea5ba94ced6ac22394a518b33cc
SHA51246783e880ced9a5954dc39f1e855b5c6dd841c93ba78a21ea47594c83ce947a25d65375d0e1333e6968bf1fa211a35047682c84298e687dc965bdb47ad013a80
-
Filesize
608KB
MD59aa85f3bd355ada6db230c63fc0e44ff
SHA13ff50e0a839c810f2b157603daf6051b24346d8e
SHA2561cbf1964def8e187764db79143691924087687946032cdbb1715288d65dced96
SHA51208efbf6e1f57cb7124a1de8bee816c4bf7cecddab726d50344402e404f245baef27cf42998dad2d4ee182345b437d73a698c88dee2ab7549d075a93329fc0b27