Analysis
-
max time kernel
117s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
13/05/2024, 18:09
Static task
static1
Behavioral task
behavioral1
Sample
c09e705897e4dafbbfc3641b3be97570_NeikiAnalytics.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
c09e705897e4dafbbfc3641b3be97570_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
c09e705897e4dafbbfc3641b3be97570_NeikiAnalytics.exe
-
Size
32KB
-
MD5
c09e705897e4dafbbfc3641b3be97570
-
SHA1
822aca1014c045f92e50ad2ed7565037f8cfba64
-
SHA256
277686dfb9320de079b92488776bdaf66bd208335c41717b152901b98dcc2ef2
-
SHA512
98e91a94369c44403f1900460217cffc0146a3afaa2210410807552559968e73299b8a80b3082321cbb2f22787bda1536d3162e32b26f414997beba120e63cfa
-
SSDEEP
384:Q98xUHQkMxWSuy4Ng8zLeiOer3C5hQ1gophA8yzrW+XpFKI0e+IIK6mxTLvig:TwL/gopNshQ1gcA8yz1XR0e+FK6mFvig
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\SDRSVC = "C:\\Users\\Admin\\AppData\\Local\\SDRSVC.exe" regedit.exe -
Runs .reg file with regedit 1 IoCs
pid Process 2948 regedit.exe -
Suspicious behavior: RenamesItself 2 IoCs
pid Process 2212 c09e705897e4dafbbfc3641b3be97570_NeikiAnalytics.exe 2212 c09e705897e4dafbbfc3641b3be97570_NeikiAnalytics.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2212 wrote to memory of 2948 2212 c09e705897e4dafbbfc3641b3be97570_NeikiAnalytics.exe 28 PID 2212 wrote to memory of 2948 2212 c09e705897e4dafbbfc3641b3be97570_NeikiAnalytics.exe 28 PID 2212 wrote to memory of 2948 2212 c09e705897e4dafbbfc3641b3be97570_NeikiAnalytics.exe 28 PID 2212 wrote to memory of 2948 2212 c09e705897e4dafbbfc3641b3be97570_NeikiAnalytics.exe 28 PID 2212 wrote to memory of 2948 2212 c09e705897e4dafbbfc3641b3be97570_NeikiAnalytics.exe 28 PID 2212 wrote to memory of 2948 2212 c09e705897e4dafbbfc3641b3be97570_NeikiAnalytics.exe 28 PID 2212 wrote to memory of 2948 2212 c09e705897e4dafbbfc3641b3be97570_NeikiAnalytics.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\c09e705897e4dafbbfc3641b3be97570_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\c09e705897e4dafbbfc3641b3be97570_NeikiAnalytics.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:2212 -
C:\Windows\SysWOW64\regedit.exeregedit.exe /s C:\Users\Admin\AppData\Local\Temp\~dfds3.reg2⤵
- Adds Run key to start application
- Runs .reg file with regedit
PID:2948
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
32KB
MD523d850493176f31734b73e34df084984
SHA135be9ba303460280706a0ee26a56d8290c07450f
SHA2564c6465ec0df6774cdb02a296b755516ef5ff731b979c883c6d91ba77eb95a031
SHA5124688b3ca95729380554c4ae15efc19929ac860de806398b608e4e206287f718b0a843c990c091e9eca93555ae270091dcc34f73275bc9a50be11403eef30048b
-
Filesize
164B
MD5931a2512885a04cbb7494dd67cda78f7
SHA158f9409c9354a9f178fa0a83d47095185cef28bc
SHA25699caef9950c6916423e51596913145e26a55e395d1b64918045aa71c273b266e
SHA512bfcbe8179f8b6f3fa72bb71d1218de67e83b2b3cc1ccf788b1bc3d5fea7ad031e2c1622a1e8efb4d954b8d692082007ce95c27a68c98935d3ed4cd9ccc0cf72b