Analysis
-
max time kernel
150s -
max time network
105s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
10-05-2024 22:02
Static task
static1
Behavioral task
behavioral1
Sample
1365b982a7270ebb753412d04c62fde0_NeikiAnalytics.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
1365b982a7270ebb753412d04c62fde0_NeikiAnalytics.exe
Resource
win10v2004-20240426-en
General
-
Target
1365b982a7270ebb753412d04c62fde0_NeikiAnalytics.exe
-
Size
111KB
-
MD5
1365b982a7270ebb753412d04c62fde0
-
SHA1
9deb111a73225512ee9d7ab4c11c1e3dff961575
-
SHA256
5e6b2814360d1bd170c8150ff7700224f8953cd9a3a6255e5d371b8e7f861fb5
-
SHA512
d08e0745bee1aab39f2144f2c7cd04d8fc91b3879d7f87443a4fa3b535d5999c3408f50263b059e1d17ba920f2456bfb88adfba24ae335e6c1df95deedb7a6a8
-
SSDEEP
1536:1P1K6eYrPOxOfDwTvD+bFWU+L1i4QmOexXxBxmxZx44D4dMz4n4N4t4R4R7ILiJy:p1K6Rgp4D4dMz4n4N4t4R4aEIIIIza
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" jfziem.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\International\Geo\Nation 1365b982a7270ebb753412d04c62fde0_NeikiAnalytics.exe -
Executes dropped EXE 1 IoCs
pid Process 2308 jfziem.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jfziem = "C:\\Users\\Admin\\jfziem.exe" jfziem.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2308 jfziem.exe 2308 jfziem.exe 2308 jfziem.exe 2308 jfziem.exe 2308 jfziem.exe 2308 jfziem.exe 2308 jfziem.exe 2308 jfziem.exe 2308 jfziem.exe 2308 jfziem.exe 2308 jfziem.exe 2308 jfziem.exe 2308 jfziem.exe 2308 jfziem.exe 2308 jfziem.exe 2308 jfziem.exe 2308 jfziem.exe 2308 jfziem.exe 2308 jfziem.exe 2308 jfziem.exe 2308 jfziem.exe 2308 jfziem.exe 2308 jfziem.exe 2308 jfziem.exe 2308 jfziem.exe 2308 jfziem.exe 2308 jfziem.exe 2308 jfziem.exe 2308 jfziem.exe 2308 jfziem.exe 2308 jfziem.exe 2308 jfziem.exe 2308 jfziem.exe 2308 jfziem.exe 2308 jfziem.exe 2308 jfziem.exe 2308 jfziem.exe 2308 jfziem.exe 2308 jfziem.exe 2308 jfziem.exe 2308 jfziem.exe 2308 jfziem.exe 2308 jfziem.exe 2308 jfziem.exe 2308 jfziem.exe 2308 jfziem.exe 2308 jfziem.exe 2308 jfziem.exe 2308 jfziem.exe 2308 jfziem.exe 2308 jfziem.exe 2308 jfziem.exe 2308 jfziem.exe 2308 jfziem.exe 2308 jfziem.exe 2308 jfziem.exe 2308 jfziem.exe 2308 jfziem.exe 2308 jfziem.exe 2308 jfziem.exe 2308 jfziem.exe 2308 jfziem.exe 2308 jfziem.exe 2308 jfziem.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 3752 1365b982a7270ebb753412d04c62fde0_NeikiAnalytics.exe 2308 jfziem.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3752 wrote to memory of 2308 3752 1365b982a7270ebb753412d04c62fde0_NeikiAnalytics.exe 86 PID 3752 wrote to memory of 2308 3752 1365b982a7270ebb753412d04c62fde0_NeikiAnalytics.exe 86 PID 3752 wrote to memory of 2308 3752 1365b982a7270ebb753412d04c62fde0_NeikiAnalytics.exe 86 PID 2308 wrote to memory of 3752 2308 jfziem.exe 81 PID 2308 wrote to memory of 3752 2308 jfziem.exe 81 PID 2308 wrote to memory of 3752 2308 jfziem.exe 81 PID 2308 wrote to memory of 3752 2308 jfziem.exe 81 PID 2308 wrote to memory of 3752 2308 jfziem.exe 81 PID 2308 wrote to memory of 3752 2308 jfziem.exe 81 PID 2308 wrote to memory of 3752 2308 jfziem.exe 81 PID 2308 wrote to memory of 3752 2308 jfziem.exe 81 PID 2308 wrote to memory of 3752 2308 jfziem.exe 81 PID 2308 wrote to memory of 3752 2308 jfziem.exe 81 PID 2308 wrote to memory of 3752 2308 jfziem.exe 81 PID 2308 wrote