Analysis
-
max time kernel
150s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
11/05/2024, 05:01
Static task
static1
Behavioral task
behavioral1
Sample
836922fcd9c816c7abeada2cb0091de0_NeikiAnalytics.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
836922fcd9c816c7abeada2cb0091de0_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
836922fcd9c816c7abeada2cb0091de0_NeikiAnalytics.exe
-
Size
1.9MB
-
MD5
836922fcd9c816c7abeada2cb0091de0
-
SHA1
b70f1af470bbb025718ca8cd9b58a50e3ddd3529
-
SHA256
c0b35b8cc47c88d95aedbcd1c572e8331c9dc1cdb853f70b12e12f38a0ff689d
-
SHA512
a57f2ec64dd6d4f65d334418698efe2426e47ed0974568068016f6a1696c0a7f6ea1118edee3253da4921a33f4e450a02b2c11686bc35e763038256222c6020a
-
SSDEEP
49152:ISlNHydXboE+2pKWTvP6p9kB/GS0fsXCFY:ISjydNCYn0+/
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" svchost.exe -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 5 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ spoolsv.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 836922fcd9c816c7abeada2cb0091de0_NeikiAnalytics.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explorer.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ spoolsv.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ svchost.exe -
Checks BIOS information in registry 2 TTPs 10 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion spoolsv.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion spoolsv.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explorer.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 836922fcd9c816c7abeada2cb0091de0_NeikiAnalytics.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explorer.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion spoolsv.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion spoolsv.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 836922fcd9c816c7abeada2cb0091de0_NeikiAnalytics.exe -
Executes dropped EXE 4 IoCs
pid Process 4624 explorer.exe 5028 spoolsv.exe 888 svchost.exe 4592 spoolsv.exe -
Identifies Wine through registry keys 2 TTPs 5 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Software\Wine spoolsv.exe Key opened \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Software\Wine svchost.exe Key opened \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Software\Wine spoolsv.exe Key opened \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Software\Wine 836922fcd9c816c7abeada2cb0091de0_NeikiAnalytics.exe Key opened \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Software\Wine explorer.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\resources\\themes\\explorer.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\resources\\svchost.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\resources\\themes\\explorer.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\resources\\svchost.exe RO" explorer.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\explorer.exe explorer.exe File opened for modification C:\Windows\SysWOW64\explorer.exe svchost.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 5 IoCs
pid Process 2752 836922fcd9c816c7abeada2cb0091de0_NeikiAnalytics.exe 4624 explorer.exe 5028 spoolsv.exe 888 svchost.exe 4592 spoolsv.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification C:\Windows\Resources\tjud.exe explorer.exe File opened for modification \??\c:\windows\resources\themes\explorer.exe 836922fcd9c816c7abeada2cb0091de0_NeikiAnalytics.exe File opened for modification \??\c:\windows\resources\spoolsv.exe explorer.exe File opened for modification \??\c:\windows\resources\svchost.exe spoolsv.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2752 836922fcd9c816c7abeada2cb0091de0_NeikiAnalytics.exe 2752 836922fcd9c816c7abeada2cb0091de0_NeikiAnalytics.exe 2752 836922fcd9c816c7abeada2cb0091de0_NeikiAnalytics.exe 2752 836922fcd9c816c7abeada2cb0091de0_NeikiAnalytics.exe 2752 836922fcd9c816c7abeada2cb0091de0_NeikiAnalytics.exe 2752 836922fcd9c816c7abeada2cb0091de0_NeikiAnalytics.exe 2752 836922fcd9c816c7abeada2cb0091de0_NeikiAnalytics.exe 2752 836922fcd9c816c7abeada2cb0091de0_NeikiAnalytics.exe 2752 836922fcd9c816c7abeada2cb0091de0_NeikiAnalytics.exe 2752 836922fcd9c816c7abeada2cb0091de0_NeikiAnalytics.exe 2752 836922fcd9c816c7abeada2cb0091de0_NeikiAnalytics.exe 2752 836922fcd9c816c7abeada2cb0091de0_NeikiAnalytics.exe 2752 836922fcd9c816c7abeada2cb0091de0_NeikiAnalytics.exe 2752 836922fcd9c816c7abeada2cb0091de0_NeikiAnalytics.exe 2752 836922fcd9c816c7abeada2cb0091de0_NeikiAnalytics.exe 2752 836922fcd9c816c7abeada2cb0091de0_NeikiAnalytics.exe 2752 836922fcd9c816c7abeada2cb0091de0_NeikiAnalytics.exe 2752 836922fcd9c816c7abeada2cb0091de0_NeikiAnalytics.exe 2752 836922fcd9c816c7abeada2cb0091de0_NeikiAnalytics.exe 2752 836922fcd9c816c7abeada2cb0091de0_NeikiAnalytics.exe 