Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
10/05/2024, 21:51
Behavioral task
behavioral1
Sample
10c5b1dfe80dbc4aee5b0218f985bdb0_NeikiAnalytics.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
10c5b1dfe80dbc4aee5b0218f985bdb0_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
10c5b1dfe80dbc4aee5b0218f985bdb0_NeikiAnalytics.exe
-
Size
143KB
-
MD5
10c5b1dfe80dbc4aee5b0218f985bdb0
-
SHA1
18b9e9215f3cd027837f2d592fa7e1d4ac35fd93
-
SHA256
0aeaba709710e722d2b5221ed70b407ffb172bee91e5860b9eeb14fc764ed5d7
-
SHA512
93a266a62faa9bffbc682aafc4d586b74a4f4a08fb43f98626c616b08cf3f62505b73c8406af384460808cc5a90c9c6fdf531de7ddd721df00bfc4b3bd93c074
-
SSDEEP
3072:23Yqp6QHbSc2dHGReRRXIu5PR5idF3N93bsGfhv0vt3y:FE6QHbSc2dHGReh5P2dF3vLsGZv0vti
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 28 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad 10c5b1dfe80dbc4aee5b0218f985bdb0_NeikiAnalytics.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nnolfdcn.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nqmhbpba.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Mpdelajl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Nnmopdep.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ncihikcg.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Njljefql.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Njogjfoj.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Njacpf32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nqfbaq32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Nqfbaq32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ngpjnkpf.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Njogjfoj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Nqmhbpba.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mpdelajl.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nkjjij32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Nkjjij32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ncldnkae.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Nnolfdcn.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ncgkcl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Njacpf32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ncihikcg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" 10c5b1dfe80dbc4aee5b0218f985bdb0_NeikiAnalytics.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nnmopdep.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ncldnkae.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Njljefql.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ngpjnkpf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ncgkcl32.exe -
Malware Dropper & Backdoor - Berbew 41 IoCs
Berbew is a backdoor Trojan malware with capabilities to download and install a range of additional malicious software, such as other Trojans, ransomware, and cryptominers.
resource yara_rule behavioral2/memory/1244-0-0x0000000000400000-0x0000000000440000-memory.dmp family_berbew behavioral2/files/0x0008000000022f51-6.dat family_berbew behavioral2/memory/4388-8-0x0000000000400000-0x0000000000440000-memory.dmp family_berbew behavioral2/files/0x00070000000233fb-15.dat family_berbew behavioral2/memory/2388-20-0x0000000000400000-0x0000000000440000-memory.dmp family_berbew behavioral2/files/0x00070000000233fd-22.dat family_berbew behavioral2/memory/2196-27-0x0000000000400000-0x0000000000440000-memory.dmp family_berbew behavioral2/files/0x00070000000233ff-31.dat family_berbew behavioral2/memory/2232-36-0x0000000000400000-0x0000000000440000-memory.dmp family_berbew behavioral2/files/0x0007000000023401-38.dat