Analysis
-
max time kernel
141s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
11-05-2024 04:20
Behavioral task
behavioral1
Sample
7b7150917fd03a2b419539209a617db0_NeikiAnalytics.pdf
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
7b7150917fd03a2b419539209a617db0_NeikiAnalytics.pdf
Resource
win10v2004-20240508-en
General
-
Target
7b7150917fd03a2b419539209a617db0_NeikiAnalytics.pdf
-
Size
75KB
-
MD5
7b7150917fd03a2b419539209a617db0
-
SHA1
96ab3d09c507b4cddceba452eacb552cd1c06b4b
-
SHA256
9317362e3f5f8bc5786de2d5a8e1b570980f4361e8876b17597f88990546c625
-
SHA512
2eb4fce03ab0d734c2d443320459053b4a8c58e99ba661ac682d9ecd3c9bc66dd79ea2b54d6c4c27519bd90a3f971c663e79ca42e7fcc879c86ff5a4bbcaadc9
-
SSDEEP
1536:K1+hUyty1EXGaiq9aX/pyNAa27MJ/iFLtpNF:ENytRjiq9wp8f49ltd
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz AcroRd32.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 AcroRd32.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION AcroRd32.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4896 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 4896 AcroRd32.exe 4896 AcroRd32.exe 4896 AcroRd32.exe 4896 AcroRd32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4896 wrote to memory of 2120 4896 AcroRd32.exe 88 PID 4896 wrote to memory of 2120 4896 AcroRd32.exe 88 PID 4896 wrote to memory of 2120 4896 AcroRd32.exe 88 PID 2120 wrote to memory of 3872 2120 RdrCEF.exe 89 PID 2120 wrote to memory of 3872 2120 RdrCEF.exe 89 PID 2120 wrote to memory of 3872 2120 RdrCEF.exe 89 PID 2120 wrote to memory of 3872 2120 RdrCEF.exe 89 PID 2120 wrote to memory of 3872 2120 RdrCEF.exe 89 PID 2120 wrote to memory of 3872 2120 RdrCEF.exe 89 PID 2120 wrote to memory of 3872 2120 RdrCEF.exe 89 PID 2120 wrote to memory of 3872 2120 RdrCEF.exe 89 PID 2120 wrote to memory of 3872 2120 RdrCEF.exe 89 PID 2120 wrote to memory of 3872 2120 RdrCEF.exe 89 PID 2120 wrote to memory of 3872 2120 RdrCEF.exe 89 PID 2120 wrote to memory of 3872 2120 RdrCEF.exe 89 PID 2120 wrote to memory of 3872 2120 RdrCEF.exe 89 PID 2120 wrote to memory of 3872 2120 RdrCEF.exe 89 PID 2120 wrote to memory of 3872 2120 RdrCEF.exe 89 PID 2120 wrote to memory of 3872 2120 RdrCEF.exe 89 PID 2120 wrote to memory of 3872 2120 RdrCEF.exe 89 PID 2120 wrote to memory of 3872 2120 RdrCEF.exe 89 PID 2120 wrote to memory of 3872 2120 RdrCEF.exe 89 PID 2120 wrote to memory of 3872 2120 RdrCEF.exe 89 PID 2120 wrote to memory of 3872 2120 RdrCEF.exe 89 PID 2120 wrote to memory of 3872 2120 RdrCEF.exe 89 PID 2120 wrote to memory of 3872 2120 RdrCEF.exe 89 PID 2120 wrote to memory of 3872 2120 RdrCEF.exe 89 PID 2120 wrote to memory of 3872 2120 RdrCEF.exe 89 PID 2120 wrote to memory of 3872 2120 RdrCEF.exe 89 PID 2120 wrote to memory of 3872 2120 RdrCEF.exe 89 PID 2120 wrote to memory of 3872 2120 RdrCEF.exe 89 PID 2120 wrote to memory of 3872 2120 RdrCEF.exe 89 PID 2120 wrote to memory of 3872 2120 RdrCEF.exe 89 PID 2120 wrote to memory of 3872 2120 RdrCEF.exe 89 PID 2120 wrote to memory of 3872 2120 RdrCEF.exe 89 PID 2120 wrote to memory of 3872 2120 RdrCEF.exe 89 PID 2120 wrote to memory of 3872 2120 RdrCEF.exe 89 PID 2120 wrote to memory of 3872 2120 RdrCEF.exe 89 PID 2120 wrote to memory of 3872 2120 RdrCEF.exe 89 PID 2120 wrote to memory of 3872 2120 RdrCEF.exe 89 PID 2120 wrote to memory of 3872 2120 RdrCEF.exe 89 PID 2120 wrote to memory of 3872 2120 RdrCEF.exe 89 PID 2120 wrote to memory of 3872 