Analysis
-
max time kernel
122s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
10-05-2024 22:53
Static task
static1
Behavioral task
behavioral1
Sample
21ee4b611cd6542d6367d51d53414350_NeikiAnalytics.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
21ee4b611cd6542d6367d51d53414350_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
21ee4b611cd6542d6367d51d53414350_NeikiAnalytics.exe
-
Size
96KB
-
MD5
21ee4b611cd6542d6367d51d53414350
-
SHA1
c95aae804b2c3e0821d66364a26ee4bf7695c2b9
-
SHA256
f7eafa4e04985cf483d490764d4ad448552e8f0ac4cc254057eefc4103ec6cce
-
SHA512
13a505d98451f1adfb9a60449ec32cd57fa95b8db44dfde228d13e859b26564d3125165c883492dfc6148d473123d86529e59292c53ff3a29323e1bb3153ba1d
-
SSDEEP
1536:mNRNuMfWgFDmSnQPiQVhhiOY8e+lAL1GOPETEhk7BLM2tM74S7V+5pUMv84WMRwd:mNR8MftnQvh9feto2Ick9LMic4Sp+7Ho
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 14 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Bbgnak32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bjbcfn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Bjbcfn32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bmeimhdj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Bmeimhdj.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad 21ee4b611cd6542d6367d51d53414350_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Biojif32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bbgnak32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Boplllob.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bhhpeafc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" 21ee4b611cd6542d6367d51d53414350_NeikiAnalytics.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Boplllob.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Bhhpeafc.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Biojif32.exe -
Executes dropped EXE 7 IoCs
pid Process 2312 Biojif32.exe 2636 Bbgnak32.exe 2504 Bjbcfn32.exe 2576 Boplllob.exe 1804 Bhhpeafc.exe 2476 Bmeimhdj.exe 2016 Cacacg32.exe -
Loads dropped DLL 18 IoCs
pid Process 1784 21ee4b611cd6542d6367d51d53414350_NeikiAnalytics.exe 1784 21ee4b611cd6542d6367d51d53414350_NeikiAnalytics.exe 2312 Biojif32.exe 2312 Biojif32.exe 2636 Bbgnak32.exe 2636 Bbgnak32.exe 2504 Bjbcfn32.exe 2504 Bjbcfn32.exe 2576 Boplllob.exe 2576 Boplllob.exe 1804 Bhhpeafc.exe 1804 Bhhpeafc.exe 2476 Bmeimhdj.exe 2476 Bmeimhdj.exe 1688 WerFault.exe 1688 WerFault.exe 1688 WerFault.exe 1688 WerFault.exe -
Drops file in System32 directory 21 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\Bhhpeafc.exe Boplllob.exe File opened for modification C:\Windows\SysWOW64\Bmeimhdj.exe Bhhpeafc.exe File created C:\Windows\SysWOW64\Cacacg32.exe Bmeimhdj.exe File opened for modification C:\Windows\SysWOW64\Cacacg32.exe Bmeimhdj.exe File created C:\Windows\SysWOW64\Bbgnak32.exe Biojif32.exe File opened for modification C:\Windows\SysWOW64\Bjbcfn32.exe Bbgnak32.exe File created C:\Windows\SysWOW64\Hqlhpf32.dll Bbgnak32.exe File created C:\Windows\SysWOW64\Boplllob.exe Bjbcfn32.exe File created C:\Windows\SysWOW64\Bmeimhdj.exe Bhhpeafc.exe File created C:\Windows\SysWOW64\Oimbjlde.dll Bhhpeafc.exe File opened for modification C:\Windows\SysWOW64\Biojif32.exe 21ee4b611cd6542d6367d51d53414350_NeikiAnalytics.exe File created C:\Windows\SysWOW64\Bjbcfn32.exe Bbgnak32.exe File opened for modification C:\Windows\SysWOW64\Boplllob.exe Bjbcfn32.exe File created C:\Windows\SysWOW64\Jodjlm32.dll Boplllob.exe File opened for modification C:\Windows\SysWOW64\Bbgnak32.exe Biojif32.exe File created C:\Windows\SysWOW64\Bhhpeafc.exe Boplllob.exe File created C:\Windows\SysWOW64\Fdlpjk32.dll Bmeimhdj.exe File created C:\Windows\SysWOW64\Biojif32.exe 21ee4b611cd6542d6367d51d53414350_NeikiAnalytics.exe File created C:\Windows\SysWOW64\Mmdgdp32.dll 21ee4b611cd6542d6367d51d53414350_NeikiAnalytics.exe File created C:\Windows\SysWOW64\Ehieciqq.dll Biojif32.exe File created C:\Windows\SysWOW64\Liggabfp.dll Bjbcfn32.exe -
