Analysis
-
max time kernel
141s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
11/05/2024, 01:18
Static task
static1
Behavioral task
behavioral1
Sample
48e8587b72b3c6b10ac8d891e3460650_NeikiAnalytics.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
48e8587b72b3c6b10ac8d891e3460650_NeikiAnalytics.exe
Resource
win10v2004-20240426-en
General
-
Target
48e8587b72b3c6b10ac8d891e3460650_NeikiAnalytics.exe
-
Size
72KB
-
MD5
48e8587b72b3c6b10ac8d891e3460650
-
SHA1
3f12d7c61d65d951302126bb7fe2a80a12bbf0b4
-
SHA256
2228c970688b694eef8db0c52fe149bfe1ae61ae31263b335708a6ad9a77869b
-
SHA512
15e673be71d57df52210fb420e977d6979d8a77501dfedee5a236b4e84970a79a32ea5690cc12dc9399549688da5bde321027422c6eb8f00525f79aeb6be4fd3
-
SSDEEP
768:ZrItKyw5WHXfQmjIiIk9ecAx7pP1EPU96MyXPdtldE9bIIIwjkNL:Zr3Z5IfQmv81x7pP1r3yXPdtnyjQL
Malware Config
Signatures
-
Sets file to hidden 1 TTPs 1 IoCs
Modifies file attributes to stop it showing in Explorer etc.
pid Process 1628 attrib.exe -
Deletes itself 1 IoCs
pid Process 2976 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2028 zskhost.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\Debug\zskhost.exe 48e8587b72b3c6b10ac8d891e3460650_NeikiAnalytics.exe File opened for modification C:\Windows\Debug\zskhost.exe 48e8587b72b3c6b10ac8d891e3460650_NeikiAnalytics.exe File opened for modification C:\Windows\Debug\zskhost.exe attrib.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 zskhost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz zskhost.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 2012 48e8587b72b3c6b10ac8d891e3460650_NeikiAnalytics.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2012 wrote to memory of 1628 2012 48e8587b72b3c6b10ac8d891e3460650_NeikiAnalytics.exe 28 PID 2012 wrote to memory of 1628 2012 48e8587b72b3c6b10ac8d891e3460650_NeikiAnalytics.exe 28 PID 2012 wrote to memory of 1628 2012 48e8587b72b3c6b10ac8d891e3460650_NeikiAnalytics.exe 28 PID 2012 wrote to memory of 1628 2012 48e8587b72b3c6b10ac8d891e3460650_NeikiAnalytics.exe 28 PID 2012 wrote to memory of 2976 2012 48e8587b72b3c6b10ac8d891e3460650_NeikiAnalytics.exe 31 PID 2012 wrote to memory of 2976 2012 48e8587b72b3c6b10ac8d891e3460650_NeikiAnalytics.exe 31 PID 2012 wrote to memory of 2976 2012 48e8587b72b3c6b10ac8d891e3460650_NeikiAnalytics.exe 31 PID 2012 wrote to memory of 2976 2012 48e8587b72b3c6b10ac8d891e3460650_NeikiAnalytics.exe 31 -
Views/modifies file attributes 1 TTPs 1 IoCs
pid Process 1628 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\48e8587b72b3c6b10ac8d891e3460650_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\48e8587b72b3c6b10ac8d891e3460650_NeikiAnalytics.exe"1⤵
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2012 -
C:\Windows\SysWOW64\attrib.exeattrib +a +s +h +r C:\Windows\Debug\zskhost.exe2⤵
- Sets file to hidden
- Drops file in Windows directory
- Views/modifies file attributes
PID:1628
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\48E858~1.EXE > nul2⤵
- Deletes itself
PID:2976
-
-
C:\Windows\Debug\zskhost.exeC:\Windows\Debug\zskhost.exe1⤵
- Executes dropped EXE
- Checks processor information in registry
PID:2028
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
72KB
MD54e137168d579365ddbf2cbc544c90939
SHA13445579437c0ca8a61a1ebbd9222361f0542b49b
SHA2566ebc0a70ceecbe2cbdcae005dedbb1e309d952f6de422ddece0cad3d2a1b64bd
SHA51291d9688837895827ebfc88f6960bcf7abbb944539928c1a25770d014d517a37fe3d7d7430eecbc629cceb0a4dfb10f57dbae16881069abe2717dadb74906e0ea