Analysis
-
max time kernel
45s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
12/05/2024, 00:07
Static task
static1
Behavioral task
behavioral1
Sample
4dc3e4c6c927802e53a3855990894f90_NeikiAnalytics.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
4dc3e4c6c927802e53a3855990894f90_NeikiAnalytics.exe
Resource
win10v2004-20240226-en
General
-
Target
4dc3e4c6c927802e53a3855990894f90_NeikiAnalytics.exe
-
Size
76KB
-
MD5
4dc3e4c6c927802e53a3855990894f90
-
SHA1
53ab9dd88cca6ccf3b9f735224d791a88d6173d8
-
SHA256
2b7083597397d927b646f0c74c8fe7e35c3004d278d405a5aeca23da89972235
-
SHA512
7d366c4df2f16f5bdf340335e9ab81440d88cb63d951fb531d83029ffe96277beba699936f94ccbf64c11f25406fb306c739fc2933c1ad92ff1ff127e0d7cc62
-
SSDEEP
768:tOIrCa+VifiH+LGAr+xOF4/i/BEYkp7P6lweQDhDmpU5GFrrEzWsdSE0d8pUHIkj:t7gifxLPKxO+2G40OIkaw3
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" kuiey.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation 4dc3e4c6c927802e53a3855990894f90_NeikiAnalytics.exe -
Executes dropped EXE 1 IoCs
pid Process 2940 kuiey.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\kuiey = "C:\\Users\\Admin\\kuiey.exe" kuiey.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2940 kuiey.exe 2940 kuiey.exe 2940 kuiey.exe 2940 kuiey.exe 2940 kuiey.exe 2940 kuiey.exe 2940 kuiey.exe 2940 kuiey.exe 2940 kuiey.exe 2940 kuiey.exe 2940 kuiey.exe 2940 kuiey.exe 2940 kuiey.exe 2940 kuiey.exe 2940 kuiey.exe 2940 kuiey.exe 2940 kuiey.exe 2940 kuiey.exe 2940 kuiey.exe 2940 kuiey.exe 2940 kuiey.exe 2940 kuiey.exe 2940 kuiey.exe 2940 kuiey.exe 2940 kuiey.exe 2940 kuiey.exe 2940 kuiey.exe 2940 kuiey.exe 2940 kuiey.exe 2940 kuiey.exe 2940 kuiey.exe 2940 kuiey.exe 2940 kuiey.exe 2940 kuiey.exe 2940 kuiey.exe 2940 kuiey.exe 2940 kuiey.exe 2940 kuiey.exe 2940 kuiey.exe 2940 kuiey.exe 2940 kuiey.exe 2940 kuiey.exe 2940 kuiey.exe 2940 kuiey.exe 2940 kuiey.exe 2940 kuiey.exe 2940 kuiey.exe 2940 kuiey.exe 2940 kuiey.exe 2940 kuiey.exe 2940 kuiey.exe 2940 kuiey.exe 2940 kuiey.exe 2940 kuiey.exe 2940 kuiey.exe 2940 kuiey.exe 2940 kuiey.exe 2940 kuiey.exe 2940 kuiey.exe 2940 kuiey.exe 2940 kuiey.exe 2940 kuiey.exe 2940 kuiey.exe 2940 kuiey.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4820 4dc3e4c6c927802e53a3855990894f90_NeikiAnalytics.exe 2940 kuiey.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4820 wrote to memory of 2940 4820 4dc3e4c6c927802e53a3855990894f90_NeikiAnalytics.exe 92 PID 4820 wrote to memory of 2940 4820 4dc3e4c6c927802e53a3855990894f90_NeikiAnalytics.exe 92 PID 4820 wrote to memory of 2940 4820 4dc3e4c6c927802e53a3855990894f90_NeikiAnalytics.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\4dc3e4c6c927802e53a3855990894f90_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\4dc3e4c6c927802e53a3855990894f90_NeikiAnalytics.exe"1⤵
- Checks computer location settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4820 -
C:\Users\Admin\kuiey.exe"C:\Users\Admin\kuiey.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2940
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=1032 --field-trial-handle=2328,i,5873823382323802923,13134441441264702821,262144 --variations-seed-version /prefetch:81⤵PID:3808
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
76KB
MD5be610d598152dd78f8898392d1f65d5f
SHA11bff76321803163816977c07e29a4e06b4fc33d6
SHA2568b9368475b340fab0a506be4c4648c644dfb5de041d94eab0b1d7d1e65b8e927
SHA5122fdd3acb4e52e0d36798a862d69fadc1774430323d71305d453f5fa412b28790adbc44b8e5f92dea2905979f97313036f50a3fa9848127f01b0e115971c9cd0f