Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
11/05/2024, 02:47
Static task
static1
Behavioral task
behavioral1
Sample
60288f66152e858fabf96226edd28460_NeikiAnalytics.pdf
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
60288f66152e858fabf96226edd28460_NeikiAnalytics.pdf
Resource
win10v2004-20240508-en
General
-
Target
60288f66152e858fabf96226edd28460_NeikiAnalytics.pdf
-
Size
931KB
-
MD5
60288f66152e858fabf96226edd28460
-
SHA1
4650520fda8eb926226ae03ae67c47ba7bf93df5
-
SHA256
c368febf4dc80cdb2e5ea3dda8853b04ad7c5c93552d01026446f13a53805916
-
SHA512
7eae94172ca31f65ab034420a5b23ae9509a1a2134a8b7464efde7c99a68e8df5622adefd4ba37260e0c6ca51c2f4e1b60bc1c2fd04ae4ff8f1f9d2cd662c020
-
SSDEEP
24576:LZkwpsWJvILZDKJUAOthd3BXVGlu4QWrHHw/+9k7t:1vILZA3g+9kB
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 AcroRd32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz AcroRd32.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION AcroRd32.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2280 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2280 AcroRd32.exe 2280 AcroRd32.exe 2280 AcroRd32.exe 2280 AcroRd32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2280 wrote to memory of 4084 2280 AcroRd32.exe 90 PID 2280 wrote to memory of 4084 2280 AcroRd32.exe 90 PID 2280 wrote to memory of 4084 2280 AcroRd32.exe 90 PID 4084 wrote to memory of 1368 4084 RdrCEF.exe 91 PID 4084 wrote to memory of 1368 4084 RdrCEF.exe 91 PID 4084 wrote to memory of 1368 4084 RdrCEF.exe 91 PID 4084 wrote to memory of 1368 4084 RdrCEF.exe 91 PID 4084 wrote to memory of 1368 4084 RdrCEF.exe 91 PID 4084 wrote to memory of 1368 4084 RdrCEF.exe 91 PID 4084 wrote to memory of 1368 4084 RdrCEF.exe 91 PID 4084 wrote to memory of 1368 4084 RdrCEF.exe 91 PID 4084 wrote to memory of 1368 4084 RdrCEF.exe 91 PID 4084 wrote to memory of 1368 4084 RdrCEF.exe 91 PID 4084 wrote to memory of 1368 4084 RdrCEF.exe 91 PID 4084 wrote to memory of 1368 4084 RdrCEF.exe 91 PID 4084 wrote to memory of 1368 4084 RdrCEF.exe 91 PID 4084 wrote to memory of 1368 4084 RdrCEF.exe 91 PID 4084 wrote to memory of 1368 4084 RdrCEF.exe 91 PID 4084 wrote to memory of 1368 4084 RdrCEF.exe 91 PID 4084 wrote to memory of 1368 4084 RdrCEF.exe 91 PID 4084 wrote to memory of 1368 4084 RdrCEF.exe 91 PID 4084 wrote to memory of 1368 4084 RdrCEF.exe 91 PID 4084 wrote to memory of 1368 4084 RdrCEF.exe 91 PID 4084 wrote to memory of 1368 4084 RdrCEF.exe 91 PID 4084 wrote to memory of 1368 4084 RdrCEF.exe 91 PID 4084 wrote to memory of 1368 4084 RdrCEF.exe 91 PID 4084 wrote to memory of 1368 4084 RdrCEF.exe 91 PID 4084 wrote to memory of 1368 4084 RdrCEF.exe 91 PID 4084 wrote to memory of 1368 4084 RdrCEF.exe 91 PID 4084 wrote to memory of 1368 4084 RdrCEF.exe 91 PID 4084 wrote to memory of 1368 4084 RdrCEF.exe 91 PID 4084 wrote to memory of 1368 4084 RdrCEF.exe 91 PID 4084 wrote to memory of 1368 4084 RdrCEF.exe 91 PID 4084 wrote to memory of 1368 4084 RdrCEF.exe 91 PID 4084 wrote to memory of 1368 4084 RdrCEF.exe 91 PID 4084 wrote to memory of 1368 4084 RdrCEF.exe 91 PID 4084 wrote to memory of 1368 4084 RdrCEF.exe 91 PID 4084 wrote to memory of 1368 4084 RdrCEF.exe 91 PID 4084 wrote to memory of 1368 4084 RdrCEF.exe 91 PID 4084 wrote to memory of 1368 4084 RdrCEF.exe 91 PID 4084 wrote to memory of 1368 4084 RdrCEF.exe 91 PID 4084 wrote to memory of 1368 4084 RdrCEF.exe 91 PID 4084 wrote to memory of 1368 4084 RdrCEF.exe 