Analysis
-
max time kernel
136s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
14/05/2024, 13:11
Static task
static1
Behavioral task
behavioral1
Sample
c7ff284cfcb0ec2229cf445aa5fb9a30_NeikiAnalytics.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
c7ff284cfcb0ec2229cf445aa5fb9a30_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
c7ff284cfcb0ec2229cf445aa5fb9a30_NeikiAnalytics.exe
-
Size
16KB
-
MD5
c7ff284cfcb0ec2229cf445aa5fb9a30
-
SHA1
6d4c3ed58bccae18d55f7030cfd248b8b3391f88
-
SHA256
465d99cbae5197781e1d94c5904b28fb2ce968bf37e66c1b8cdad9d420a832d7
-
SHA512
8c00d739d8c551c804101c5408c4daca6026ee7b7c35f80ed8f09549f9d8c7cb3e79b0ee2f10f4c024e49f50cd5036245a130db710156c4422666a091b7d803c
-
SSDEEP
384:3a6Rerhiey118rryeelDFMJ2AG6m2zH0jJM7JdonW:K6RBeyv8rry6G6xQQonW
Malware Config
Signatures
-
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\ErwAd.exe c7ff284cfcb0ec2229cf445aa5fb9a30_NeikiAnalytics.exe File opened for modification C:\Windows\SysWOW64\ErwAd.exe c7ff284cfcb0ec2229cf445aa5fb9a30_NeikiAnalytics.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2004 set thread context of 2244 2004 c7ff284cfcb0ec2229cf445aa5fb9a30_NeikiAnalytics.exe 28 -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{8E3FD5C1-11F3-11EF-9C59-EAAAC4CFEF2E} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421854193" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2244 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2244 iexplore.exe 2244 iexplore.exe 1732 IEXPLORE.EXE 1732 IEXPLORE.EXE 1732 IEXPLORE.EXE 1732 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2004 wrote to memory of 2244 2004 c7ff284cfcb0ec2229cf445aa5fb9a30_NeikiAnalytics.exe 28 PID 2004 wrote to memory of 2244 2004 c7ff284cfcb0ec2229cf445aa5fb9a30_NeikiAnalytics.exe 28 PID 2004 wrote to memory of 2244 2004 c7ff284cfcb0ec2229cf445aa5fb9a30_NeikiAnalytics.exe 28 PID 2004 wrote to memory of 2244 2004 c7ff284cfcb0ec2229cf445aa5fb9a30_NeikiAnalytics.exe 28 PID 2004 wrote to memory of 2244 2004 c7ff284cfcb0ec2229cf445aa5fb9a30_NeikiAnalytics.exe 28 PID 2244 wrote to memory of 1732 2244 iexplore.exe 29 PID 2244 wrote to memory of 1732 2244 iexplore.exe 29 PID 2244 wrote to memory of 1732 2244 iexplore.exe 29 PID 2244 wrote to memory of 1732 2244 iexplore.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\c7ff284cfcb0ec2229cf445aa5fb9a30_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\c7ff284cfcb0ec2229cf445aa5fb9a30_NeikiAnalytics.exe"1⤵
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2004 -
C:\Program Files\Internet Explorer\iexplore.exeC:\Windows\system32\ErwAd.exe2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2244 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2244 CREDAT:275457 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1732
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57dfcd801dd8bc574eef18d0ce0045c96
SHA15c5226ccbf071e10c2625f88663f43564363a490
SHA256831373ea36dc02168bd2f7883fb4638f62584edb208240e9757db144e1f46056
SHA512071dee20e5934bf66ab10debca4ba12a66ddaec6ef6a0debb8d364b8dde9b9bb4da3a2e1860f19555a17b3e11c573fe71e4be8baa53fb0913aad8301eb9289cb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ad8b2309066f9558fe3169eda37a0861
SHA1a1c9721bab1a6e4e6fdeb07b622de79b494c4055
SHA256bab7518792651873b9f607f2118aba640d3316e18fdfe61a66aa1f98a84b3f52
SHA512fc453b7dd7beaec0537be97731d64bc519722dd7d3cb35290a1b334068dcb85bc3ddafeb8c442c1c10f9634bbdfb4918a5c467b80ce8913e4dea6035e1dd7cd1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD566a77001c8510c593a6cfdbb9a664368
