Analysis
-
max time kernel
150s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
10/05/2024, 18:38
Static task
static1
Behavioral task
behavioral1
Sample
4477b1f3b53082bfcac06bec3c685f60_NeikiAnalytics.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
4477b1f3b53082bfcac06bec3c685f60_NeikiAnalytics.exe
Resource
win10v2004-20240426-en
General
-
Target
4477b1f3b53082bfcac06bec3c685f60_NeikiAnalytics.exe
-
Size
53KB
-
MD5
4477b1f3b53082bfcac06bec3c685f60
-
SHA1
73c37cbf378a1ef9c50653cbf80fbc59001ecde5
-
SHA256
e317f01da33328ac96d72922297c9957cbbf30abe5d2cdf11d8d52e188e8bb43
-
SHA512
218700f7881a3cc5ab1c4c1df7d49501d14b2e5832e8b0a99854d43f8fe8351100fa459928ddec20e99518124c213ecea05644a32005113955f98cbc843c7609
-
SSDEEP
1536:vNgg8r8QFDsyQ7Kp3StjEMjmLM3ztDJWZsXy4JzxPMk:uDsyQJJjmLM3zRJWZsXy4Jt
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" weuix.exe -
Executes dropped EXE 1 IoCs
pid Process 1636 weuix.exe -
Loads dropped DLL 2 IoCs
pid Process 1624 4477b1f3b53082bfcac06bec3c685f60_NeikiAnalytics.exe 1624 4477b1f3b53082bfcac06bec3c685f60_NeikiAnalytics.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\weuix = "C:\\Users\\Admin\\weuix.exe" weuix.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1636 weuix.exe 1636 weuix.exe 1636 weuix.exe 1636 weuix.exe 1636 weuix.exe 1636 weuix.exe 1636 weuix.exe 1636 weuix.exe 1636 weuix.exe 1636 weuix.exe 1636 weuix.exe 1636 weuix.exe 1636 weuix.exe 1636 weuix.exe 1636 weuix.exe 1636 weuix.exe 1636 weuix.exe 1636 weuix.exe 1636 weuix.exe 1636 weuix.exe 1636 weuix.exe 1636 weuix.exe 1636 weuix.exe 1636 weuix.exe 1636 weuix.exe 1636 weuix.exe 1636 weuix.exe 1636 weuix.exe 1636 weuix.exe 1636 weuix.exe 1636 weuix.exe 1636 weuix.exe 1636 weuix.exe 1636 weuix.exe 1636 weuix.exe 1636 weuix.exe 1636 weuix.exe 1636 weuix.exe 1636 weuix.exe 1636 weuix.exe 1636 weuix.exe 1636 weuix.exe 1636 weuix.exe 1636 weuix.exe 1636 weuix.exe 1636 weuix.exe 1636 weuix.exe 1636 weuix.exe 1636 weuix.exe 1636 weuix.exe 1636 weuix.exe 1636 weuix.exe 1636 weuix.exe 1636 weuix.exe 1636 weuix.exe 1636 weuix.exe 1636 weuix.exe 1636 weuix.exe 1636 weuix.exe 1636 weuix.exe 1636 weuix.exe 1636 weuix.exe 1636 weuix.exe 1636 weuix.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1624 4477b1f3b53082bfcac06bec3c685f60_NeikiAnalytics.exe 1636 weuix.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1624 wrote to memory of 1636 1624 4477b1f3b53082bfcac06bec3c685f60_NeikiAnalytics.exe 28 PID 1624 wrote to memory of 1636 1624 4477b1f3b53082bfcac06bec3c685f60_NeikiAnalytics.exe 28 PID 1624 wrote to memory of 1636 1624 4477b1f3b53082bfcac06bec3c685f60_NeikiAnalytics.exe 28 PID 1624 wrote to memory of 1636 1624 4477b1f3b53082bfcac06bec3c685f60_NeikiAnalytics.exe 28 PID 1636 wrote to memory of 1624 1636 weuix.exe 27 PID 1636 wrote to memory of 1624 1636 weuix.exe 27 PID 1636 wrote to memory of 1624 1636 weuix.exe 27 PID 1636 wrote to memory of 1624 1636 weuix.exe 27 PID 1636 wrote to memory of 1624 1636 weuix.exe 27 PID 1636 wrote to memory of 1624 1636 weuix.exe 27 PID 1636 wrote to memory of 1624 1636 weuix.exe 27 PID 1636 wrote to memory of 1624 1636 weuix.exe 27 PID 1636 wrote to memory of 1624 1636 weuix.exe 27 PID 1636 wrote to memory of 1624 1636 weuix.exe 27 PID 