91 PID 4084 wrote to memory of 1368 4084 RdrCEF.exe 91 PID 4084 wrote to memory of 4948 4084 RdrCEF.exe 92 PID 4084 wrote to memory of 4948 4084 RdrCEF.exe 92 PID 4084 wrote to memory of 4948 4084 RdrCEF.exe 92 PID 4084 wrote to memory of 4948 4084 RdrCEF.exe 92 PID 4084 wrote to memory of 4948 4084 RdrCEF.exe 92 PID 4084 wrote to memory of 4948 4084 RdrCEF.exe 92 PID 4084 wrote to memory of 4948 4084 RdrCEF.exe 92 PID 4084 wrote to memory of 4948 4084 RdrCEF.exe 92 PID 4084 wrote to memory of 4948 4084 RdrCEF.exe 92 PID 4084 wrote to memory of 4948 4084 RdrCEF.exe 92 PID 4084 wrote to memory of 4948 4084 RdrCEF.exe 92 PID 4084 wrote to memory of 4948 4084 RdrCEF.exe 92 PID 4084 wrote to memory of 4948 4084 RdrCEF.exe 92 PID 4084 wrote to memory of 4948 4084 RdrCEF.exe 92 PID 4084 wrote to memory of 4948 4084 RdrCEF.exe 92 PID 4084 wrote to memory of 4948 4084 RdrCEF.exe 92 PID 4084 wrote to memory of 4948 4084 RdrCEF.exe 92 PID 4084 wrote to memory of 4948 4084 RdrCEF.exe 92 PID 4084 wrote to memory of 4948 4084 RdrCEF.exe 92 PID 4084 wrote to memory of 4948 4084 RdrCEF.exe 92
Processes
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\60288f66152e858fabf96226edd28460_NeikiAnalytics.pdf"1⤵
- Checks processor information in registry
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2280 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=165140432⤵
- Suspicious use of WriteProcessMemory
PID:4084 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=7A1EE3358C3BD4D1549F7B8B0D0B0CE5 --mojo-platform-channel-handle=1748 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:1368
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=C9277660C5F07BB1325CC676DC54CFBC --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=C9277660C5F07BB1325CC676DC54CFBC --renderer-client-id=2 --mojo-platform-channel-handle=1740 --allow-no-sandbox-job /prefetch:13⤵PID:4948
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=483EFD826F4C1E404C95130410BAB42C --mojo-platform-channel-handle=2292 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:2204
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=4458BD898A9A852FF71C4D26FFB47E74 --mojo-platform-channel-handle=1936 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:4856
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=285B7E9CC7AE49EC0068333B1969E462 --mojo-platform-channel-handle=2300 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:960
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=F4B64626BA549E55751EA869BBBE845A --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=F4B64626BA549E55751EA869BBBE845A --renderer-client-id=7 --mojo-platform-channel-handle=2296 --allow-no-sandbox-job /prefetch:13⤵PID:2900
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5092
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
64KB
MD5db78adc1461e5150f3129779a7dc4aa4
SHA1685230893cc6d30c70cbe3dbb74479bcf890d130
SHA256f654ed0b040c1a69ebefaf624144abffa3fd42a82041a692ba8e6132a3427177
SHA5128bbbcf8a384cc3783a7cd9dc2bbe22567c180866cdbcd8194269809244798f62306e7150f209fec47e7ce757bbc6a04b47573b620e025dab91fc2e08fa78bd72
-
Filesize
64KB
MD5c5e4c7a4a5aea436cf88a5949bfde0a6
SHA14e1ba7bd5bbc74f7f660918fc9c7aaea0047a1d8
SHA256ee28287917a3fc10ee9d5b741d3ec4c7d96068bf27abc899c8e58a65cf430ccd
SHA512bea96a0ee41025cc2608203255380b621598869b6cd87b91cf1bcfc33c077d528a67ca0684a51422043b3bd62e928ae37c3cd962534679f5b28f1bfb97f12d0c