Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
12/05/2024, 01:59
Static task
static1
Behavioral task
behavioral1
Sample
5a2273a7637a9970206c0af15855fdc0_NeikiAnalytics.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
5a2273a7637a9970206c0af15855fdc0_NeikiAnalytics.exe
Resource
win10v2004-20240426-en
General
-
Target
5a2273a7637a9970206c0af15855fdc0_NeikiAnalytics.exe
-
Size
2.7MB
-
MD5
5a2273a7637a9970206c0af15855fdc0
-
SHA1
aea87218170e73fc8143c66e7e96a7835e8f0958
-
SHA256
0774c8d61c7b6ac3545c1f6b38b6f7bc6b917526c9727d17374793ed3dd38ead
-
SHA512
09eb6eb092c857ae4b4dfc1d214e55922bfb41bcbb4e7c32d709980b156e2ca7827debfd4f30461fa146421032ee41c36d76dc8c17323b4cc514db2ed76f6db7
-
SSDEEP
49152:+R0p8xHycIq+GI27nGroMPTJPer1c2HSjpjK3LBD9w4Sx:+R0pI/IQlUoMPdmpSpL4
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1628 devdobsys.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Parametr = "C:\\FilesDO\\devdobsys.exe" 5a2273a7637a9970206c0af15855fdc0_NeikiAnalytics.exe Set value (str) \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Parametr = "C:\\GalaxR7\\dobasys.exe" 5a2273a7637a9970206c0af15855fdc0_NeikiAnalytics.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3920 5a2273a7637a9970206c0af15855fdc0_NeikiAnalytics.exe 3920 5a2273a7637a9970206c0af15855fdc0_NeikiAnalytics.exe 3920 5a2273a7637a9970206c0af15855fdc0_NeikiAnalytics.exe 3920 5a2273a7637a9970206c0af15855fdc0_NeikiAnalytics.exe 1628 devdobsys.exe 1628 devdobsys.exe 3920 5a2273a7637a9970206c0af15855fdc0_NeikiAnalytics.exe 3920 5a2273a7637a9970206c0af15855fdc0_NeikiAnalytics.exe 1628 devdobsys.exe 1628 devdobsys.exe 3920 5a2273a7637a9970206c0af15855fdc0_NeikiAnalytics.exe 3920 5a2273a7637a9970206c0af15855fdc0_NeikiAnalytics.exe 1628 devdobsys.exe 1628 devdobsys.exe 3920 5a2273a7637a9970206c0af15855fdc0_NeikiAnalytics.exe 3920 5a2273a7637a9970206c0af15855fdc0_NeikiAnalytics.exe 1628 devdobsys.exe 1628 devdobsys.exe 3920 5a2273a7637a9970206c0af15855fdc0_NeikiAnalytics.exe 3920 5a2273a7637a9970206c0af15855fdc0_NeikiAnalytics.exe 1628 devdobsys.exe 1628 devdobsys.exe 3920 5a2273a7637a9970206c0af15855fdc0_NeikiAnalytics.exe 3920 5a2273a7637a9970206c0af15855fdc0_NeikiAnalytics.exe 1628 devdobsys.exe 1628 devdobsys.exe 3920 5a2273a7637a9970206c0af15855fdc0_NeikiAnalytics.exe 3920 5a2273a7637a9970206c0af15855fdc0_NeikiAnalytics.exe 1628 devdobsys.exe 1628 devdobsys.exe 3920 5a2273a7637a9970206c0af15855fdc0_NeikiAnalytics.exe 3920 5a2273a7637a9970206c0af15855fdc0_NeikiAnalytics.exe 1628 devdobsys.exe 1628 devdobsys.exe 3920 5a2273a7637a9970206c0af15855fdc0_NeikiAnalytics.exe 3920 5a2273a7637a9970206c0af15855fdc0_NeikiAnalytics.exe 1628 devdobsys.exe 1628 devdobsys.exe 3920 5a2273a7637a9970206c0af15855fdc0_NeikiAnalytics.exe 3920 5a2273a7637a9970206c0af15855fdc0_NeikiAnalytics.exe 1628 devdobsys.exe 1628 