Analysis
-
max time kernel
149s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
13/05/2024, 09:47
Static task
static1
Behavioral task
behavioral1
Sample
afc1893b9042c864756b5ea613d89420_NeikiAnalytics.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
afc1893b9042c864756b5ea613d89420_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
afc1893b9042c864756b5ea613d89420_NeikiAnalytics.exe
-
Size
196KB
-
MD5
afc1893b9042c864756b5ea613d89420
-
SHA1
3f00260da7864904629a73ca6748143eff875855
-
SHA256
0a9d1b9a2280e7c2a8833429785bd077ea85b8473d9849ade3c6a0c96d04cb5f
-
SHA512
0eb2d37d3916a4cce8678367d823cd4de44d5d647011376de2413567eb925f559b232c3dcb5b5b49e7dbbacdb16a4d60feca56b1d6534833843444a3c94b7e38
-
SSDEEP
1536:PRqk3N/XTOaZk1GDGe0Pdb+d6DiUYot00gw3:waXJzDDypy6DiUru0gE
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" bouah.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation afc1893b9042c864756b5ea613d89420_NeikiAnalytics.exe -
Executes dropped EXE 1 IoCs
pid Process 368 bouah.exe -
Adds Run key to start application 2 TTPs 51 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\bouah = "C:\\Users\\Admin\\bouah.exe /M" bouah.exe Set value (str) \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\bouah = "C:\\Users\\Admin\\bouah.exe /I" bouah.exe Set value (str) \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\bouah = "C:\\Users\\Admin\\bouah.exe /A" bouah.exe Set value (str) \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\bouah = "C:\\Users\\Admin\\bouah.exe /T" bouah.exe Set value (str) \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\bouah = "C:\\Users\\Admin\\bouah.exe /x" bouah.exe Set value (str) \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\bouah = "C:\\Users\\Admin\\bouah.exe /D" bouah.exe Set value (str) \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\bouah = "C:\\Users\\Admin\\bouah.exe /H" bouah.exe Set value (str) \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\bouah = "C:\\Users\\Admin\\bouah.exe /l" bouah.exe Set value (str) \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\bouah = "C:\\Users\\Admin\\bouah.exe /p" bouah.exe Set value (str) \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\bouah = "C:\\Users\\Admin\\bouah.exe /L" bouah.exe Set value (str) \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\bouah = "C:\\Users\\Admin\\bouah.exe /r" bouah.exe Set value (str) \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\bouah = "C:\\Users\\Admin\\bouah.exe /m" bouah.exe Set value (str) \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\bouah = "C:\\Users\\Admin\\bouah.exe /s" bouah.exe Set value (str) \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\bouah = "C:\\Users\\Admin\\bouah.exe /J" bouah.exe Set value (str) \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\bouah = "C:\\Users\\Admin\\bouah.exe /Y" bouah.exe Set value (str) \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\bouah = "C:\\Users\\Admin\\bouah.exe /G" bouah.exe Set value (str) \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\bouah = "C:\\Users\\Admin\\bouah.exe /C" bouah.exe Set value (str) \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\bouah = "C:\\Users\\Admin\\bouah.exe /d" bouah.exe Set value (str) \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\bouah = "C:\\Users\\Admin\\bouah.exe /e" bouah.exe Set value (str) \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\bouah = "C:\\Users\\Admin\\bouah.exe /v" bouah.exe Set value (str) \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\bouah = "C:\\Users\\Admin\\bouah.exe /F" bouah.exe Set value (str) \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\bouah = "C:\\Users\\Admin\\bouah.exe /B" bouah.exe Set value (str) \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\bouah = "C:\\Users\\Admin\\bouah.exe /V" bouah.exe Set value (str) \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\bouah = "C:\\Users\\Admin\\bouah.exe /N" bouah.exe Set value (str) \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\bouah = "C:\\Users\\Admin\\bouah.exe /z" bouah.exe Set value (str) \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\bouah = "C:\\Users\\Admin\\bouah.exe /X" bouah.exe Set value (str) \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\bouah = "C:\\Users\\Admin\\bouah.exe /u" bouah.exe Set value (str) \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\bouah = "C:\\Users\\Admin\\bouah.exe /j" bouah.exe Set value (str) \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\bouah = "C:\\Users\\Admin\\bouah.exe /f" bouah.exe Set value (str) \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\bouah = "C:\\Users\\Admin\\bouah.exe /W" bouah.exe Set value (str) \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\bouah = "C:\\Users\\Admin\\bouah.exe /a" bouah.exe Set value (str) \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\bouah = "C:\\Users\\Admin\\bouah.exe /P" bouah.exe Set value (str) \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\bouah = "C:\\Users\\Admin\\bouah.exe /w" bouah.exe Set value (str) \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\bouah = "C:\\Users\\Admin\\bouah.exe /S" bouah.exe Set value (str) \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\bouah = "C:\\Users\\Admin\\bouah.exe /t" bouah.exe Set value (str) \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\bouah = "C:\\Users\\Admin\\bouah.exe /R" bouah.exe Set value (str) \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\bouah = "C:\\Users\\Admin\\bouah.exe /b" bouah.exe Set value (str) \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\bouah = "C:\\Users\\Admin\\bouah.exe /n" bouah.exe Set value (str) \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\bouah = "C:\\Users\\Admin\\bouah.exe /q" bouah.exe Set value (str) \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\bouah = "C:\\Users\\Admin\\bouah.exe /U" bouah.exe Set value (str) \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\bouah = "C:\\Users\\Admin\\bouah.exe /E" bouah.exe Set value (str) \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\bouah = "C:\\Users\\Admin\\bouah.exe /K" bouah.exe Set value (str) \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\bouah = "C:\\Users\\Admin\\bouah.exe /O" bouah.exe Set value (str) \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\bouah = "C:\\Users\\Admin\\bouah.exe /Q" bouah.exe Set value (str) \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\bouah = "C:\\Users\\Admin\\bouah.exe /i" bouah.exe Set value (str) \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\bouah = "C:\\Users\\Admin\\bouah.exe /y" bouah.exe Set value (str) \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\bouah = "C:\\Users\\Admin\\bouah.exe /o" bouah.exe Set value (str) \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\bouah = "C:\\Users\\Admin\\bouah.exe /h" bouah.exe Set value (str) \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\bouah = "C:\\Users\\Admin\\bouah.exe /k" bouah.exe Set value (str) \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\bouah = "C:\\Users\\Admin\\bouah.exe /c" bouah.exe Set value (str) \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\bouah = "C:\\Users\\Admin\\bouah.exe /g" bouah.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 368 bouah.exe 368 bouah.exe 368 bouah.exe 368 bouah.exe 368 bouah.exe 368 bouah.exe 368 bouah.exe 368 bouah.exe 368 bouah.exe 368 bouah.exe 368 bouah.exe 368 bouah.exe 368 bouah.exe 368 bouah.exe 368 bouah.exe 368 bouah.exe 368 bouah.exe 368 bouah.exe 368 bouah.exe 368 bouah.exe 368 bouah.exe 368 bouah.exe 368 bouah.exe 368 bouah.exe 368 bouah.exe 368 bouah.exe 368 bouah.exe 368 bouah.exe 368 bouah.exe 368 bouah.exe 368 bouah.exe 368 bouah.exe 368 bouah.exe 368 bouah.exe 368 bouah.exe 368 bouah.exe 368 bouah.exe 368 bouah.exe 368 bouah.exe 368 bouah.exe 368 bouah.exe 368 bouah.exe 368 bouah.exe 368 bouah.exe 368 bouah.exe 368 bouah.exe 368 bouah.exe 368 bouah.exe 368 bouah.exe 368 bouah.exe 368 bouah.exe 368 bouah.exe 368 bouah.exe 368 bouah.exe 368 bouah.exe 368 bouah.exe 368 bouah.exe 368 bouah.exe 368 bouah.exe 368 bouah.exe 368 bouah.exe 368 bouah.exe 368 bouah.exe 368 bouah.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1924 afc1893b9042c864756b5ea613d89420_NeikiAnalytics.exe 368 bouah.