Analysis
-
max time kernel
150s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
13/05/2024, 06:49
Static task
static1
Behavioral task
behavioral1
Sample
a2c4b15f342bba68ff3953554261f2d0_NeikiAnalytics.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
a2c4b15f342bba68ff3953554261f2d0_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
a2c4b15f342bba68ff3953554261f2d0_NeikiAnalytics.exe
-
Size
53KB
-
MD5
a2c4b15f342bba68ff3953554261f2d0
-
SHA1
d1ee6a1afc47e521b05ce54c3df4684b527c1673
-
SHA256
3aa34f47d9eac7781ddcb8296dc9c8df8adbf8a76d92a81fad4ee67e03ceb67f
-
SHA512
8243158aea89503a7a0cf9c1f8a1031757ad84ccddf19eb1e69b376ef49249d48103185a482edf9635adff394161fe8eb6d4942d53e640dd4e040acefe196d5d
-
SSDEEP
1536:vNyg8r8QZReCd7Kp3StjEMjmLM3ztDJWZsXy4JzxPME:8ReCdJJjmLM3zRJWZsXy4Jt
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" toawoh.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation a2c4b15f342bba68ff3953554261f2d0_NeikiAnalytics.exe -
Executes dropped EXE 1 IoCs
pid Process 3224 toawoh.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\toawoh = "C:\\Users\\Admin\\toawoh.exe" toawoh.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3224 toawoh.exe 3224 toawoh.exe 3224 toawoh.exe 3224 toawoh.exe 3224 toawoh.exe 3224 toawoh.exe 3224 toawoh.exe 3224 toawoh.exe 3224 toawoh.exe 3224 toawoh.exe 3224 toawoh.exe 3224 toawoh.exe 3224 toawoh.exe 3224 toawoh.exe 3224 toawoh.exe 3224 toawoh.exe 3224 toawoh.exe 3224 toawoh.exe 3224 toawoh.exe 3224 toawoh.exe 3224 toawoh.exe 3224 toawoh.exe 3224 toawoh.exe 3224 toawoh.exe 3224 toawoh.exe 3224 toawoh.exe 3224 toawoh.exe 3224 toawoh.exe 3224 toawoh.exe 3224 toawoh.exe 3224 toawoh.exe 3224 toawoh.exe 3224 toawoh.exe 3224 toawoh.exe 3224 toawoh.exe 3224 toawoh.exe 3224 toawoh.exe 3224 toawoh.exe 3224 toawoh.exe 3224 toawoh.exe 3224 toawoh.exe 3224 toawoh.exe 3224 toawoh.exe 3224 toawoh.exe 3224 toawoh.exe 3224 toawoh.exe 3224 toawoh.exe 3224 toawoh.exe 3224 toawoh.exe 3224 toawoh.exe 3224 toawoh.exe 3224 toawoh.exe 3224 toawoh.exe 3224 toawoh.exe 3224 toawoh.exe 3224 toawoh.exe 3224 toawoh.exe 3224 toawoh.exe 3224 toawoh.exe 3224 toawoh.exe 3224 toawoh.exe 3224 toawoh.exe 3224 toawoh.exe 3224 toawoh.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 3712 a2c4b15f342bba68ff3953554261f2d0_NeikiAnalytics.exe 3224 toawoh.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3712 wrote to memory of 3224 3712 a2c4b15f342bba68ff3953554261f2d0_NeikiAnalytics.exe 90 PID 3712 wrote to memory of 3224 3712 a2c4b15f342bba68ff3953554261f2d0_NeikiAnalytics.exe 90 PID 3712 wrote to memory of 3224 3712 a2c4b15f342bba68ff3953554261f2d0_NeikiAnalytics.exe 90 PID 3224 wrote to memory of 3712 3224 toawoh.exe 83 PID 3224 wrote to memory of 3712 3224 toawoh.exe 83 PID 3224 wrote to memory of 3712 3224 toawoh.exe 83 PID 3224 wrote to memory of 3712 3224 toawoh.exe 83 PID 3224 wrote to memory of 3712 3224 toawoh.exe 83 PID 3224 wrote to memory of 3712 3224 toawoh.exe 83 PID 3224 wrote to memory of 3712 3224 toawoh.exe 83 PID 3224 wrote to memory of 3712 3224 toawoh.exe 83 PID 3224 wrote to memory of 3712 3224 toawoh.exe 83 PID 3224 wrote to memory of 3712 3224 toawoh.exe 83 PID 3224 wrote to memory of 3712 3224 toawoh.exe 83 PID 3224 wrote to memory of 3712 3224 toawoh.exe 83 PID 