General
-
Target
16501a177497cb8f84b87ba8adfb0b40_NeikiAnalytics
-
Size
220KB
-
Sample
240510-13y28ace6t
-
MD5
16501a177497cb8f84b87ba8adfb0b40
-
SHA1
ecf4e2f74b509aca27db34840538f87a22e74cc6
-
SHA256
2c2ba49344c77b9dfa0f52c0098b7ec6eb90d118c620ba161cd14af447427890
-
SHA512
74f099be591ee5835e8cb1c1bf0b343fcbbae1a00033c827b811823bae575e3d16b513df6f565cd62d5c87a5161b748229b3a2ee15e8ac2167347dfda203ee3e
-
SSDEEP
3072:YsXRmUIMitiMQose27vc+Eld+xZp2vPRL1tT06zJoxAWBcKpSP//dwRm0:ZR5IuMQoseGk7RZBGxAycKpSPX27
Static task
static1
Behavioral task
behavioral1
Sample
16501a177497cb8f84b87ba8adfb0b40_NeikiAnalytics.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
16501a177497cb8f84b87ba8adfb0b40_NeikiAnalytics.exe
Resource
win10v2004-20240426-en
Malware Config
Targets
-
-
Target
16501a177497cb8f84b87ba8adfb0b40_NeikiAnalytics
-
Size
220KB
-
MD5
16501a177497cb8f84b87ba8adfb0b40
-
SHA1
ecf4e2f74b509aca27db34840538f87a22e74cc6
-
SHA256
2c2ba49344c77b9dfa0f52c0098b7ec6eb90d118c620ba161cd14af447427890
-
SHA512
74f099be591ee5835e8cb1c1bf0b343fcbbae1a00033c827b811823bae575e3d16b513df6f565cd62d5c87a5161b748229b3a2ee15e8ac2167347dfda203ee3e
-
SSDEEP
3072:YsXRmUIMitiMQose27vc+Eld+xZp2vPRL1tT06zJoxAWBcKpSP//dwRm0:ZR5IuMQoseGk7RZBGxAycKpSPX27
Score10/10-
Modifies WinLogon for persistence
-
Modifies visiblity of hidden/system files in Explorer
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Scheduled Task/Job
1