1636 wrote to memory of 1624 1636 weuix.exe 27 PID 1636 wrote to memory of 1624 1636 weuix.exe 27 PID 1636 wrote to memory of 1624 1636 weuix.exe 27 PID 1636 wrote to memory of 1624 1636 weuix.exe 27 PID 1636 wrote to memory of 1624 1636 weuix.exe 27 PID 1636 wrote to memory of 1624 1636 weuix.exe 27 PID 1636 wrote to memory of 1624 1636 weuix.exe 27 PID 1636 wrote to memory of 1624 1636 weuix.exe 27 PID 1636 wrote to memory of 1624 1636 weuix.exe 27 PID 1636 wrote to memory of 1624 1636 weuix.exe 27 PID 1636 wrote to memory of 1624 1636 weuix.exe 27 PID 1636 wrote to memory of 1624 1636 weuix.exe 27 PID 1636 wrote to memory of 1624 1636 weuix.exe 27 PID 1636 wrote to memory of 1624 1636 weuix.exe 27 PID 1636 wrote to memory of 1624 1636 weuix.exe 27 PID 1636 wrote to memory of 1624 1636 weuix.exe 27 PID 1636 wrote to memory of 1624 1636 weuix.exe 27 PID 1636 wrote to memory of 1624 1636 weuix.exe 27 PID 1636 wrote to memory of 1624 1636 weuix.exe 27 PID 1636 wrote to memory of 1624 1636 weuix.exe 27 PID 1636 wrote to memory of 1624 1636 weuix.exe 27 PID 1636 wrote to memory of 1624 1636 weuix.exe 27 PID 1636 wrote to memory of 1624 1636 weuix.exe 27 PID 1636 wrote to memory of 1624 1636 weuix.exe 27 PID 1636 wrote to memory of 1624 1636 weuix.exe 27 PID 1636 wrote to memory of 1624 1636 weuix.exe 27 PID 1636 wrote to memory of 1624 1636 weuix.exe 27 PID 1636 wrote to memory of 1624 1636 weuix.exe 27 PID 1636 wrote to memory of 1624 1636 weuix.exe 27 PID 1636 wrote to memory of 1624 1636 weuix.exe 27 PID 1636 wrote to memory of 1624 1636 weuix.exe 27 PID 1636 wrote to memory of 1624 1636 weuix.exe 27 PID 1636 wrote to memory of 1624 1636 weuix.exe 27 PID 1636 wrote to memory of 1624 1636 weuix.exe 27 PID 1636 wrote to memory of 1624 1636 weuix.exe 27 PID 1636 wrote to memory of 1624 1636 weuix.exe 27 PID 1636 wrote to memory of 1624 1636 weuix.exe 27 PID 1636 wrote to memory of 1624 1636 weuix.exe 27 PID 1636 wrote to memory of 1624 1636 weuix.exe 27 PID 1636 wrote to memory of 1624 1636 weuix.exe 27 PID 1636 wrote to memory of 1624 1636 weuix.exe 27 PID 1636 wrote to memory of 1624 1636 weuix.exe 27 PID 1636 wrote to memory of 1624 1636 weuix.exe 27 PID 1636 wrote to memory of 1624 1636 weuix.exe 27 PID 1636 wrote to memory of 1624 1636 weuix.exe 27 PID 1636 wrote to memory of 1624 1636 weuix.exe 27 PID 1636 wrote to memory of 1624 1636 weuix.exe 27 PID 1636 wrote to memory of 1624 1636 weuix.exe 27 PID 1636 wrote to memory of 1624 1636 weuix.exe 27 PID 1636 wrote to memory of 1624 1636 weuix.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\4477b1f3b53082bfcac06bec3c685f60_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\4477b1f3b53082bfcac06bec3c685f60_NeikiAnalytics.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1624 -
C:\Users\Admin\weuix.exe"C:\Users\Admin\weuix.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1636
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
53KB
MD5f9c9b8111fa4bb1d5a102383dd395aea
SHA1a8744349bb24fb8e0c9e900fbea988169e90e00f
SHA2560c4c3da9ac0dea2398ee9988c9dc51d2386a9662a3987bb093a47fa50c19578e
SHA512a0d44f1146ce303c17df1b69c3bfd96c2b69c3af93d368f6dc0dc959b5e65aedea6050c535b9e0a9dd5a3d50aa5e012c3bb154dd4c70c2627219f274da3a6b90