family_berbew behavioral2/memory/1672-44-0x0000000000400000-0x0000000000440000-memory.dmp family_berbew behavioral2/files/0x0007000000023403-47.dat family_berbew behavioral2/memory/4752-52-0x0000000000400000-0x0000000000440000-memory.dmp family_berbew behavioral2/files/0x0007000000023405-54.dat family_berbew behavioral2/memory/3252-55-0x0000000000400000-0x0000000000440000-memory.dmp family_berbew behavioral2/files/0x0007000000023407-62.dat family_berbew behavioral2/memory/3628-64-0x0000000000400000-0x0000000000440000-memory.dmp family_berbew behavioral2/files/0x0007000000023409-70.dat family_berbew behavioral2/memory/1752-74-0x0000000000400000-0x0000000000440000-memory.dmp family_berbew behavioral2/memory/3200-79-0x0000000000400000-0x0000000000440000-memory.dmp family_berbew behavioral2/files/0x000700000002340b-78.dat family_berbew behavioral2/files/0x000700000002340d-86.dat family_berbew behavioral2/memory/2344-92-0x0000000000400000-0x0000000000440000-memory.dmp family_berbew behavioral2/files/0x000700000002340f-94.dat family_berbew behavioral2/memory/3844-96-0x0000000000400000-0x0000000000440000-memory.dmp family_berbew behavioral2/files/0x0007000000023411-103.dat family_berbew behavioral2/memory/4736-104-0x0000000000400000-0x0000000000440000-memory.dmp family_berbew behavioral2/files/0x0007000000023413-110.dat family_berbew behavioral2/memory/4576-111-0x0000000000400000-0x0000000000440000-memory.dmp family_berbew behavioral2/memory/3844-115-0x0000000000400000-0x0000000000440000-memory.dmp family_berbew behavioral2/memory/1752-118-0x0000000000400000-0x0000000000440000-memory.dmp family_berbew behavioral2/memory/3628-119-0x0000000000400000-0x0000000000440000-memory.dmp family_berbew behavioral2/memory/3200-117-0x0000000000400000-0x0000000000440000-memory.dmp family_berbew behavioral2/memory/2344-116-0x0000000000400000-0x0000000000440000-memory.dmp family_berbew behavioral2/memory/4736-114-0x0000000000400000-0x0000000000440000-memory.dmp family_berbew behavioral2/memory/4576-113-0x0000000000400000-0x0000000000440000-memory.dmp family_berbew behavioral2/memory/3252-123-0x0000000000400000-0x0000000000440000-memory.dmp family_berbew behavioral2/memory/4752-122-0x0000000000400000-0x0000000000440000-memory.dmp family_berbew behavioral2/memory/4388-124-0x0000000000400000-0x0000000000440000-memory.dmp family_berbew behavioral2/memory/2196-121-0x0000000000400000-0x0000000000440000-memory.dmp family_berbew behavioral2/memory/1244-120-0x0000000000400000-0x0000000000440000-memory.dmp family_berbew -
Executes dropped EXE 14 IoCs
pid Process 4388 Mpdelajl.exe 2388 Nkjjij32.exe 2196 Njljefql.exe 2232 Nqfbaq32.exe 1672 Ngpjnkpf.exe 4752 Njogjfoj.exe 3252 Ncgkcl32.exe 3628 Njacpf32.exe 1752 Nnmopdep.exe 3200 Ncihikcg.exe 2344 Nnolfdcn.exe 3844 Nqmhbpba.exe 4736 Ncldnkae.exe 4576 Nkcmohbg.exe -
Drops file in System32 directory 42 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\Nkcmohbg.exe Ncldnkae.exe File created C:\Windows\SysWOW64\Mpdelajl.exe 10c5b1dfe80dbc4aee5b0218f985bdb0_NeikiAnalytics.exe File opened for modification C:\Windows\SysWOW64\Njljefql.exe Nkjjij32.exe File created C:\Windows\SysWOW64\Ncihikcg.exe Nnmopdep.exe File opened for modification C:\Windows\SysWOW64\Nqmhbpba.exe Nnolfdcn.exe File created C:\Windows\SysWOW64\Ncldnkae.exe Nqmhbpba.exe File created C:\Windows\SysWOW64\Nkcmohbg.exe Ncldnkae.exe File created C:\Windows\SysWOW64\Pipfna32.dll Njogjfoj.exe File created C:\Windows\SysWOW64\Hnibdpde.dll Ncldnkae.exe File opened for modification C:\Windows\SysWOW64\Ncihikcg.exe Nnmopdep.exe File created