Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
12/05/2024, 04:00
Static task
static1
Behavioral task
behavioral1
Sample
673460cb019bf118be3aa48638bc9e80_NeikiAnalytics.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
673460cb019bf118be3aa48638bc9e80_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
673460cb019bf118be3aa48638bc9e80_NeikiAnalytics.exe
-
Size
84KB
-
MD5
673460cb019bf118be3aa48638bc9e80
-
SHA1
0fa38e4d9161d3bc7515c95ad36bb341b4b4008c
-
SHA256
43d44636eb3b4b9d6e6f5869c9fe95f427448200a7d491307618339ad9948711
-
SHA512
2c8d7837255e9d97a7e4ce26da73e96599da9f2e3f851aa99b7d01019ac3b8323c6c0a4236307e036a59101fd9bc1280e316032f4c1dac3e835b6b85005baca6
-
SSDEEP
1536:1clIGFNMi+hJUneHoGTvvv4V9hqdhbtgS:+RMi+fUnCTvvv4V9hEhbCS
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation 673460cb019bf118be3aa48638bc9e80_NeikiAnalytics.exe Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation lsass.exe -
Executes dropped EXE 4 IoCs
pid Process 2056 lsass.exe 1524 lsass.exe 3716 lsass.exe 1820 lsass.exe -
resource yara_rule behavioral2/memory/3544-2-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/memory/3544-15-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/memory/3544-16-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/memory/3544-42-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/memory/1524-56-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/memory/3544-61-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/memory/1524-91-0x0000000000400000-0x000000000040B000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Audio Driver = "C:\\Users\\Admin\\AppData\\Roaming\\system\\lsass.exe" reg.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 4708 set thread context of 3544 4708 673460cb019bf118be3aa48638bc9e80_NeikiAnalytics.exe 87 PID 2056 set thread context of 1524 2056 lsass.exe 96 PID 2056 set thread context of 3716 2056 lsass.exe 97 PID 3716 set thread context of 1820 3716 lsass.exe 98 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 1524 lsass.exe Token: SeDebugPrivilege 1524 lsass.exe Token: SeDebugPrivilege 1524 lsass.exe Token: SeDebugPrivilege 1524 lsass.exe Token: SeDebugPrivilege 1524 lsass.exe Token: SeDebugPrivilege 1524 lsass.exe Token: SeDebugPrivilege 1524 lsass.exe Token: SeDebugPrivilege 1524 lsass.exe Token: SeDebugPrivilege 1524 lsass.exe Token: SeDebugPrivilege 1524 lsass.exe Token: SeDebugPrivilege 1524 lsass.exe Token: SeDebugPrivilege 1524 lsass.exe Token: SeDebugPrivilege 1524 lsass.exe Token: SeDebugPrivilege 1524 lsass.exe Token: SeDebugPrivilege 1524 lsass.exe Token: SeDebugPrivilege 1524 lsass.exe Token: SeDebugPrivilege 1524 lsass.exe Token: SeDebugPrivilege 1524 lsass.exe Token: SeDebugPrivilege 1524 lsass.exe Token: SeDebugPrivilege 1524 lsass.exe Token: SeDebugPrivilege 1524 lsass.exe Token: SeDebugPrivilege 1524 lsass.exe Token: SeDebugPrivilege 1524 lsass.exe Token: SeDebugPrivilege 1524 lsass.exe Token: SeDebugPrivilege 1524 lsass.exe Token: SeDebugPrivilege 1524 lsass.exe Token: SeDebugPrivilege 1524 lsass.exe Token: SeDebugPrivilege 1524 lsass.exe Token: SeDebugPrivilege 1524 lsass.exe Token: SeDebugPrivilege 1524 lsass.exe Token: SeDebugPrivilege 1524 lsass.exe Token: SeDebugPrivilege 1524 lsass.exe Token: