Analysis
-
max time kernel
127s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
10/05/2024, 11:20
Behavioral task
behavioral1
Sample
d00126287437206de26600759748b860_NeikiAnalytics.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
d00126287437206de26600759748b860_NeikiAnalytics.exe
Resource
win10v2004-20240426-en
General
-
Target
d00126287437206de26600759748b860_NeikiAnalytics.exe
-
Size
256KB
-
MD5
d00126287437206de26600759748b860
-
SHA1
817eaed13987bd4a817ac7d285f8856f78b2fb39
-
SHA256
1453302aa685d783f6dad430348ddfa0033f828c1ff035481e18880c1e67871e
-
SHA512
ff4bdedefc5b20128099d9329c37440b16f5d80b0aeb53acef9ed74be0ed613d17a6381be9de35108cf9ea44abf5e40be8d5d904e66ea05e2f033f8e7368812a
-
SSDEEP
6144:WDLQxoyQ1LpnFyZ+dayL9rvolH8u3ZhGod:mQCyQ1LHk+zR7QHjGo
Malware Config
Signatures
-
Drops file in Drivers directory 1 IoCs
description ioc Process File opened for modification C:\WINDOWS\system32\drivers\etc\hosts d00126287437206de26600759748b860_NeikiAnalytics.exe -
Modifies Installed Components in the registry 2 TTPs 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe -
Deletes itself 1 IoCs
pid Process 2684 cmd.exe -
resource yara_rule behavioral1/memory/2868-0-0x0000000000400000-0x000000000048C000-memory.dmp vmprotect behavioral1/memory/2868-1-0x0000000000400000-0x000000000048C000-memory.dmp vmprotect behavioral1/memory/2868-19-0x0000000000400000-0x000000000048C000-memory.dmp vmprotect behavioral1/files/0x0008000000015ca6-21.dat vmprotect -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\Locked = "1" explorer.exe -
Modifies Internet Explorer start page 1 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Start Page = "http://www.2637.cn/?56" d00126287437206de26600759748b860_NeikiAnalytics.exe -
Modifies registry class 5 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2868 d00126287437206de26600759748b860_NeikiAnalytics.exe -
Suspicious use of AdjustPrivilegeToken 13 IoCs
description pid Process Token: SeShutdownPrivilege 2796 explorer.exe Token: SeShutdownPrivilege 2796 explorer.exe Token: SeShutdownPrivilege 2796 explorer.exe Token: SeShutdownPrivilege 2796 explorer.exe Token: SeShutdownPrivilege 2796 explorer.exe Token: SeShutdownPrivilege 2796 explorer.exe Token: SeShutdownPrivilege 2796 explorer.exe Token: SeShutdownPrivilege 2796 explorer.exe Token: SeShutdownPrivilege 2796 explorer.exe Token: SeShutdownPrivilege 2796 explorer.exe Token: SeShutdownPrivilege 2796 explorer.exe Token: SeShutdownPrivilege 2796 explorer.exe Token: SeShutdownPrivilege 2796 explorer.exe -
Suspicious use of FindShellTrayWindow 29 IoCs
pid Process 2796 explorer.exe 2796 explorer.exe 2796 explorer.exe 2796 explorer.exe 2796 explorer.exe 2796 explorer.exe 2796 explorer.exe 2796 explorer.exe 2796 explorer.exe 2796 explorer.exe 2796 explorer.exe 2796 explorer.exe 2796 explorer.exe 2796 explorer.exe 2796 explorer.exe 2796 explorer.exe 2796 explorer.exe 2796 explorer.exe 2796 explorer.exe 2796 explorer.exe 2796 explorer.exe 2796 explorer.exe 2796 explorer.exe 2796 explorer.exe 2796 explorer.exe 2796 explorer.exe 2796 explorer.exe 2796 explorer.exe 2796 explorer.exe -
Suspicious use of SendNotifyMessage 18 IoCs
pid Process 2796 explorer.exe 2796 explorer.exe 2796 explorer.exe 2796 explorer.exe 2796 explorer.exe 2796 explorer.exe 2796 explorer.exe 2796 explorer.exe 2796 explorer.exe 2796 explorer.exe 2796 explorer.exe 2796 explorer.exe 2796 explorer.exe 2796 explorer.exe 2796 explorer.exe 2796 explorer.exe 2796 explorer.exe 2796 explorer.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2868 wrote to memory of 2796 2868 d00126287437206de26600759748b860_NeikiAnalytics.exe 28 PID 2868 wrote to memory of 2796 2868 d00126287437206de26600759748b860_NeikiAnalytics.exe 28 PID 2868 wrote to memory of 2796 2868 d00126287437206de26600759748b860_NeikiAnalytics.exe 28 PID 2868 wrote to memory of 2796 2868 d00126287437206de26600759748b860_NeikiAnalytics.exe 28 PID 2868 wrote to memory of 2684 2868 d00126287437206de26600759748b860_NeikiAnalytics.exe 29 PID 2868 wrote to memory of 2684 2868 d00126287437206de26600759748b860_NeikiAnalytics.exe 29 PID 2868 wrote to memory of 2684 2868 d00126287437206de26600759748b860_NeikiAnalytics.exe 29 PID 2868 wrote to memory of 2684 2868 d00126287437206de26600759748b860_NeikiAnalytics.exe 29 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\d00126287437206de26600759748b860_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\d00126287437206de26600759748b860_NeikiAnalytics.exe"1⤵
- Drops file in Drivers directory
- Modifies Internet Explorer start page
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2868 -
C:\Windows\explorer.exeC:\Windows\explorer.exe2⤵
- Modifies Installed Components in the registry
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2796
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\yyyy.bat2⤵
- Deletes itself
PID:2684
-
-
C:\Windows\explorer.exeexplorer.exe1⤵PID:2772
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
256KB
MD56736825af82365e8cbd3e802f220d5b0
SHA142acaeda55c4947429b7b1da2929fe1e1179329a
SHA256eddbfcac0bb0c5c085912157c1257a18e6d3898411ed5e68ab10cae2c051bae6
SHA512e0a160d627a7bce5046010bddc1d53cd534b1765582704523d8ae5a0ee920b086e25bca89eea634574312de4bf24858070827c7e4b1cb5afef0fe2eeabe60ace
-
Filesize
337B
MD55f0caa20b9945efb0168936be94c29ea
SHA12148cfdbc17c21925582f31d957a8d4c9957b971
SHA256ea2862fef1bf7aada54e44e3fb9608a2221aa1f8b659da8c5b76e1056c2e5f00
SHA512ff3c77e18f0673017477c2d2ca01fac99d8dbf99e0eee5df7d5d4fd9a0a32af9c174b0242109c529bb3fc6283ea7b5207d2f44adfd57ca4ba8765cdd7e7a9b96
-
Filesize
2KB
MD5a1d921556cf3a3d9d26b2ef002a7f87e
SHA16d35761aa3c8d24ab25db1d6a6e8a964bebd7121
SHA256be7dfb47e11615f6b0cda24d8d568fccb6cea492112f723b8784ee26cbe5d309
SHA512282607c9fc123c57dff829e728c4b08fe7fa27a130903907856127c9aec7d7f2c83c8e6d812208291c495cf25af195404d9010391cf53fcd12f2647475acc049