C:\Windows\SysWOW64\Pkckjila.dll Nnmopdep.exe File opened for modification C:\Windows\SysWOW64\Mpdelajl.exe 10c5b1dfe80dbc4aee5b0218f985bdb0_NeikiAnalytics.exe File created C:\Windows\SysWOW64\Egqcbapl.dll Mpdelajl.exe File created C:\Windows\SysWOW64\Njljefql.exe Nkjjij32.exe File opened for modification C:\Windows\SysWOW64\Nqfbaq32.exe Njljefql.exe File created C:\Windows\SysWOW64\Lfcbokki.dll Ngpjnkpf.exe File created C:\Windows\SysWOW64\Cgfgaq32.dll Njacpf32.exe File created C:\Windows\SysWOW64\Nnolfdcn.exe Ncihikcg.exe File created C:\Windows\SysWOW64\Gbbkdl32.dll 10c5b1dfe80dbc4aee5b0218f985bdb0_NeikiAnalytics.exe File opened for modification C:\Windows\SysWOW64\Nkjjij32.exe Mpdelajl.exe File created C:\Windows\SysWOW64\Mlhblb32.dll Nqfbaq32.exe File opened for modification C:\Windows\SysWOW64\Njacpf32.exe Ncgkcl32.exe File created C:\Windows\SysWOW64\Nqmhbpba.exe Nnolfdcn.exe File created C:\Windows\SysWOW64\Bghhihab.dll Nnolfdcn.exe File created C:\Windows\SysWOW64\Ngpjnkpf.exe Nqfbaq32.exe File created C:\Windows\SysWOW64\Ncgkcl32.exe Njogjfoj.exe File opened for modification C:\Windows\SysWOW64\Ncgkcl32.exe Njogjfoj.exe File created C:\Windows\SysWOW64\Nnmopdep.exe Njacpf32.exe File opened for modification C:\Windows\SysWOW64\Ncldnkae.exe Nqmhbpba.exe File created C:\Windows\SysWOW64\Nqfbaq32.exe Njljefql.exe File created C:\Windows\SysWOW64\Njogjfoj.exe Ngpjnkpf.exe File opened for modification C:\Windows\SysWOW64\Njogjfoj.exe Ngpjnkpf.exe File opened for modification C:\Windows\SysWOW64\Nnolfdcn.exe Ncihikcg.exe File created C:\Windows\SysWOW64\Cknpkhch.dll Ncihikcg.exe File created C:\Windows\SysWOW64\Dlddhggk.dll Nqmhbpba.exe File created C:\Windows\SysWOW64\Npckna32.dll Njljefql.exe File created C:\Windows\SysWOW64\Njacpf32.exe Ncgkcl32.exe File created C:\Windows\SysWOW64\Lmbnpm32.dll Ncgkcl32.exe File created C:\Windows\SysWOW64\Nkjjij32.exe Mpdelajl.exe File created C:\Windows\SysWOW64\Kcbibebo.dll Nkjjij32.exe File opened for modification C:\Windows\SysWOW64\Ngpjnkpf.exe Nqfbaq32.exe File opened for modification C:\Windows\SysWOW64\Nnmopdep.exe Njacpf32.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 3372 4576 WerFault.exe 98 -
Modifies registry class 45 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Nnmopdep.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 10c5b1dfe80dbc4aee5b0218f985bdb0_NeikiAnalytics.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node 10c5b1dfe80dbc4aee5b0218f985bdb0_NeikiAnalytics.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Njljefql.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Npckna32.dll" Njljefql.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Mlhblb32.dll" Nqfbaq32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Njacpf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Cgfgaq32.dll" Njacpf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Nqmhbpba.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ncldnkae.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Bghhihab.dll" Nnolfdcn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID 10c5b1dfe80dbc4aee5b0218f985bdb0_NeikiAnalytics.