2120 RdrCEF.exe 89 PID 2120 wrote to memory of 3872 2120 RdrCEF.exe 89 PID 2120 wrote to memory of 368 2120 RdrCEF.exe 90 PID 2120 wrote to memory of 368 2120 RdrCEF.exe 90 PID 2120 wrote to memory of 368 2120 RdrCEF.exe 90 PID 2120 wrote to memory of 368 2120 RdrCEF.exe 90 PID 2120 wrote to memory of 368 2120 RdrCEF.exe 90 PID 2120 wrote to memory of 368 2120 RdrCEF.exe 90 PID 2120 wrote to memory of 368 2120 RdrCEF.exe 90 PID 2120 wrote to memory of 368 2120 RdrCEF.exe 90 PID 2120 wrote to memory of 368 2120 RdrCEF.exe 90 PID 2120 wrote to memory of 368 2120 RdrCEF.exe 90 PID 2120 wrote to memory of 368 2120 RdrCEF.exe 90 PID 2120 wrote to memory of 368 2120 RdrCEF.exe 90 PID 2120 wrote to memory of 368 2120 RdrCEF.exe 90 PID 2120 wrote to memory of 368 2120 RdrCEF.exe 90 PID 2120 wrote to memory of 368 2120 RdrCEF.exe 90 PID 2120 wrote to memory of 368 2120 RdrCEF.exe 90 PID 2120 wrote to memory of 368 2120 RdrCEF.exe 90 PID 2120 wrote to memory of 368 2120 RdrCEF.exe 90 PID 2120 wrote to memory of 368 2120 RdrCEF.exe 90 PID 2120 wrote to memory of 368 2120 RdrCEF.exe 90
Processes
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\7b7150917fd03a2b419539209a617db0_NeikiAnalytics.pdf"1⤵
- Checks processor information in registry
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4896 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=165140432⤵
- Suspicious use of WriteProcessMemory
PID:2120 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=C5FCBF64C9EF6B97407E47973D710C06 --mojo-platform-channel-handle=1736 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:3872
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=4A043B16F5B72A100FC7D9AE6E569437 --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=4A043B16F5B72A100FC7D9AE6E569437 --renderer-client-id=2 --mojo-platform-channel-handle=1756 --allow-no-sandbox-job /prefetch:13⤵PID:368
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=77751F97C5E4B628A80F7F03D093F727 --mojo-platform-channel-handle=2280 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:2244
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=B6D515D2B0EF8ECA008927E8544ED581 --mojo-platform-channel-handle=1828 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:1888
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=18E125C5A1C320E20E18F028AEAC7963 --mojo-platform-channel-handle=2352 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:1656
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=D162940C568F84E210EED738F11C2DCD --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=D162940C568F84E210EED738F11C2DCD --renderer-client-id=7 --mojo-platform-channel-handle=2524 --allow-no-sandbox-job /prefetch:13⤵PID:2724
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:440
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
64KB
MD57c6acce26ab1c70bdb717e2e53ecbd06
SHA1122c0cf2c50586c6bd6a943c3e03619f8da5734c
SHA256c6ea3b5ca50fb855a5d6849650567b1ed05adf999c8b405f3364a1b8e278fa96
SHA512cb74a37cd1166b909ad8ca1fef18781f122e230caca95e02933c22fb73e4dfe4ea442b2e6390ded439eff0c0db48062c04dc5ee5491c63b7b9c802bc8899bdc4
-
Filesize
64KB
MD58532ca33f8e85fad38bdfcd8fc57b286
SHA1889f8e634acdba32843335f7d45e58e84fb14a9e
SHA256710171a16bc4eec4efc25e555be2706ce8ba3649e24ce370423a65ac0460402d
SHA512138e65b6d79b23599f308e59b50ada36f00354f7069ed3f2a4b50c11777ee74fae4ed427c52915b8a65679b6198ea287355b1097d20f85b1c82acec2250c815f