SeDebugPrivilege 1524 lsass.exe Token: SeDebugPrivilege 1524 lsass.exe Token: SeDebugPrivilege 1524 lsass.exe Token: SeDebugPrivilege 1524 lsass.exe Token: SeDebugPrivilege 1524 lsass.exe Token: SeDebugPrivilege 1524 lsass.exe Token: SeDebugPrivilege 1524 lsass.exe Token: SeDebugPrivilege 1524 lsass.exe Token: SeDebugPrivilege 1524 lsass.exe Token: SeDebugPrivilege 1524 lsass.exe Token: SeDebugPrivilege 1524 lsass.exe Token: SeDebugPrivilege 1524 lsass.exe Token: SeDebugPrivilege 1524 lsass.exe Token: SeDebugPrivilege 1524 lsass.exe Token: SeDebugPrivilege 1524 lsass.exe Token: SeDebugPrivilege 1524 lsass.exe Token: SeDebugPrivilege 1524 lsass.exe Token: SeDebugPrivilege 1524 lsass.exe Token: SeDebugPrivilege 1524 lsass.exe Token: SeDebugPrivilege 1524 lsass.exe Token: SeDebugPrivilege 1524 lsass.exe Token: SeDebugPrivilege 1524 lsass.exe Token: SeDebugPrivilege 1524 lsass.exe Token: SeDebugPrivilege 1524 lsass.exe Token: SeDebugPrivilege 1524 lsass.exe Token: SeDebugPrivilege 1524 lsass.exe Token: SeDebugPrivilege 1524 lsass.exe Token: SeDebugPrivilege 1524 lsass.exe Token: SeDebugPrivilege 1524 lsass.exe Token: SeDebugPrivilege 1524 lsass.exe Token: SeDebugPrivilege 1524 lsass.exe Token: SeDebugPrivilege 1524 lsass.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 4708 673460cb019bf118be3aa48638bc9e80_NeikiAnalytics.exe 3544 673460cb019bf118be3aa48638bc9e80_NeikiAnalytics.exe 2056 lsass.exe 1524 lsass.exe -
Suspicious use of WriteProcessMemory 39 IoCs
description pid Process procid_target PID 4708 wrote to memory of 3544 4708 673460cb019bf118be3aa48638bc9e80_NeikiAnalytics.exe 87 PID 4708 wrote to memory of 3544 4708 673460cb019bf118be3aa48638bc9e80_NeikiAnalytics.exe 87 PID 4708 wrote to memory of 3544 4708 673460cb019bf118be3aa48638bc9e80_NeikiAnalytics.exe 87 PID 4708 wrote to memory of 3544 4708 673460cb019bf118be3aa48638bc9e80_NeikiAnalytics.exe 87 PID 4708 wrote to memory of 3544 4708 673460cb019bf118be3aa48638bc9e80_NeikiAnalytics.exe 87 PID 4708 wrote to memory of 3544 4708 673460cb019bf118be3aa48638bc9e80_NeikiAnalytics.exe 87 PID 4708 wrote to memory of 3544 4708 673460cb019bf118be3aa48638bc9e80_NeikiAnalytics.exe 87 PID 4708 wrote to memory of 3544 4708 673460cb019bf118be3aa48638bc9e80_NeikiAnalytics.exe 87 PID 3544 wrote to memory of 3100 3544 673460cb019bf118be3aa48638bc9e80_NeikiAnalytics.exe 88 PID 3544 wrote to memory of 3100 3544 673460cb019bf118be3aa48638bc9e80_NeikiAnalytics.exe 88 PID 3544 wrote to memory of 3100 3544 673460cb019bf118be3aa48638bc9e80_NeikiAnalytics.exe 88 PID 3100 wrote to memory of 2952 3100 cmd.exe 91 PID 3100 wrote to memory of 2952 3100 cmd.exe 91 PID 3100 wrote to memory of 2952 3100 cmd.exe 91 PID 3544 wrote to memory of 2056 3544 673460cb019bf118be3aa48638bc9e80_NeikiAnalytics.exe 92 PID 3544 wrote to memory of 2056 3544 673460cb019bf118be3aa48638bc9e80_NeikiAnalytics.exe 92 PID 3544 wrote to memory of 2056 3544 673460cb019bf118be3aa48638bc9e80_NeikiAnalytics.exe 92 PID 2056 wrote to memory of 1524 2056 lsass.exe 96 PID 2056 wrote to memory of 1524 2056 lsass.exe 96 PID 2056 wrote to memory of 1524 2056 lsass.exe 96 PID 2056 wrote to memory of 1524 2056 lsass.exe 96 PID 2056 wrote to memory of 1524 2056 lsass.exe 96 PID 2056 wrote to memory of 1524 