Analysis
-
max time kernel
155s -
max time network
162s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
10/05/2024, 12:26
Behavioral task
behavioral1
Sample
dfe7c284f8e72a64d9dc71cb8ce44ba0_NeikiAnalytics.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
dfe7c284f8e72a64d9dc71cb8ce44ba0_NeikiAnalytics.exe
Resource
win10v2004-20240226-en
General
-
Target
dfe7c284f8e72a64d9dc71cb8ce44ba0_NeikiAnalytics.exe
-
Size
2.5MB
-
MD5
dfe7c284f8e72a64d9dc71cb8ce44ba0
-
SHA1
02d1f2b4a887ea35a2e84d4cc8377bfaefbca587
-
SHA256
ae8d9735beba50ecc5669f7bc138d2bfdef8946a14ad7cd260db03eeed4f90d8
-
SHA512
81b18cc2a9ef8358877015dea52b5d3ed9d5b2a6264084decf078e51646338e17655410e69575c6b198fabf747e2acaa8e6e80209d3f3d347817540c6b4502ef
-
SSDEEP
49152:hxmvumkQ9lY9sgUXdTPSxdQ8KX75IyuWuCjcCqWOyxu:hxx9NUFkQx753uWuCyyxu
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" svchost.exe -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 5 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ spoolsv.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ dfe7c284f8e72a64d9dc71cb8ce44ba0_NeikiAnalytics.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explorer.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ spoolsv.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ svchost.exe -
Checks BIOS information in registry 2 TTPs 10 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion dfe7c284f8e72a64d9dc71cb8ce44ba0_NeikiAnalytics.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explorer.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion spoolsv.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion spoolsv.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion dfe7c284f8e72a64d9dc71cb8ce44ba0_NeikiAnalytics.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explorer.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion spoolsv.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion spoolsv.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion svchost.exe -
Executes dropped EXE 4 IoCs
pid Process 1692 explorer.exe 4600 spoolsv.exe 3868 svchost.exe 1112 spoolsv.exe -
resource yara_rule behavioral2/memory/4416-0-0x0000000000400000-0x0000000000A0E000-memory.dmp themida behavioral2/memory/4416-5-0x0000000000400000-0x0000000000A0E000-memory.dmp themida behavioral2/files/0x000900000002326c-9.dat themida behavioral2/memory/1692-11-0x0000000000400000-0x0000000000A0E000-memory.dmp themida behavioral2/files/0x0009000000023270-16.dat themida behavioral2/memory/4416-19-0x0000000000400000-0x0000000000A0E000-memory.dmp themida behavioral2/memory/4600-20-0x0000000000400000-0x0000000000A0E000-memory.dmp themida behavioral2/files/0x0008000000023272-29.dat themida behavioral2/memory/3868-30-0x0000000000400000-0x0000000000A0E000-memory.dmp themida behavioral2/memory/1692-39-0x0000000000400000-0x0000000000A0E000-memory.dmp themida behavioral2/memory/4600-40-0x0000000000400000-0x0000000000A0E000-memory.dmp themida behavioral2/memory/4416-41-0x0000000000400000-0x0000000000A0E000-memory.dmp themida behavioral2/memory/4600-43-0x0000000000400000-0x0000000000A0E000-memory.dmp themida behavioral2/memory/1112-42-0x0000000000400000-0x0000000000A0E000-memory.dmp themida behavioral2/memory/3868-44-0x0000000000400000-0x0000000000A0E000-memory.dmp themida behavioral2/memory/1692-45-0x0000000000400000-0x0000000000A0E000-memory.dmp themida behavioral2/memory/3868-47-0x0000000000400000-0x0000000000A0E000-memory.dmp themida behavioral2/memory/1692-50-0x0000000000400000-0x0000000000A0E000-memory.dmp themida behavioral2/memory/1692-52-0x0000000000400000-0x0000000000A0E000-memory.dmp themida behavioral2/memory/1692-58-0x0000000000400000-0x0000000000A0E000-memory.dmp themida -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\resources\\themes\\explorer.