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Nqfbaq32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Nqfbaq32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Lfcbokki.dll" Ngpjnkpf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Lmbnpm32.dll" Ncgkcl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ncgkcl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Njacpf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Mpdelajl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kcbibebo.dll" Nkjjij32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Egqcbapl.dll" Mpdelajl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Nkjjij32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Njogjfoj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Njogjfoj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Nnolfdcn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" 10c5b1dfe80dbc4aee5b0218f985bdb0_NeikiAnalytics.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Mpdelajl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ngpjnkpf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Pipfna32.dll" Njogjfoj.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ncihikcg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Cknpkhch.dll" Ncihikcg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Nqmhbpba.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738} 10c5b1dfe80dbc4aee5b0218f985bdb0_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Gbbkdl32.dll" 10c5b1dfe80dbc4aee5b0218f985bdb0_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Pkckjila.dll" Nnmopdep.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ncihikcg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Nnolfdcn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Njljefql.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ngpjnkpf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ncldnkae.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Nkjjij32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ncgkcl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Nnmopdep.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Dlddhggk.dll" Nqmhbpba.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hnibdpde.dll" Ncldnkae.exe -
Suspicious use of WriteProcessMemory 42 IoCs
description pid Process procid_target PID 1244 wrote to memory of 4388 1244 10c5b1dfe80dbc4aee5b0218f985bdb0_NeikiAnalytics.exe 83 PID 1244 wrote to memory of 4388 1244 10c5b1dfe80dbc4aee5b0218f985bdb0_NeikiAnalytics.exe 83 PID 1244 wrote to memory of 4388 1244 10c5b1dfe80dbc4aee5b0218f985bdb0_NeikiAnalytics.exe 83 PID 4388 wrote to memory of 2388 4388 Mpdelajl.exe 84 PID 4388 wrote to memory of 2388 4388 Mpdelajl.exe 84 PID 4388 wrote to memory of 2388 4388 Mpdelajl.exe 84 PID 2388 wrote to memory of 2196 2388 Nkjjij32.exe 85 PID 2388 wrote to memory of 2196 2388 Nkjjij32.exe 85 PID 2388 wrote to memory of 2196 2388 Nkjjij32.exe 85 PID 2196 wrote to memory of 2232 2196 Njljefql.exe 87 PID 2196 wrote to memory of 2232 2196 Njljefql.exe 87 PID 2196 wrote to memory of 2232 2196 Njljefql.exe 87 PID 2232 wrote to memory of 1672 2232 Nqfbaq32.exe 88 PID 2232 wrote to memory of 1672 2232 Nqfbaq32.exe 88 PID 2232 wrote to memory of 1672 2232 Nqfbaq32.exe 88 PID 1672 wrote to memory of 4752 1672 Ngpjnkpf.exe 89 PID 1672 wrote to memory of 4752 1672 Ngpjnkpf.exe 89 PID 1672 wrote to memory of 4752 1672 Ngpjnkpf.exe 89 PID 4752 wrote to memory of 3252 4752 Njogjfoj.exe 90 PID 4752 wrote to memory of 3252 4752 Njogjfoj.exe 90 PID 4752 wrote to memory of 3252 4752 Njogjfoj.exe 90 PID 3252 wrote to memory of 3628 3252 Ncgkcl32.exe 91 PID 3252 wrote to memory of 3628 3252 Ncgkcl32.exe 91 PID 3252 wrote to memory of 3628 3252 Ncgkcl32.exe 91 PID 3628 wrote to memory of 1752 3628 Njacpf32.exe 92 PID 3628 wrote to memory of 1752 3628 Njacpf32.exe 92 PID 3628 wrote to memory of 1752 3628 Njacpf32.exe 92 PID 1752 wrote to memory of 3200 1752 Nnmopdep.exe 94 PID 1752 wrote to memory of 3200 1752 Nnmopdep.exe 94 PID 