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1924 wrote to memory of 368 1924 afc1893b9042c864756b5ea613d89420_NeikiAnalytics.exe 94 PID 1924 wrote to memory of 368 1924 afc1893b9042c864756b5ea613d89420_NeikiAnalytics.exe 94 PID 1924 wrote to memory of 368 1924 afc1893b9042c864756b5ea613d89420_NeikiAnalytics.exe 94 PID 368 wrote to memory of 1924 368 bouah.exe 90 PID 368 wrote to memory of 1924 368 bouah.exe 90 PID 368 wrote to memory of 1924 368 bouah.exe 90 PID 368 wrote to memory of 1924 368 bouah.exe 90 PID 368 wrote to memory of 1924 368 bouah.exe 90 PID 368 wrote to memory of 1924 368 bouah.exe 90 PID 368 wrote to memory of 1924 368 bouah.exe 90 PID 368 wrote to memory of 1924 368 bouah.exe 90 PID 368 wrote to memory of 1924 368 bouah.exe 90 PID 368 wrote to memory of 1924 368 bouah.exe 90 PID 368 wrote to memory of 1924 368 bouah.exe 90 PID 368 wrote to memory of 1924 368 bouah.exe 90 PID 368 wrote to memory of 1924 368 bouah.exe 90 PID 368 wrote to memory of 1924 368 bouah.exe 90 PID 368 wrote to memory of 1924 368 bouah.exe 90 PID 368 wrote to memory of 1924 368 bouah.exe 90 PID 368 wrote to memory of 1924 368 bouah.exe 90 PID 368 wrote to memory of 1924 368 bouah.exe 90 PID 368 wrote to memory of 1924 368 bouah.exe 90 PID 368 wrote to memory of 1924 368 bouah.exe 90 PID 368 wrote to memory of 1924 368 bouah.exe 90 PID 368 wrote to memory of 1924 368 bouah.exe 90 PID 368 wrote to memory of 1924 368 bouah.exe 90 PID 368 wrote to memory of 1924 368 bouah.exe 90 PID 368 wrote to memory of 1924 368 bouah.exe 90 PID 368 wrote to memory of 1924 368 bouah.exe 90 PID 368 wrote to memory of 1924 368 bouah.exe 90 PID 368 wrote to memory of 1924 368 bouah.exe 90 PID 368 wrote to memory of 1924 368 bouah.exe 90 PID 368 wrote to memory of 1924 368 bouah.exe 90 PID 368 wrote to memory of 1924 368 bouah.exe 90 PID 368 wrote to memory of 1924 368 bouah.exe 90 PID 368 wrote to memory of 1924 368 bouah.exe 90 PID 368 wrote to memory of 1924 368 bouah.exe 90 PID 368 wrote to memory of 1924 368 bouah.exe 90 PID 368 wrote to memory of 1924 368 bouah.exe 90 PID 368 wrote to memory of 1924 368 bouah.exe 90 PID 368 wrote to memory of 1924 368 bouah.exe 90 PID 368 wrote to memory of 1924 368 bouah.exe 90 PID 368 wrote to memory of 1924 368 bouah.exe 90 PID 368 wrote to memory of 1924 368 bouah.exe 90 PID 368 wrote to memory of 1924 368 bouah.exe 90 PID 368 wrote to memory of 1924 368 bouah.exe 90 PID 368 wrote to memory of 1924 368 bouah.exe 90 PID 368 wrote to memory of 1924 368 bouah.exe 90 PID 368 wrote to memory of 1924 368 bouah.exe 90 PID 368 wrote to memory of 1924 368 bouah.exe 90 PID 368 wrote to memory of 1924 368 bouah.exe 90 PID 368 wrote to memory of 1924 368 bouah.exe 90 PID 368 wrote to memory of 1924 368 bouah.exe 90 PID 368 wrote to memory of 1924 368 bouah.exe 90 PID 368 wrote to memory of 1924 368 bouah.exe 90 PID 368 wrote to memory of 1924 368 bouah.exe 90 PID 368 wrote to memory of 1924 368 bouah.exe 90 PID 368 wrote to memory of 1924 368 bouah.exe 90 PID 368 wrote to memory of 1924 368 bouah.exe 90 PID 368 wrote to memory of 1924 368 bouah.exe 90 PID 368 wrote to memory of 1924 368 bouah.exe 90 PID 368 wrote to memory of 1924 368 bouah.exe 90 PID 368 wrote to memory of 1924 368 bouah.exe 90 PID 368 wrote to memory of 1924 368 bouah.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\afc1893b9042c864756b5ea613d89420_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\afc1893b9042c864756b5ea613d89420_NeikiAnalytics.exe"1⤵
- Checks computer location settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1924 -
C:\Users\Admin\bouah.exe"C:\Users\Admin\bouah.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:368
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --field-trial-handle=3440,i,11266875042087428226,16669718873272757238,262144 --variations-seed-version --mojo-platform-channel-handle=4088 /prefetch:81⤵PID:1164
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
196KB
MD531dd174fed469eda4a828e36440f7b1a
SHA13e1484c79fcc4658d555825ecb67ca3cf77b49e4
SHA25635c70f21a507ff27a9952626964e873c87b193804e319b0dc9d09a9d5af9aea9
SHA512deb1fd59e66c1a784f4404d17850ef48bd3344d59be47da298c01af9c65486b31ddbecd130d01f546c1434214e9e1b2cbc971ea20f44a976d167e0d9eb04e275