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\resources\\svchost.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\resources\\themes\\explorer.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\resources\\svchost.exe RO" explorer.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA dfe7c284f8e72a64d9dc71cb8ce44ba0_NeikiAnalytics.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA explorer.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA spoolsv.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA svchost.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA spoolsv.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\explorer.exe explorer.exe File opened for modification C:\Windows\SysWOW64\explorer.exe svchost.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 5 IoCs
pid Process 4416 dfe7c284f8e72a64d9dc71cb8ce44ba0_NeikiAnalytics.exe 1692 explorer.exe 4600 spoolsv.exe 3868 svchost.exe 1112 spoolsv.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification \??\c:\windows\resources\themes\explorer.exe dfe7c284f8e72a64d9dc71cb8ce44ba0_NeikiAnalytics.exe File opened for modification \??\c:\windows\resources\spoolsv.exe explorer.exe File opened for modification \??\c:\windows\resources\svchost.exe spoolsv.exe File opened for modification C:\Windows\Resources\tjud.exe explorer.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4416 dfe7c284f8e72a64d9dc71cb8ce44ba0_NeikiAnalytics.exe 4416 dfe7c284f8e72a64d9dc71cb8ce44ba0_NeikiAnalytics.exe 4416 dfe7c284f8e72a64d9dc71cb8ce44ba0_NeikiAnalytics.exe 4416 dfe7c284f8e72a64d9dc71cb8ce44ba0_NeikiAnalytics.exe 4416 dfe7c284f8e72a64d9dc71cb8ce44ba0_NeikiAnalytics.exe 4416 dfe7c284f8e72a64d9dc71cb8ce44ba0_NeikiAnalytics.exe 4416 dfe7c284f8e72a64d9dc71cb8ce44ba0_NeikiAnalytics.exe 4416 dfe7c284f8e72a64d9dc71cb8ce44ba0_NeikiAnalytics.exe 4416 dfe7c284f8e72a64d9dc71cb8ce44ba0_NeikiAnalytics.exe 4416 dfe7c284f8e72a64d9dc71cb8ce44ba0_NeikiAnalytics.exe 4416 dfe7c284f8e72a64d9dc71cb8ce44ba0_NeikiAnalytics.exe 4416 dfe7c284f8e72a64d9dc71cb8ce44ba0_NeikiAnalytics.exe 4416 dfe7c284f8e72a64d9dc71cb8ce44ba0_NeikiAnalytics.exe 4416 dfe7c284f8e72a64d9dc71cb8ce44ba0_NeikiAnalytics.exe 4416 dfe7c284f8e72a64d9dc71cb8ce44ba0_NeikiAnalytics.exe 4416 dfe7c284f8e72a64d9dc71cb8ce44ba0_NeikiAnalytics.exe 4416 dfe7c284f8e72a64d9dc71cb8ce44ba0_NeikiAnalytics.exe 4416 dfe7c284f8e72a64d9dc71cb8ce44ba0_NeikiAnalytics.exe 4416 dfe7c284f8e72a64d9dc71cb8ce44ba0_NeikiAnalytics.exe 4416 dfe7c284f8e72a64d9dc71cb8ce44ba0_NeikiAnalytics.exe 4416 dfe7c284f8e72a64d9dc71cb8ce44ba0_NeikiAnalytics.exe 4416 dfe7c284f8e72a64d9dc71cb8ce44ba0_NeikiAnalytics.exe 4416 dfe7c284f8e72a64d9dc71cb8ce44ba0_NeikiAnalytics.exe 4416 dfe7c284f8e72a64d9dc71cb8ce44ba0_NeikiAnalytics.exe 4416 dfe7c284f8e72a64d9dc71cb8ce44ba0_NeikiAnalytics.exe 4416 dfe7c284f8e72a64d9dc71cb8ce44ba0_NeikiAnalytics.exe 4416 dfe7c284f8e72a64d9dc71cb8ce44ba0_NeikiAnalytics.exe 4416 dfe7c284f8e72a64d9dc71cb8ce44ba0_NeikiAnalytics.exe 4416 dfe7c284f8e72a64d9dc71cb8ce44ba0_NeikiAnalytics.exe 4416 dfe7c284f8e72a64d9dc71cb8ce44ba0_NeikiAnalytics.exe 4416 dfe7c284f8e72a64d9dc71cb8ce44ba0_NeikiAnalytics.exe 4416 dfe7c284f8e72a64d9dc71cb8ce44ba0_NeikiAnalytics.exe 4416 dfe7c284f8e72a64d9dc71cb8ce44ba0_NeikiAnalytics.exe 4416 dfe7c284f8e72a64d9dc71cb8ce44ba0_NeikiAnalytics.exe 1692 explorer.exe 1692 explorer.exe 1692 explorer.exe 1692 explorer.exe 1692 explorer.exe 1692 explorer.exe 1692 explorer.exe 1692 explorer.exe 1692 explorer.exe 1692 explorer.exe 1692 explorer.exe 1692 explorer.exe 1692 explorer.exe 1692 explorer.exe 1692 explorer.exe 1692 explorer.exe 1692 explorer.exe 1692 explorer.exe 1692 explorer.exe 1692 explorer.exe 1692 explorer.exe 1692 explorer.exe 1692 explorer.exe 1692 explorer.exe 1692 explorer.exe 1692 explorer.exe 1692 explorer.exe 1692 explorer.exe 1692 explorer.exe 1692 explorer.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 1692 explorer.exe 3868 svchost.exe -