to memory of 3752 2308 jfziem.exe 81 PID 2308 wrote to memory of 3752 2308 jfziem.exe 81 PID 2308 wrote to memory of 3752 2308 jfziem.exe 81 PID 2308 wrote to memory of 3752 2308 jfziem.exe 81 PID 2308 wrote to memory of 3752 2308 jfziem.exe 81 PID 2308 wrote to memory of 3752 2308 jfziem.exe 81 PID 2308 wrote to memory of 3752 2308 jfziem.exe 81 PID 2308 wrote to memory of 3752 2308 jfziem.exe 81 PID 2308 wrote to memory of 3752 2308 jfziem.exe 81 PID 2308 wrote to memory of 3752 2308 jfziem.exe 81 PID 2308 wrote to memory of 3752 2308 jfziem.exe 81 PID 2308 wrote to memory of 3752 2308 jfziem.exe 81 PID 2308 wrote to memory of 3752 2308 jfziem.exe 81 PID 2308 wrote to memory of 3752 2308 jfziem.exe 81 PID 2308 wrote to memory of 3752 2308 jfziem.exe 81 PID 2308 wrote to memory of 3752 2308 jfziem.exe 81 PID 2308 wrote to memory of 3752 2308 jfziem.exe 81 PID 2308 wrote to memory of 3752 2308 jfziem.exe 81 PID 2308 wrote to memory of 3752 2308 jfziem.exe 81 PID 2308 wrote to memory of 3752 2308 jfziem.exe 81 PID 2308 wrote to memory of 3752 2308 jfziem.exe 81 PID 2308 wrote to memory of 3752 2308 jfziem.exe 81 PID 2308 wrote to memory of 3752 2308 jfziem.exe 81 PID 2308 wrote to memory of 3752 2308 jfziem.exe 81 PID 2308 wrote to memory of 3752 2308 jfziem.exe 81 PID 2308 wrote to memory of 3752 2308 jfziem.exe 81 PID 2308 wrote to memory of 3752 2308 jfziem.exe 81 PID 2308 wrote to memory of 3752 2308 jfziem.exe 81 PID 2308 wrote to memory of 3752 2308 jfziem.exe 81 PID 2308 wrote to memory of 3752 2308 jfziem.exe 81 PID 2308 wrote to memory of 3752 2308 jfziem.exe 81 PID 2308 wrote to memory of 3752 2308 jfziem.exe 81 PID 2308 wrote to memory of 3752 2308 jfziem.exe 81 PID 2308 wrote to memory of 3752 2308 jfziem.exe 81 PID 2308 wrote to memory of 3752 2308 jfziem.exe 81 PID 2308 wrote to memory of 3752 2308 jfziem.exe 81 PID 2308 wrote to memory of 3752 2308 jfziem.exe 81 PID 2308 wrote to memory of 3752 2308 jfziem.exe 81 PID 2308 wrote to memory of 3752 2308 jfziem.exe 81 PID 2308 wrote to memory of 3752 2308 jfziem.exe 81 PID 2308 wrote to memory of 3752 2308 jfziem.exe 81 PID 2308 wrote to memory of 3752 2308 jfziem.exe 81 PID 2308 wrote to memory of 3752 2308 jfziem.exe 81 PID 2308 wrote to memory of 3752 2308 jfziem.exe 81 PID 2308 wrote to memory of 3752 2308 jfziem.exe 81 PID 2308 wrote to memory of 3752 2308 jfziem.exe 81 PID 2308 wrote to memory of 3752 2308 jfziem.exe 81 PID 2308 wrote to memory of 3752 2308 jfziem.exe 81 PID 2308 wrote to memory of 3752 2308 jfziem.exe 81 PID 2308 wrote to memory of 3752 2308 jfziem.exe 81
Processes
-
C:\Users\Admin\AppData\Local\Temp\1365b982a7270ebb753412d04c62fde0_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\1365b982a7270ebb753412d04c62fde0_NeikiAnalytics.exe"1⤵
- Checks computer location settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3752 -
C:\Users\Admin\jfziem.exe"C:\Users\Admin\jfziem.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2308
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
111KB
MD5783cccaa6de1aff021ffcd62afc12d7a
SHA1f2f1c2567817a7be52dfed54352a2369c9c6b4d5
SHA2563bb07fdbb4feef87de1118fbdd02a7386c3196fa90765553a1b51adc6e543cb7
SHA51218090b349d8f6759074155eb908be419f1e1800b7131f13d7c531c8c1e6338ffaf184c7ddc867e8dba5c070c105a709e5927b6f154f97b1739f7fac3b3d57e24