devdobsys.exe 3920 5a2273a7637a9970206c0af15855fdc0_NeikiAnalytics.exe 3920 5a2273a7637a9970206c0af15855fdc0_NeikiAnalytics.exe 1628 devdobsys.exe 1628 devdobsys.exe 3920 5a2273a7637a9970206c0af15855fdc0_NeikiAnalytics.exe 3920 5a2273a7637a9970206c0af15855fdc0_NeikiAnalytics.exe 1628 devdobsys.exe 1628 devdobsys.exe 3920 5a2273a7637a9970206c0af15855fdc0_NeikiAnalytics.exe 3920 5a2273a7637a9970206c0af15855fdc0_NeikiAnalytics.exe 1628 devdobsys.exe 1628 devdobsys.exe 3920 5a2273a7637a9970206c0af15855fdc0_NeikiAnalytics.exe 3920 5a2273a7637a9970206c0af15855fdc0_NeikiAnalytics.exe 1628 devdobsys.exe 1628 devdobsys.exe 3920 5a2273a7637a9970206c0af15855fdc0_NeikiAnalytics.exe 3920 5a2273a7637a9970206c0af15855fdc0_NeikiAnalytics.exe 1628 devdobsys.exe 1628 devdobsys.exe 3920 5a2273a7637a9970206c0af15855fdc0_NeikiAnalytics.exe 3920 5a2273a7637a9970206c0af15855fdc0_NeikiAnalytics.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3920 wrote to memory of 1628 3920 5a2273a7637a9970206c0af15855fdc0_NeikiAnalytics.exe 87 PID 3920 wrote to memory of 1628 3920 5a2273a7637a9970206c0af15855fdc0_NeikiAnalytics.exe 87 PID 3920 wrote to memory of 1628 3920 5a2273a7637a9970206c0af15855fdc0_NeikiAnalytics.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\5a2273a7637a9970206c0af15855fdc0_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\5a2273a7637a9970206c0af15855fdc0_NeikiAnalytics.exe"1⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3920 -
C:\FilesDO\devdobsys.exeC:\FilesDO\devdobsys.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:1628
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.7MB
MD52eb3b6aaa64f9c7ce421e09563c5c0da
SHA161ea6745ea4d7d53080af1f72bd019cc65e8d7cf
SHA256442486a66f5a49a781e8fb84117f69116cab0f1f66338afc56d8dbfacaa19863
SHA5122f6ecb43714f6613749c2944dbd70bb035f098a654e9e79f1c666fbfd3ac0e17efd309c52134ee293ef800ffc0926fa72628d3b045bdd741ff8dc3521ceac8a8
-
Filesize
582KB
MD53cf312a19873158175b8d948d4e91e40
SHA1ab7154ea55d34109d2167d76bd7a997298f8f2d2
SHA256672c017982d4d4616c824c6bbd3a0631dc8013986d279d10eb166adc179103e6
SHA5129bd5195eeba932cdc0231ec54857f45bc125b7a6e2813e2dd7a4d53c6b9b9adeed2ecf4fa3db9b4d247ca2c4ae7e554593921e722ecc52410fb920b114b8f951
-
Filesize
2.7MB
MD5b4b52812d84e36322674d8d917fde63a
SHA1a218c4ff4a2a460062004860ce041e36bb027906
SHA2562fc84ac218cc1bd742604f520a5595b7ee0e9cb9be5caaf3251b9ac973f01e59
SHA512537a58f7293afeb3dff2e09a032314d43a0162b398cd72ea88ee1ab502943be31e1f9204346a6dff558adeb8dec12dd2121c8eaea84dfe6a1efd24f3006ab775
-
Filesize
203B
MD5ab14f331e1cdcc4cf0ee171b46c45a98
SHA1987bec2ffc33e1bb90c56ade78ad4d7f54ae22f0
SHA25659c3f7b51f6b016b68b761df05b54db134645a461e36f6321015e33044ac5a68
SHA51214424fe95a7cfdda950d432a00eaa2882e2b67851c292afc304ea7a8d6e2856c944ee018fa607cfcac27e89a6c37613e7a6aafe84a5f770afb9ec1cae0f3f6ed