Analysis
-
max time kernel
149s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
14-05-2024 10:38
Static task
static1
Behavioral task
behavioral1
Sample
c333df1ba9325d463f93523ef5039770_NeikiAnalytics.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
c333df1ba9325d463f93523ef5039770_NeikiAnalytics.exe
Resource
win10v2004-20240226-en
General
-
Target
c333df1ba9325d463f93523ef5039770_NeikiAnalytics.exe
-
Size
28KB
-
MD5
c333df1ba9325d463f93523ef5039770
-
SHA1
8b5bdff317de1351b172440776ca7d2025e52dd0
-
SHA256
74884609aab640b008d9def532ac38017bbfe1798546c711149a599ae45f1a2a
-
SHA512
f60891e40fa7af2d8158c437a41ba8eabbbbfb3700a26c9dd22554e5cc07e088b3e1e548f10f41e9e2530b89ea94d3528e4408bf88d12088e4eca6ae24f973bd
-
SSDEEP
768:PVEHJqjHyGvwFylDpulVSQJrE/2QmlCYZUTnO7Dw:PH2nylslwHCCL1
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2720 rundll32.exe -
Loads dropped DLL 2 IoCs
pid Process 2128 c333df1ba9325d463f93523ef5039770_NeikiAnalytics.exe 2128 c333df1ba9325d463f93523ef5039770_NeikiAnalytics.exe -
Modifies system executable filetype association 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "¢« \"%1\" %*" c333df1ba9325d463f93523ef5039770_NeikiAnalytics.exe Key created \REGISTRY\MACHINE\Software\Classes\exefile\shell\open\command rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "¢« \"%1\" %*" rundll32.exe Key created \REGISTRY\MACHINE\Software\Classes\exefile\shell\open\command c333df1ba9325d463f93523ef5039770_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"%1\" %*" c333df1ba9325d463f93523ef5039770_NeikiAnalytics.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\¢«.exe c333df1ba9325d463f93523ef5039770_NeikiAnalytics.exe File created C:\Windows\SysWOW64\¢«.exe c333df1ba9325d463f93523ef5039770_NeikiAnalytics.exe File opened for modification C:\Windows\SysWOW64\notepad¢¬.exe c333df1ba9325d463f93523ef5039770_NeikiAnalytics.exe File created C:\Windows\SysWOW64\notepad¢¬.exe c333df1ba9325d463f93523ef5039770_NeikiAnalytics.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\system\rundll32.exe c333df1ba9325d463f93523ef5039770_NeikiAnalytics.exe File created C:\Windows\system\rundll32.exe c333df1ba9325d463f93523ef5039770_NeikiAnalytics.exe -
Modifies registry class 15 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Classes\exefile\shell\open\command c333df1ba9325d463f93523ef5039770_NeikiAnalytics.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\MSipv\MainUp = "1715683092" rundll32.exe Key created \REGISTRY\MACHINE\Software\Classes\exefile\shell\open\command rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "notepad¢¬ %1" rundll32.exe Key created \REGISTRY\MACHINE\Software\Classes\MSipv c333df1ba9325d463f93523ef5039770_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "¢« \"%1\" %*" c333df1ba9325d463f93523ef5039770_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "notepad¢¬ %1" c333df1ba9325d463f93523ef5039770_NeikiAnalytics.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\MSipv\MainVer = "506" rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "¢« \"%1\" %*" rundll32.exe Key created \REGISTRY\MACHINE\Software\Classes\txtfile\shell\open\command c333df1ba9325d463f93523ef5039770_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "notepad.exe %1" c333df1ba9325d463f93523ef5039770_NeikiAnalytics.exe Key created \REGISTRY\MACHINE\Software\Classes\MSipv rundll32.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\MSipv\MainSetup = "1715683092" rundll32.exe Key created \REGISTRY\MACHINE\Software\Classes\txtfile\shell\open\command rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"%1\" %*" c333df1ba9325d463f93523ef5039770_NeikiAnalytics.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 2128 c333df1ba9325d463f93523ef5039770_NeikiAnalytics.exe 2128 c333df1ba9325d463f93523ef5039770_NeikiAnalytics.exe 2128 c333df1ba9325d463f93523ef5039770_NeikiAnalytics.exe 2128 c333df1ba9325d463f93523ef5039770_NeikiAnalytics.exe 2128 c333df1ba9325d463f93523ef5039770_NeikiAnalytics.exe 2128 c333df1ba9325d463f93523ef5039770_NeikiAnalytics.exe 2128 c333df1ba9325d463f93523ef5039770_NeikiAnalytics.exe 2128 c333df1ba9325d463f93523ef5039770_NeikiAnalytics.exe 2128 c333df1ba9325d463f93523ef5039770_NeikiAnalytics.exe 2128 c333df1ba9325d463f93523ef5039770_NeikiAnalytics.exe 2128 c333df1ba9325d463f93523ef5039770_NeikiAnalytics.exe 2128 c333df1ba9325d463f93523ef5039770_NeikiAnalytics.exe 2128 c333df1ba9325d463f93523ef5039770_NeikiAnalytics.exe 2128 c333df1ba9325d463f93523ef5039770_NeikiAnalytics.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2720 rundll32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2128 c333df1ba9325d463f93523ef5039770_NeikiAnalytics.exe 2720 rundll32.exe 2720 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2128 wrote to memory of 2720 2128 c333df1ba9325d463f93523ef5039770_NeikiAnalytics.exe 28 PID 2128 wrote to memory of 2720 2128 c333df1ba9325d463f93523ef5039770_NeikiAnalytics.exe 28 PID 2128 wrote to memory of 2720 2128 c333df1ba9325d463f93523ef5039770_NeikiAnalytics.exe 28 PID 2128 wrote to memory of 2720 2128 c333df1ba9325d463f93523ef5039770_NeikiAnalytics.exe 28 PID 2128 wrote to memory of 2720 2128 c333df1ba9325d463f93523ef5039770_NeikiAnalytics.exe 28 PID 2128 wrote to memory of 2720 2128 c333df1ba9325d463f93523ef5039770_NeikiAnalytics.exe 28 PID 2128 wrote to memory of 2720 2128 c333df1ba9325d463f93523ef5039770_NeikiAnalytics.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\c333df1ba9325d463f93523ef5039770_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\c333df1ba9325d463f93523ef5039770_NeikiAnalytics.exe"1⤵
- Loads dropped DLL
- Modifies system executable filetype association
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2128 -
C:\Windows\system\rundll32.exeC:\Windows\system\rundll32.exe2⤵
- Executes dropped EXE
- Modifies system executable filetype association
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2720
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
28KB
MD57dc6c69cdeabd79aed85ee7e1edfc72d
SHA1cc3a4dbe97d971e2dd98952f461a45a978279c1d
SHA25691b0b394025c93c513853c91731cbee846b15279bf2a261cca3fd2b77dfd47ee
SHA512c259a77db152d44ab8d3ae1a0f4939968cca4eec186a4bac44d7bf602fc2ea5226cc605910c20aea633c6ef5d7dbf80ef4ee7ce732d83fcdbc4065fe9e9b379c
-
Filesize
30KB
MD512746c7f175d36190e26313680b1613d
SHA1f9557b027d3dcf0eea6f9ec2147f82035373f10c
SHA2566de48848e663fc7917819dd4d788ed619e516bd9ad05f395f236239147f4f503
SHA5129b7028af68d623e1c18d12cfd4c1e6f5d57c2b4705f7eff0577c318ad9e6fda29628840ae84d6d1148e2a970b98bb88d057475e6b51143ab15f753a09ff9138d