1752 wrote to memory of 3200 1752 Nnmopdep.exe 94 PID 3200 wrote to memory of 2344 3200 Ncihikcg.exe 95 PID 3200 wrote to memory of 2344 3200 Ncihikcg.exe 95 PID 3200 wrote to memory of 2344 3200 Ncihikcg.exe 95 PID 2344 wrote to memory of 3844 2344 Nnolfdcn.exe 96 PID 2344 wrote to memory of 3844 2344 Nnolfdcn.exe 96 PID 2344 wrote to memory of 3844 2344 Nnolfdcn.exe 96 PID 3844 wrote to memory of 4736 3844 Nqmhbpba.exe 97 PID 3844 wrote to memory of 4736 3844 Nqmhbpba.exe 97 PID 3844 wrote to memory of 4736 3844 Nqmhbpba.exe 97 PID 4736 wrote to memory of 4576 4736 Ncldnkae.exe 98 PID 4736 wrote to memory of 4576 4736 Ncldnkae.exe 98 PID 4736 wrote to memory of 4576 4736 Ncldnkae.exe 98
Processes
-
C:\Users\Admin\AppData\Local\Temp\10c5b1dfe80dbc4aee5b0218f985bdb0_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\10c5b1dfe80dbc4aee5b0218f985bdb0_NeikiAnalytics.exe"1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1244 -
C:\Windows\SysWOW64\Mpdelajl.exeC:\Windows\system32\Mpdelajl.exe2⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4388 -
C:\Windows\SysWOW64\Nkjjij32.exeC:\Windows\system32\Nkjjij32.exe3⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2388 -
C:\Windows\SysWOW64\Njljefql.exeC:\Windows\system32\Njljefql.exe4⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2196 -
C:\Windows\SysWOW64\Nqfbaq32.exeC:\Windows\system32\Nqfbaq32.exe5⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2232 -
C:\Windows\SysWOW64\Ngpjnkpf.exeC:\Windows\system32\Ngpjnkpf.exe6⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1672 -
C:\Windows\SysWOW64\Njogjfoj.exeC:\Windows\system32\Njogjfoj.exe7⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4752 -
C:\Windows\SysWOW64\Ncgkcl32.exeC:\Windows\system32\Ncgkcl32.exe8⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3252 -
C:\Windows\SysWOW64\Njacpf32.exeC:\Windows\system32\Njacpf32.exe9⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3628 -
C:\Windows\SysWOW64\Nnmopdep.exeC:\Windows\system32\Nnmopdep.exe10⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1752 -
C:\Windows\SysWOW64\Ncihikcg.exeC:\Windows\system32\Ncihikcg.exe11⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3200 -
C:\Windows\SysWOW64\Nnolfdcn.exeC:\Windows\system32\Nnolfdcn.exe12⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2344 -
C:\Windows\SysWOW64\Nqmhbpba.exeC:\Windows\system32\Nqmhbpba.exe13⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3844 -
C:\Windows\SysWOW64\Ncldnkae.exeC:\Windows\system32\Ncldnkae.exe14⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4736 -
C:\Windows\SysWOW64\Nkcmohbg.exeC:\Windows\system32\Nkcmohbg.exe15⤵
- Executes dropped EXE
PID:4576 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4576 -s 40016⤵
- Program crash
PID:3372
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 4576 -ip 45761⤵PID:3788
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
143KB
MD5e2ecaf4ff1b574490aa41f57b63d0b10
SHA1639e21367f7c9d002413b244edb337dce88947a1
SHA256c849494c67960cc8f5009efab57401d056e5696da4ca6073fd5751900de0c3e7
SHA5129b54840cd5b993b010ea137c2f5b2867d5f4ae61948f7c08194e0b54b1a5d14f13e460b799a08f5cf5a5107be6d9b87213be800b4da2a2a524301ebebc090888
-
Filesize
143KB
MD5a0617aea1763f69051628b627be5c919
SHA148889a9b4bcd844a96565ac5bed7422dc003dd4a
SHA2567eb107e2be78af3b05e785df930aa1842594c285506790b7bb4c8ac794da120b
SHA5126de4e6fd52137ed5e04b0e325dad96d7ea27f48225f8d41ba17d2e5a82bbb1f180d8769edfecda4198b5d332d9b931647455c1cb88a5d6ae0345258459ca7e96
-
Filesize
143KB
MD5cf9b4d9102d518494ace3c4949628aec