Suspicious use of SetWindowsHookEx 10 IoCs
pid Process 4416 dfe7c284f8e72a64d9dc71cb8ce44ba0_NeikiAnalytics.exe 4416 dfe7c284f8e72a64d9dc71cb8ce44ba0_NeikiAnalytics.exe 1692 explorer.exe 1692 explorer.exe 4600 spoolsv.exe 4600 spoolsv.exe 3868 svchost.exe 3868 svchost.exe 1112 spoolsv.exe 1112 spoolsv.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4416 wrote to memory of 1692 4416 dfe7c284f8e72a64d9dc71cb8ce44ba0_NeikiAnalytics.exe 91 PID 4416 wrote to memory of 1692 4416 dfe7c284f8e72a64d9dc71cb8ce44ba0_NeikiAnalytics.exe 91 PID 4416 wrote to memory of 1692 4416 dfe7c284f8e72a64d9dc71cb8ce44ba0_NeikiAnalytics.exe 91 PID 1692 wrote to memory of 4600 1692 explorer.exe 92 PID 1692 wrote to memory of 4600 1692 explorer.exe 92 PID 1692 wrote to memory of 4600 1692 explorer.exe 92 PID 4600 wrote to memory of 3868 4600 spoolsv.exe 93 PID 4600 wrote to memory of 3868 4600 spoolsv.exe 93 PID 4600 wrote to memory of 3868 4600 spoolsv.exe 93 PID 3868 wrote to memory of 1112 3868 svchost.exe 94 PID 3868 wrote to memory of 1112 3868 svchost.exe 94 PID 3868 wrote to memory of 1112 3868 svchost.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\dfe7c284f8e72a64d9dc71cb8ce44ba0_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\dfe7c284f8e72a64d9dc71cb8ce44ba0_NeikiAnalytics.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4416 -
\??\c:\windows\resources\themes\explorer.exec:\windows\resources\themes\explorer.exe2⤵
- Modifies visiblity of hidden/system files in Explorer
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1692 -
\??\c:\windows\resources\spoolsv.exec:\windows\resources\spoolsv.exe SE3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4600 -
\??\c:\windows\resources\svchost.exec:\windows\resources\svchost.exe4⤵
- Modifies visiblity of hidden/system files in Explorer
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3868 -
\??\c:\windows\resources\spoolsv.exec:\windows\resources\spoolsv.exe PR5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetWindowsHookEx
PID:1112
-
-
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3752 --field-trial-handle=2248,i,10247514684337323751,15511974759131734137,262144 --variations-seed-version /prefetch:81⤵PID:2528
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
2Virtualization/Sandbox Evasion
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.5MB
MD595d44ef2224c600e1137af7788abc975
SHA172114d8902bf3d2f3350139f7b67ead0c563771d
SHA256cb6d2d2cc6a357cb7c95e1b5089c139e36f427a8a4b869674d34886fae75c52f
SHA512f4f4f8e48036a8e0b2408f53417939d8e7ca80575976e6b3d86436465f5ed05857bfccd6ff2de7ab6faef6f3b18866019a3c52da69c85303ff1039d86ce0dd85
-
Filesize
2.5MB
MD535b983084c9e29f482a054b5bba56857
SHA1e8ef4a41027bb77d0226d5a2ef97d3409ddadacf
SHA25637b99adf4cf27235055bcd1d86db7cb4f5310a20c165b7d24eff60574124e603
SHA512834b75a78eca542ea59649724666c2c77a668d735550f421c164ac46de8f7c6f1f91df1f8dcb5c227b61dcce4660506feef44e82d8bba3a724054b299293c6fb
-
Filesize
2.5MB
MD55356ed728877401c66048c40afa75b0d
SHA160abb97546a7d7568a6bc49bfa58d572b8c16222
SHA2569ef573990466ceceef4762817c3a6350938d3950135e3cc7c6015b7e658ad00c
SHA5126c47012d245c1867dd1772d79f28c2e4ce159fe899b15376604bf55b97284d2bcf6044a954ff9a24ecea3c1f7f1c1fab9902c94f2bbd897ffdfaec6ac228a25a