2056 lsass.exe 96 PID 2056 wrote to memory of 1524 2056 lsass.exe 96 PID 2056 wrote to memory of 1524 2056 lsass.exe 96 PID 2056 wrote to memory of 3716 2056 lsass.exe 97 PID 2056 wrote to memory of 3716 2056 lsass.exe 97 PID 2056 wrote to memory of 3716 2056 lsass.exe 97 PID 2056 wrote to memory of 3716 2056 lsass.exe 97 PID 2056 wrote to memory of 3716 2056 lsass.exe 97 PID 2056 wrote to memory of 3716 2056 lsass.exe 97 PID 2056 wrote to memory of 3716 2056 lsass.exe 97 PID 3716 wrote to memory of 1820 3716 lsass.exe 98 PID 3716 wrote to memory of 1820 3716 lsass.exe 98 PID 3716 wrote to memory of 1820 3716 lsass.exe 98 PID 3716 wrote to memory of 1820 3716 lsass.exe 98 PID 3716 wrote to memory of 1820 3716 lsass.exe 98 PID 3716 wrote to memory of 1820 3716 lsass.exe 98 PID 3716 wrote to memory of 1820 3716 lsass.exe 98
Processes
-
C:\Users\Admin\AppData\Local\Temp\673460cb019bf118be3aa48638bc9e80_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\673460cb019bf118be3aa48638bc9e80_NeikiAnalytics.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4708 -
C:\Users\Admin\AppData\Local\Temp\673460cb019bf118be3aa48638bc9e80_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\673460cb019bf118be3aa48638bc9e80_NeikiAnalytics.exe"2⤵
- Checks computer location settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3544 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\AVTRV.bat" "3⤵
- Suspicious use of WriteProcessMemory
PID:3100 -
C:\Windows\SysWOW64\reg.exeREG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "Audio Driver" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\system\lsass.exe" /f4⤵
- Adds Run key to start application
PID:2952
-
-
-
C:\Users\Admin\AppData\Roaming\system\lsass.exe"C:\Users\Admin\AppData\Roaming\system\lsass.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2056 -
C:\Users\Admin\AppData\Roaming\system\lsass.exe"C:\Users\Admin\AppData\Roaming\system\lsass.exe"4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1524
-
-
C:\Users\Admin\AppData\Roaming\system\lsass.exe"C:\Users\Admin\AppData\Roaming\system\lsass.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3716 -
C:\Users\Admin\AppData\Roaming\system\lsass.exe"C:\Users\Admin\AppData\Roaming\system\lsass.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
PID:1820
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
294B
MD51bbf5baae6056279e2cc23fbaf3eb3b3
SHA10c3f809762e62da5b8cbe9a8df6c43ed600ab42b
SHA256278d7736fb655bff9e61f7246c1fdc962653f264508666ec7d5ed7af2f1af57e
SHA5128345819ee9ddde611d60122ab93f1c5d722057c8a647149bc30a8756db685920e5b47d57536ad20732fb846f0e99bfb435257404e0a7245ee9dc357609c678c3
-
Filesize
146B
MD5c8cba0a9d4d5600b5f53c4c0681d1115
SHA10e5348e210ca70b2b0ffdc3ff7e6f611716df80c
SHA256ca2b63f6d7bf17480415ae93e115bf9f9699335e84e62719eefdbcc5a78bd2e1
SHA512a2ad6eb5ae2f6d57ca15363ac2f0c57ca3580474e94b9c010750948814cf4d5ffa0c3e7ef44634a3593da23f56011703ff220a3d7780f6f01785bf3b6676ced0
-
Filesize
84KB
MD58418df54a99adaf00017620d73bbe922
SHA1318190bcfafba5cf9b65c0037d69eb36f4b9aa0c
SHA2565a2202e4ab3e3a5679af54264b578131f9aab6b120c8f7553bad513464b6bcde
SHA512ae7c8158b668d268fcb084e71dae223024ac45de114bd18436fd54e04a8fd74c0e89d695d8ee1e30654c24c3e7c53d35fde3cb84e81ca2060deb77352fdbfbdb