Analysis
-
max time kernel
141s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
11/05/2024, 03:01
Static task
static1
Behavioral task
behavioral1
Sample
649ee1cb7a0c9a02b93e32b77cab4750_NeikiAnalytics.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
649ee1cb7a0c9a02b93e32b77cab4750_NeikiAnalytics.exe
Resource
win10v2004-20240226-en
General
-
Target
649ee1cb7a0c9a02b93e32b77cab4750_NeikiAnalytics.exe
-
Size
71KB
-
MD5
649ee1cb7a0c9a02b93e32b77cab4750
-
SHA1
23f17db5daeffc5c598eab9a59d24cf32b9f8a08
-
SHA256
055f8e02bf1fda8b4d8fc3135032b325c65167bcebc77d483e06035a0ac0c129
-
SHA512
fa3647270be1b8265053b9960469a163c25f741b2279548eca3074cd59de9ae41681a3a44c0d0bdc2e78f07bd0da8fa8b0c8a19f6188ac1821d6604c2745ed3a
-
SSDEEP
768:TrItKyw5WHXfQmjIiIk9ecAa0Mb96SyX1DLdRXXX5:Tr3Z5IfQmv81ar1yXtZn
Malware Config
Signatures
-
Sets file to hidden 1 TTPs 1 IoCs
Modifies file attributes to stop it showing in Explorer etc.
pid Process 2840 attrib.exe -
Deletes itself 1 IoCs
pid Process 2912 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 3004 iuyhost.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\Debug\iuyhost.exe 649ee1cb7a0c9a02b93e32b77cab4750_NeikiAnalytics.exe File opened for modification C:\Windows\Debug\iuyhost.exe 649ee1cb7a0c9a02b93e32b77cab4750_NeikiAnalytics.exe File opened for modification C:\Windows\Debug\iuyhost.exe attrib.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 2648 649ee1cb7a0c9a02b93e32b77cab4750_NeikiAnalytics.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2648 wrote to memory of 2840 2648 649ee1cb7a0c9a02b93e32b77cab4750_NeikiAnalytics.exe 28 PID 2648 wrote to memory of 2840 2648 649ee1cb7a0c9a02b93e32b77cab4750_NeikiAnalytics.exe 28 PID 2648 wrote to memory of 2840 2648 649ee1cb7a0c9a02b93e32b77cab4750_NeikiAnalytics.exe 28 PID 2648 wrote to memory of 2840 2648 649ee1cb7a0c9a02b93e32b77cab4750_NeikiAnalytics.exe 28 PID 2648 wrote to memory of 2912 2648 649ee1cb7a0c9a02b93e32b77cab4750_NeikiAnalytics.exe 31 PID 2648 wrote to memory of 2912 2648 649ee1cb7a0c9a02b93e32b77cab4750_NeikiAnalytics.exe 31 PID 2648 wrote to memory of 2912 2648 649ee1cb7a0c9a02b93e32b77cab4750_NeikiAnalytics.exe 31 PID 2648 wrote to memory of 2912 2648 649ee1cb7a0c9a02b93e32b77cab4750_NeikiAnalytics.exe 31 -
Views/modifies file attributes 1 TTPs 1 IoCs
pid Process 2840 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\649ee1cb7a0c9a02b93e32b77cab4750_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\649ee1cb7a0c9a02b93e32b77cab4750_NeikiAnalytics.exe"1⤵
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2648 -
C:\Windows\SysWOW64\attrib.exeattrib +a +s +h +r C:\Windows\Debug\iuyhost.exe2⤵
- Sets file to hidden
- Drops file in Windows directory
- Views/modifies file attributes
PID:2840
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\649EE1~1.EXE > nul2⤵
- Deletes itself
PID:2912
-
-
C:\Windows\Debug\iuyhost.exeC:\Windows\Debug\iuyhost.exe1⤵
- Executes dropped EXE
PID:3004
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
71KB
MD53848d322f33927875d963db03c9e9258
SHA18eb2bb420c036d90b8aa2d2d525a31a4759056ff
SHA256c71584fa33b00cd71b72d26842bed0499d76ac0d36f4744e0c9659d9536d0b87
SHA51207fb7899c77493e8100b7dd78909d2dd98d07f5f2b3021aaa2ee9f87c8832ac00649b6b49a8f6e680841f801fa514fee78a444cff1018fac72e40608769a7931