3224 wrote to memory of 3712 3224 toawoh.exe 83 PID 3224 wrote to memory of 3712 3224 toawoh.exe 83 PID 3224 wrote to memory of 3712 3224 toawoh.exe 83 PID 3224 wrote to memory of 3712 3224 toawoh.exe 83 PID 3224 wrote to memory of 3712 3224 toawoh.exe 83 PID 3224 wrote to memory of 3712 3224 toawoh.exe 83 PID 3224 wrote to memory of 3712 3224 toawoh.exe 83 PID 3224 wrote to memory of 3712 3224 toawoh.exe 83 PID 3224 wrote to memory of 3712 3224 toawoh.exe 83 PID 3224 wrote to memory of 3712 3224 toawoh.exe 83 PID 3224 wrote to memory of 3712 3224 toawoh.exe 83 PID 3224 wrote to memory of 3712 3224 toawoh.exe 83 PID 3224 wrote to memory of 3712 3224 toawoh.exe 83 PID 3224 wrote to memory of 3712 3224 toawoh.exe 83 PID 3224 wrote to memory of 3712 3224 toawoh.exe 83 PID 3224 wrote to memory of 3712 3224 toawoh.exe 83 PID 3224 wrote to memory of 3712 3224 toawoh.exe 83 PID 3224 wrote to memory of 3712 3224 toawoh.exe 83 PID 3224 wrote to memory of 3712 3224 toawoh.exe 83 PID 3224 wrote to memory of 3712 3224 toawoh.exe 83 PID 3224 wrote to memory of 3712 3224 toawoh.exe 83 PID 3224 wrote to memory of 3712 3224 toawoh.exe 83 PID 3224 wrote to memory of 3712 3224 toawoh.exe 83 PID 3224 wrote to memory of 3712 3224 toawoh.exe 83 PID 3224 wrote to memory of 3712 3224 toawoh.exe 83 PID 3224 wrote to memory of 3712 3224 toawoh.exe 83 PID 3224 wrote to memory of 3712 3224 toawoh.exe 83 PID 3224 wrote to memory of 3712 3224 toawoh.exe 83 PID 3224 wrote to memory of 3712 3224 toawoh.exe 83 PID 3224 wrote to memory of 3712 3224 toawoh.exe 83 PID 3224 wrote to memory of 3712 3224 toawoh.exe 83 PID 3224 wrote to memory of 3712 3224 toawoh.exe 83 PID 3224 wrote to memory of 3712 3224 toawoh.exe 83 PID 3224 wrote to memory of 3712 3224 toawoh.exe 83 PID 3224 wrote to memory of 3712 3224 toawoh.exe 83 PID 3224 wrote to memory of 3712 3224 toawoh.exe 83 PID 3224 wrote to memory of 3712 3224 toawoh.exe 83 PID 3224 wrote to memory of 3712 3224 toawoh.exe 83 PID 3224 wrote to memory of 3712 3224 toawoh.exe 83 PID 3224 wrote to memory of 3712 3224 toawoh.exe 83 PID 3224 wrote to memory of 3712 3224 toawoh.exe 83 PID 3224 wrote to memory of 3712 3224 toawoh.exe 83 PID 3224 wrote to memory of 3712 3224 toawoh.exe 83 PID 3224 wrote to memory of 3712 3224 toawoh.exe 83 PID 3224 wrote to memory of 3712 3224 toawoh.exe 83 PID 3224 wrote to memory of 3712 3224 toawoh.exe 83 PID 3224 wrote to memory of 3712 3224 toawoh.exe 83 PID 3224 wrote to memory of 3712 3224 toawoh.exe 83 PID 3224 wrote to memory of 3712 3224 toawoh.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\a2c4b15f342bba68ff3953554261f2d0_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\a2c4b15f342bba68ff3953554261f2d0_NeikiAnalytics.exe"1⤵
- Checks computer location settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3712 -
C:\Users\Admin\toawoh.exe"C:\Users\Admin\toawoh.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3224
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
53KB
MD5ee96c148ec493fd91fabd21c62e333fa
SHA1c339941143b123f92299f89ea77d4323575f3b68
SHA2561ab47f65678e02942d617b9ff4d95d5355da91475bec179b6acf46fd05bc0500
SHA5122d1f4c9634bc7048b0bdd420285e00fd2af76be5e0c785c95778a8b023ae30a714d45a08bc6bf98bc1a99ece6b665fdafa444f649eda5097736c6aba49da6c8b