SHA1406d410d51c70416b13c9c99da984838ea9f48fc
SHA256ecf1a0038d780923a72c42c4f73e14d56cde25b90f1b1388d4ec529c0b5482b5
SHA51245e72bec33745f51df730577eae451bec2234fe3f43b9a93864061fcf53e5dcbe6624288d4403b260a5681ce2b6f1446aa20ee13e40286d0e8d1c395c5e9acd5
-
Filesize
143KB
MD58fe673a573d330c19e168a013c083787
SHA1aece292f5a210caeee86d57bc97fde7916b8f0ca
SHA256db8fde4f75e7e5271cbda7c9b53d7b219f171068e59d9c09444215a1058faab9
SHA5122fa951f4186385332bbc6b4dcda4e6827bd0819bc96683219f686de82e28f2a812b88563cfe96cde40f9a7aa25feb02379817ce7164e976a04f31545cb384ddb
-
Filesize
143KB
MD512ae5f5808c047bcbaa4e74764b4fbc8
SHA15887b71cbf132a276e4c0f4fc9e8db18cde0efa1
SHA256659d51aa5a01023f29ed7747e673b72403025e488c541b614ff8176386e44819
SHA512e53a2fe730b25a6c58d621d5c0195b232c8bf9960789873e5be4ee4572d81d6765c31b95f28246b9c7df004e5d442d7778ed7e7d7f76c95ce8442d0ca151c82b
-
Filesize
143KB
MD593e1e3b3ada19589d94163df12b3bfb7
SHA1797b1b2eb52898709da4a0fc400c452008031f99
SHA2563101023a9dca9c0d630db0124fd22204f843d479da38a7d66399cef0f6a92e91
SHA51206b820677bffe9394878030c8d744d5f22bb532111a82aaa09b4073f62584fc7065a4ec5824129383698d62d147bd712eccfd8c26646a08afcc2c237fb26a368
-
Filesize
143KB
MD5a32cd88d1f74a22bc5661dbfdbef8303
SHA1ba7653498977521a93a535539f2d77c51b4fda56
SHA2562377841aedb1c6ef42e8039bf5b58571ada712f4137c47c3db51dd2ad61b4107
SHA512e1916907806c4b2ceebdde74015d8fddec0d2323c76415978bcf27b29fa458cd8e412113bd41e5ba01470a679ccdc2343322889eb5f5bc7454145c1cfea8c37f
-
Filesize
143KB
MD548e9cbad01d99d1247bc63a4e3941a8b
SHA1cf35e5424b9a5b7da38c10b6275127996fe06e9d
SHA256dd3164fff58b056deea6c19589a226488124beb29bd23a1ec39ea82cb58d01db
SHA512e35a3a646baef185566edcca6e851f7e7744a2ce111358f40b7e6601e7bfd6b59d15a8470b868e769df801f5c00c716a9ba5e8914350f8367f8ef9cddcfd7e56
-
Filesize
143KB
MD57bf97bafdc05c4e35001615cead29ac7
SHA17fc10d73ab294acd12e0855cefe9deb59403a02e
SHA25663e75dd215392509ef1130631ff7d0ca62e93037f0ebea3e48a370dd114817d8
SHA512a604a4338132f6ee7d9012faeffad5a85cf58417568292d55fdffb2697733eaf358fcec0b062af4e7913de9ecd3a7c6a8686a180e37cee4199c789c952ab84f8
-
Filesize
143KB
MD5e648f82ced7fa5ed2703bfc4a9aef167
SHA115a87a8116434641007269a46bcc4f26b960700f
SHA25667b6689cb4723b08175e5aab1ea35a3291fc0432276c671adcd335a2cd56ebbe
SHA512c24d0b9809f0828bbc70d396ada3264f9ca2c6fdc3b89859260765c5165c1fe6d1cebf487667b6ea6bf1bb691ddfd050efc406761c4826f4e51c915ba0c46369
-
Filesize
143KB
MD566cf4860e0adf132f406bfb06b73cab1
SHA162065529ca4f1fd9af00cc0476580f9e876487d5
SHA256d07ab1ca1a543e873efa94628873aecad8338f35253f74e63be9e9ec3756dcda
SHA51234800cf1b7d7e7f8b8c25b012eba304a45ecc062c24fc21b7bf194125a49da20c4b9416f41499001d17c803c9567ff6a1964e4ec8ee8c51b263705ac6cd27b30
-
Filesize
143KB
MD5471d2f2eca17aa99e548ba80dbdae00f
SHA16921d23d8f043a4847a233d9fd56ec69771a13c4
SHA2569e6624c6596a5840e8bff40b80d3b53863413463b3ac271bb4ca2b0f37dfd108
SHA51207e0c360d4a55ec023f700182579cc37104adf9d1722f959946e899ff4484a456bbf9a422ae3b4a28b233646ea692074eb0f4a10d9cde7c21df6fc8b8ef66b78
-
Filesize
143KB
MD59c54dbdc86ad5b5fbd74d53c5ac514c7
SHA151fea86b71e6a83b4a33d624c32fa7bf2a9ce69e
SHA256ef28d11f5d423bd6b58e9d00f0b1ca938457564852db847bc6009cc4544e4094
SHA512697f5b769300f977568d0bbfc217f76925220c4c8aed727b029b8006f4e507af3450ad33d57f3b10a523ff7942d1422fb20243eb20292f6cad14a2aa7f4b243f
-
Filesize
143KB
MD56310b5147e6a4bde641ae44b14df4ce6
SHA129e5aea254e99b4343cafa0a30890117b5cd918f
SHA2561858c2171e065a5db6f2599ce3932d96a65302862e3bf1bbda6e7686ac259216
SHA512ac55332969e029e0a09f8433d0391b4ded5503abc7e2809ba54bf35f0555ef7a3af015054195102700e10a38fcd774dc168414310abb53275456600562c67960