2752 836922fcd9c816c7abeada2cb0091de0_NeikiAnalytics.exe 2752 836922fcd9c816c7abeada2cb0091de0_NeikiAnalytics.exe 2752 836922fcd9c816c7abeada2cb0091de0_NeikiAnalytics.exe 2752 836922fcd9c816c7abeada2cb0091de0_NeikiAnalytics.exe 2752 836922fcd9c816c7abeada2cb0091de0_NeikiAnalytics.exe 2752 836922fcd9c816c7abeada2cb0091de0_NeikiAnalytics.exe 2752 836922fcd9c816c7abeada2cb0091de0_NeikiAnalytics.exe 2752 836922fcd9c816c7abeada2cb0091de0_NeikiAnalytics.exe 2752 836922fcd9c816c7abeada2cb0091de0_NeikiAnalytics.exe 2752 836922fcd9c816c7abeada2cb0091de0_NeikiAnalytics.exe 2752 836922fcd9c816c7abeada2cb0091de0_NeikiAnalytics.exe 2752 836922fcd9c816c7abeada2cb0091de0_NeikiAnalytics.exe 2752 836922fcd9c816c7abeada2cb0091de0_NeikiAnalytics.exe 2752 836922fcd9c816c7abeada2cb0091de0_NeikiAnalytics.exe 2752 836922fcd9c816c7abeada2cb0091de0_NeikiAnalytics.exe 2752 836922fcd9c816c7abeada2cb0091de0_NeikiAnalytics.exe 4624 explorer.exe 4624 explorer.exe 4624 explorer.exe 4624 explorer.exe 4624 explorer.exe 4624 explorer.exe 4624 explorer.exe 4624 explorer.exe 4624 explorer.exe 4624 explorer.exe 4624 explorer.exe 4624 explorer.exe 4624 explorer.exe 4624 explorer.exe 4624 explorer.exe 4624 explorer.exe 4624 explorer.exe 4624 explorer.exe 4624 explorer.exe 4624 explorer.exe 4624 explorer.exe 4624 explorer.exe 4624 explorer.exe 4624 explorer.exe 4624 explorer.exe 4624 explorer.exe 4624 explorer.exe 4624 explorer.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 4624 explorer.exe 888 svchost.exe -
Suspicious use of SetWindowsHookEx 10 IoCs
pid Process 2752 836922fcd9c816c7abeada2cb0091de0_NeikiAnalytics.exe 2752 836922fcd9c816c7abeada2cb0091de0_NeikiAnalytics.exe 4624 explorer.exe 4624 explorer.exe 5028 spoolsv.exe 5028 spoolsv.exe 888 svchost.exe 888 svchost.exe 4592 spoolsv.exe 4592 spoolsv.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2752 wrote to memory of 4624 2752 836922fcd9c816c7abeada2cb0091de0_NeikiAnalytics.exe 92 PID 2752 wrote to memory of 4624 2752 836922fcd9c816c7abeada2cb0091de0_NeikiAnalytics.exe 92 PID 2752 wrote to memory of 4624 2752 836922fcd9c816c7abeada2cb0091de0_NeikiAnalytics.exe 92 PID 4624 wrote to memory of 5028 4624 explorer.exe 94 PID 4624 wrote to memory of 5028 4624 explorer.exe 94 PID 4624 wrote to memory of 5028 4624 explorer.exe 94 PID 5028 wrote to memory of 888 5028 spoolsv.exe 96 PID 5028 wrote to memory of 888 5028 spoolsv.exe 96 PID 5028 wrote to memory of 888 5028 spoolsv.exe 96 PID 888 wrote to memory of 4592 888 svchost.exe 98 PID 888 wrote to memory of 4592 888 svchost.exe 98 PID 888 wrote to memory of 4592 888 svchost.exe 98
Processes
-
C:\Users\Admin\AppData\Local\Temp\836922fcd9c816c7abeada2cb0091de0_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\836922fcd9c816c7abeada2cb0091de0_NeikiAnalytics.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2752 -
\??\c:\windows\resources\themes\explorer.exec:\windows\resources\themes\explorer.exe2⤵
- Modifies visiblity of hidden/system files in Explorer
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4624 -
\??\c:\windows\resources\spoolsv.exec:\windows\resources\spoolsv.exe SE3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5028 -
\??\c:\windows\resources\svchost.exec:\windows\resources\svchost.exe4⤵
- Modifies visiblity of hidden/system files in Explorer
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:888 -
\??\c:\windows\resources\spoolsv.exec:\windows\resources\spoolsv.exe PR5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetWindowsHookEx
PID:4592
-
-
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --field-trial-handle=3980,i,13281073920029625837,8253721632651544158,262144 --variations-seed-version --mojo-platform-channel-handle=4488 /prefetch:81⤵PID:2480
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
2Virtualization/Sandbox Evasion
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.9MB
MD5c9310f3db61897d85d321b8a80c5d441
SHA14c1d5d69237f4893b329848edff85452add0a138
SHA256d2d18eaadbd2fd022533afa5b30c02a34a6a3f4a0530677d323c36f3b55f2da4
SHA51213dd7d91e8b9edacc6f422f113e7a7ac92b4215473980598057d5bce04dfec4f14665da25acba3d2afb1ac82c2073a858a60b6142a052b449824851181e78478
-
Filesize
1.9MB
MD5971a3bd611aba34605b2255f51efe44e
SHA1f5c47c15c23f6e1fd8b7cbac6ca507ef343a9bc1
SHA2562eb3377edcdcfe905b19ab243e01c8f2ad39896469da4d7fed90ccfaa0c6622b
SHA5123df8d64ccf587296ff5fb0e7661fb4a08986580af9809bc5eaefcdd653a594a1d618e9382ac6344416150df18c5b0399d9fc3c3066a8ae6bfed9774440aba65e
-
Filesize
1.9MB
MD5d14b06fdfcc6dc4191ba1677c1ae7d26
SHA1699b8b373a3f08565a1420b0437a49b38a182baa
SHA256f0416c73815937c0a9ef2b033c10d22d90862c1a3b6e9c83b49a085bea19927e
SHA5129e3d5ed436d9ef74cd1e135411cfc0644e5a4f9baf407bf2676671e9d6257a81f6d83ad716745e31e432b6d5f2a6f2f5fd7186f04580a77e3962afc3a9e3d966