Program crash 1 IoCs
pid pid_target Process 1688 2016 WerFault.exe -
Modifies registry class 24 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hqlhpf32.dll" Bbgnak32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Bbgnak32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Bjbcfn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Boplllob.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Oimbjlde.dll" Bhhpeafc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 21ee4b611cd6542d6367d51d53414350_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ehieciqq.dll" Biojif32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Biojif32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Bhhpeafc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jodjlm32.dll" Boplllob.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" 21ee4b611cd6542d6367d51d53414350_NeikiAnalytics.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Bjbcfn32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Boplllob.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Biojif32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Liggabfp.dll" Bjbcfn32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Bhhpeafc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Bmeimhdj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Fdlpjk32.dll" Bmeimhdj.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node 21ee4b611cd6542d6367d51d53414350_NeikiAnalytics.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID 21ee4b611cd6542d6367d51d53414350_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Mmdgdp32.dll" 21ee4b611cd6542d6367d51d53414350_NeikiAnalytics.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717} 21ee4b611cd6542d6367d51d53414350_NeikiAnalytics.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Bbgnak32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Bmeimhdj.exe -
Suspicious use of WriteProcessMemory 32 IoCs
description pid Process procid_target PID 1784 wrote to memory of 2312 1784 21ee4b611cd6542d6367d51d53414350_NeikiAnalytics.exe 28 PID 1784 wrote to memory of 2312 1784 21ee4b611cd6542d6367d51d53414350_NeikiAnalytics.exe 28 PID 1784 wrote to memory of 2312 1784 21ee4b611cd6542d6367d51d53414350_NeikiAnalytics.exe 28 PID 1784 wrote to memory of 2312 1784 21ee4b611cd6542d6367d51d53414350_NeikiAnalytics.exe 28 PID 2312 wrote to memory of 2636 2312 Biojif32.exe 29 PID 2312 wrote to memory of 2636 2312 Biojif32.exe 29 PID 2312 wrote to memory of 2636 2312 Biojif32.exe 29 PID 2312 wrote to memory of 2636 2312 Biojif32.exe 29 PID 2636 wrote to memory of 2504 2636 Bbgnak32.exe 30 PID 2636 wrote to memory of 2504 2636 Bbgnak32.exe 30 PID 2636 wrote to memory of 2504 2636 Bbgnak32.exe 30 PID 2636 wrote to memory of 2504 2636 Bbgnak32.exe 30 PID 2504 wrote to memory of 2576 2504 Bjbcfn32.exe 31 PID 2504 wrote to memory of 2576 2504 Bjbcfn32.exe 31 PID 2504 wrote to memory of 2576 2504 Bjbcfn32.exe 31 PID 2504 wrote to memory of 2576 2504 Bjbcfn32.exe 31 PID 2576 wrote to memory of 1804 2576 Boplllob.exe 32 PID 2576 wrote to memory of 1804 2576 Boplllob.exe 32 PID 2576 wrote to memory of 1804 2576 Boplllob.exe 32 PID 2576 wrote to memory of 1804 2576 Boplllob.exe 32 PID 1804 wrote to memory of 2476 1804 Bhhpeafc.exe 33 PID 1804 wrote to memory of 2476 1804 Bhhpeafc.exe 33 PID 1804 wrote to memory of 2476 1804 Bhhpeafc.exe 33 PID 1804 wrote to memory of 2476 1804 Bhhpeafc.exe 33 PID 2476 wrote to memory of 2016 2476 Bmeimhdj.exe 34 PID 2476 wrote to memory of 2016 2476 Bmeimhdj.exe 34 PID 2476 wrote to memory of 2016 2476 Bmeimhdj.exe 34 PID 2476 wrote to memory of 2016 2476 Bmeimhdj.exe 34 PID 2016 wrote to memory of 1688 2016 Cacacg32.exe 35 PID 2016 wrote to memory of 1688 2016 Cacacg32.exe 35 PID 2016 wrote to memory of 1688 2016 Cacacg32.exe 35 PID 2016 wrote to memory of 1688 2016 Cacacg32.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\21ee4b611cd6542d6367d51d53414350_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\21ee4b611cd6542d6367d51d53414350_NeikiAnalytics.exe"1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1784 -
