Analysis
-
max time kernel
134s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
13-05-2024 12:04
Behavioral task
behavioral1
Sample
b6a0b3f7579ac82d6b37187153d400f0_NeikiAnalytics.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
b6a0b3f7579ac82d6b37187153d400f0_NeikiAnalytics.exe
Resource
win10v2004-20240426-en
General
-
Target
b6a0b3f7579ac82d6b37187153d400f0_NeikiAnalytics.exe
-
Size
443KB
-
MD5
b6a0b3f7579ac82d6b37187153d400f0
-
SHA1
03cf5a8f14e8da1f989c9fcf47b226e4469cb523
-
SHA256
083ef4b502ce5e9cdd132aab71a695b05f6ecff80ec6e71ea5f03d80ee611d76
-
SHA512
f6f1fdcc81f4ef60158563ac207884ea811ecd00b7a5c360b1b3855784666c43e800c123c364013bcbfbf46834b5df2d8822af5f1790d854d23aec33b147aa2c
-
SSDEEP
12288:nsaY8rGHFalzNl0kz/faGwDrjmcF741hmohdTyeTq1:B/rGH8zbZ7DErjnFc9hFTc
Malware Config
Signatures
-
Generic Chinese Botnet
A botnet originating from China which is currently unnamed publicly.
-
Chinese Botnet payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/3920-23-0x0000000010000000-0x0000000010018000-memory.dmp unk_chinese_botnet -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
b6a0b3f7579ac82d6b37187153d400f0_NeikiAnalytics.exedescription ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\Control Panel\International\Geo\Nation b6a0b3f7579ac82d6b37187153d400f0_NeikiAnalytics.exe -
Executes dropped EXE 2 IoCs
Processes:
ÕÒ»ØÃÜÂë.exeIntelCpHDCPSvc.exepid Process 4364 ÕÒ»ØÃÜÂë.exe 3920 IntelCpHDCPSvc.exe -
Processes:
resource yara_rule behavioral2/memory/116-0-0x0000000000400000-0x000000000041C000-memory.dmp upx behavioral2/memory/116-20-0x0000000000400000-0x000000000041C000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
IntelCpHDCPSvc.exedescription ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Wcdsekp.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\Temp\\IntelCpHDCPSvc.exe" IntelCpHDCPSvc.exe -
Enumerates connected drives 3 TTPs 22 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
IntelCpHDCPSvc.exedescription ioc Process File opened (read-only) \??\U: IntelCpHDCPSvc.exe File opened (read-only) \??\Y: IntelCpHDCPSvc.exe File opened (read-only) \??\B: IntelCpHDCPSvc.exe File opened (read-only) \??\E: IntelCpHDCPSvc.exe File opened (read-only) \??\H: IntelCpHDCPSvc.exe File opened (read-only) \??\K: IntelCpHDCPSvc.exe File opened (read-only) \??\P: IntelCpHDCPSvc.exe File opened (read-only) \??\M: IntelCpHDCPSvc.exe File opened (read-only) \??\T: IntelCpHDCPSvc.exe File opened (read-only) \??\W: IntelCpHDCPSvc.exe File opened (read-only) \??\X: IntelCpHDCPSvc.exe File opened (read-only) \??\Z: IntelCpHDCPSvc.exe File opened (read-only) \??\G: IntelCpHDCPSvc.exe File opened (read-only) \??\I: IntelCpHDCPSvc.exe File opened (read-only) \??\L: IntelCpHDCPSvc.exe File opened (read-only) \??\Q: IntelCpHDCPSvc.exe File opened (read-only) \??\R: IntelCpHDCPSvc.exe File opened (read-only) \??\J: IntelCpHDCPSvc.exe File opened (read-only) \??\N: IntelCpHDCPSvc.exe File opened (read-only) \??\O: IntelCpHDCPSvc.exe File opened (read-only) \??\S: IntelCpHDCPSvc.exe File opened (read-only) \??\V: IntelCpHDCPSvc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
IntelCpHDCPSvc.exedescription ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 IntelCpHDCPSvc.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz IntelCpHDCPSvc.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
IntelCpHDCPSvc.exepid Process 3920 IntelCpHDCPSvc.exe 3920 IntelCpHDCPSvc.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
ÕÒ»ØÃÜÂë.exepid Process 4364 ÕÒ»ØÃÜÂë.exe 4364 ÕÒ»ØÃÜÂë.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
b6a0b3f7579ac82d6b37187153d400f0_NeikiAnalytics.exeIntelCpHDCPSvc.exedescription pid Process procid_target PID 116 wrote to memory of 4364 116 b6a0b3f7579ac82d6b37187153d400f0_NeikiAnalytics.exe 83 PID 116 wrote to memory of 4364 116 b6a0b3f7579ac82d6b37187153d400f0_NeikiAnalytics.exe 83 PID 116 wrote to memory of 4364 116 b6a0b3f7579ac82d6b37187153d400f0_NeikiAnalytics.exe 83 PID 116 wrote to memory of 3920 116 b6a0b3f7579ac82d6b37187153d400f0_NeikiAnalytics.exe 84 PID 116 wrote to memory of 3920 116 b6a0b3f7579ac82d6b37187153d400f0_NeikiAnalytics.exe 84 PID 116 wrote to memory of 3920 116 b6a0b3f7579ac82d6b37187153d400f0_NeikiAnalytics.exe 84 PID 3920 wrote to memory of 5060 3920 IntelCpHDCPSvc.exe 85 PID 3920 wrote to memory of 5060 3920 IntelCpHDCPSvc.exe 85 PID 3920 wrote to memory of 5060 3920 IntelCpHDCPSvc.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\b6a0b3f7579ac82d6b37187153d400f0_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\b6a0b3f7579ac82d6b37187153d400f0_NeikiAnalytics.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:116 -
C:\Users\Admin\AppData\Local\Temp\Temp\ÕÒ»ØÃÜÂë.exe"C:\Users\Admin\AppData\Local\Temp\Temp\ÕÒ»ØÃÜÂë.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4364
-
-
C:\Users\Admin\AppData\Local\Temp\Temp\IntelCpHDCPSvc.exe"C:\Users\Admin\AppData\Local\Temp\Temp\IntelCpHDCPSvc.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Enumerates connected drives
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3920 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c md C:\windowss643⤵PID:5060
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
412KB
MD5669f0cd8a956fe16c90debc6950ff637
SHA1aebfc5daf7081d47ef11027864f85febe662e664
SHA2560a197cd65dd3a1cbe8becfcb6c2feb6fb23c0259866620602f641d9d110e4c5c
SHA512714fec3975174fe0881d8363007afe7e817317f7781e61d4a845591ad99208ed6c05ffd0d5b0a121173afc18329f01639ef9f3db2b9a7a692bf42feb91311f26
-
Filesize
832KB
MD56e3862cefb127a27193ec69ccde5a872
SHA1c71986aa98fcd77ba32e0504d435b64df031a842
SHA2566948e00ad36b02acb5cf8da906d65830f2484def2c1b53ee270fdae933fe67a9
SHA512b8074d6b0762111a38be9d3e32d0017a2bc4701ed82993829d7817563f6eb1e9e3e20b16447ba697f9a95340c05fac8f85b7ca81c5ed5cac6d18d4810b007f9e