C:\Windows\SysWOW64\Biojif32.exeC:\Windows\system32\Biojif32.exe2⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2312 -
C:\Windows\SysWOW64\Bbgnak32.exeC:\Windows\system32\Bbgnak32.exe3⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2636 -
C:\Windows\SysWOW64\Bjbcfn32.exeC:\Windows\system32\Bjbcfn32.exe4⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2504 -
C:\Windows\SysWOW64\Boplllob.exeC:\Windows\system32\Boplllob.exe5⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2576 -
C:\Windows\SysWOW64\Bhhpeafc.exeC:\Windows\system32\Bhhpeafc.exe6⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1804 -
C:\Windows\SysWOW64\Bmeimhdj.exeC:\Windows\system32\Bmeimhdj.exe7⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2476 -
C:\Windows\SysWOW64\Cacacg32.exeC:\Windows\system32\Cacacg32.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2016 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2016 -s 1409⤵
- Loads dropped DLL
- Program crash
PID:1688
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96KB
MD54aeda890347ca43743fc4a0df2acb1ec
SHA17d29f3cde197b51c1849d750c830c43ae0e1fe88
SHA25671b0ae14c5ad77083da584a8d9dccba3efcca247ca903c84593d96de678a831f
SHA512a4e55a6699c0edfae3fddadca93b8bb3050a64af4dbe6655ab8f557388a26edf1926b2f4d7e28d32f141f53ad0a133255e677ae8becb161fbd6d87794b96d3e4
-
Filesize
96KB
MD50cf54a9a5bb5b7c25e2bdfa69c878bc0
SHA1fd2608c46ecfa62b07ae9f6e2092df29136aa878
SHA25640ebaf77fc2cd9feccef65caa1a96c8c3b9299cfe02c1d3824ab8c4ef4aeef7f
SHA512be90aed97d1e10ed32f723b7c3ab2b3e311258728e60cbda9aeecd20c397294a692dd8e050fcf1e3945bdeb07fb9145793badec2c6cca00fceec989a4fab22c5
-
Filesize
7KB
MD5eb45c275655c2c6365dd98230855fc20
SHA124fca233d1c44f48a646685266972e6ec94d3918
SHA2569afe59853c3f2f538189fadd0af5620e1c181de2dbe38fbc9b3b615dfc166b46
SHA512cef95884e0bef5007cd81508acb4755b80ed331760a06630bb6f3026d63c3845585095b28beecbea47082c70b6cc81ef1dff27d9cfadeede7f76d758d53b4307
-
Filesize
96KB
MD539877013b8b177c82af2bb6ab7397c6f
SHA14a85d41f0658dffc3add8f951a0d6b556a295ebf
SHA2563692d53634a2838a7db82eaddb9af0855410238686ca4f677142c71c3ac48ca2
SHA5122a78886e67da9f91defe4baeefcd5da8cc94146d6737659d62d59053e1786ee963ac0ad0d28dfee4eef986962927346d4517f9ef5272fb46e0618d14d128320d
-
Filesize
96KB
MD5c8adf8ed6d577304be82be2b85ae2ff4
SHA1e0879ac3e466c2b55a9f828ddd6fa287cef05320
SHA2568e72270ce5e997fd5035eabb3f66806a032b60d357788383ac2e15ee3033067b
SHA512bc8bedc246d5bd587ff3bde3b997bd08df03623e0f9b977213529adbb6b50c7e78942c499f41836182f02ed8fbe17bfdbf09e595ffc29a4ba55330005d7a0bfd
-
Filesize
96KB
MD5b67cdd21afe06957fe41521112727f3d
SHA15cd3ce723d3fc38b094598d8e4da0160e9f9c307
SHA256b0617ebdbb3c9be6673fcd19641f6a71d8627cd82532c6be609f5b326b6d1fb8
SHA51203bf4468ecbee5388607ad141d5bb02b238e78cdc8bba8879408d4dc594c7d74b1fc94245d11e34992a400150c87ae461421506816df18e4123a39c40b116e79
-
Filesize
96KB
MD51b565b8ceb4d37c84cf296db90b67322
SHA1403e2871b2c58961fad995994ca32342dcd9f12c
SHA256e238063e4aa6cce9c7e69c4060f05e1c4a0ab43c3a4814741906d9985ea72019
SHA512f6104e538a5ea7eba40f4a0b999a7f86f9e869efd8d15d636c9221bb3bdf9b7dac8ec69f806b31931172c4dd8cb53f59ca4cbd06eb097b88e21ad89f39439cf9
-
Filesize
96KB
MD55b43492f92799ef2517238225f46d5a9
SHA1d14d8555c0ebde9a59a7d2b049076d79c7cd50ae
SHA256edcf7e859cf3098ff9af4ccc201e1fb11bc8779800a4ada4bc455c65af8c602c
SHA512fbe271bbbca2b290c0ce59caa81a9834c9c9ceb3c5249b26df063aeb3816b812b05955624146b4db4d69e4bc513c48e11cf87a9f8cf09aa0e2b11c09e5577cf0