SHA1a8d0c8a7cc21f070a18bc222c0b7c522d0472478
SHA256d4904b15c49934bd1c1e6588588486b8970f85637cbf6bba230d5576910a48df
SHA51200ea4a4076dd023780f18c6282f21adcb09159bd1a2f9dc3c5300d81faa9acb60e46aa72de285557e8da63ac7a9de98c5dba391a388ebaf3fdeefd608570d1ab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55660fbc885166825722159c4b12b30e6
SHA12d7c5ab02930f6326c3f1ed0649aec3bec7f22aa
SHA256205c4b256cb4a8a7d9f4e03843f262f6f54ddadf30ca976e9b97bbf07150baf4
SHA51246a4d9758bb6c07aeb7b7f90fdf78b7e966ecbb51650a10d6722d7e9a4b7f270c092dce92c3587a7cfa09fc980d1035e1e94780149eb006ce3c314f19b4f2b2c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51acd28343dc58960522357ccb1f23738
SHA1d54de2d2051cd3a221fc093c35d02e707f24d029
SHA25616cbcab8f8929e6de73d683c6481b9d90cab17295aa78f1144c3ded2b73b7c84
SHA512bdaa571387d34f2aeb367c89306371f5b15a07ceac8c198fd34b90407f89401910c2f4ded2a1235b2bd9c8fe65029764cf4f3d9a025675f26ffdade5e921a9e4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d1b8732adf94535de53c290ab380ccc2
SHA12e3ba6f88a4ed69656a3ae83e5bd1497b1a347f5
SHA25601c5cce199596ba85d610c3309f20da8f47a2464d9be8f4ee5f19b0a47d3a3ca
SHA5129a3e029dba725fe461ffae65581e187a596a66688426d879717486184e98aa0f5951c4372d3a29d9c6fbad1914f6fc809a1699eee3bfb61c369e9bbc6ebd663a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD585e71d6c5d3f07f8469214ae20ea2af7
SHA13d5cf597e3f3931e7c06ab1b7bf87c50a1f0bf2d
SHA256edc8cab2119fb4cee10ca81117ad136a7569ff16d58e0bff5bd7536ae8f58930
SHA512ab73fc6a14c141a0fb2d77df2916593508ae48ed06793f76eb08d5f8568fe155694f3a50a17fe0b3e2d779be0cc80aea7a607795f9598cbaf592b05f607b9343
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fe8b0cb8559a6c4532d1858b9218cff4
SHA1f2e8c7c87241da45b4277f5a089850418743ffc3
SHA25673be98e52e95ad2059e422424c944f032d624741245cacf968d13a0f0871f153
SHA5125918d290308d1bab1f0a33497fe9d670c6da74dbe7dadb3390cb432496eb4de6be2c8ce61c912ed46ed43cebb73c451182fc7b243780995c14d07673db74aec6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53efb98c1eecec455b7fb8aa2bd94ad51
SHA1927c0dfc64874a9816f6135730b98f4bd0f6d592
SHA25658e358e4afd250fe9c75a9f7a3f0fd2d3da3d5000f4b7deb49705c7ce5d7af5b
SHA512fb2bb314d26eee6e262fc188f32e4abf13cf808ff19b44dc2bfece4813dc4c6ad3395bd1e54758db732347d7e70c52934b8f5fe03e8da0ef1d5a513b8c264a9a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b3327c941a1cb7036a09bc13f3ee6ce1
SHA102e9740f241a17b328f4d415d8a05e991d827ca8
SHA256f7d620ba90df6dbd603914a14e79bf5239f2a981f2ed3677f55b8de206277278
SHA512106b951f719ed085d4670fe8edf725e41825ebf5ead2c362ddb08b6e76a1eb1805875d41e0a29cf16f7b5f10fce2d354c875604b58e8b50c0ed708e9beab6b5f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bd81ae74b5fb22f63dc582bf964e39e7
SHA11e4a63defd685b2ca8747037e0b26ac459766bb5
SHA25660a257e78d2f8929db454f071e9a216f9504b271a26dbafec40c85371146a990
SHA512bfc1d37b406d184e8de5bec080d7d4c0412afb4cff9cd3be041f2af7b1dcda4c9f9f12332698d93129e525203358c34e8cdb45560b3a80b3fe551dc751f6bbfc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e37b2a6610993de63b3b07ec80941a95
SHA1c93e1f633b0a81f1bdc61980f32068ec7e0ec394
SHA256661e39de744676220151904fcf0f8b192c5650083032b871f2eadf958835a30d
SHA512fe636ced1b698dd2e0a75cdd2d953b3027b7394a3722848960d4ac9b57009eb354a38199a3adb1420975828401f288271a46a73682c72d34b4f790235415239b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5319ef3c248a0868018b430730f35a63e
SHA1946b270e278d150faf7b90e834a9a02a623f0730
SHA25648c8f6ab9c28f870fab248483d6d9aef52decbbec8cd1c5532aaed3b55653710
SHA512f3588ad406d4e9c5e31bda691378d4bff4af278b2369fab594c5d432949e9c042c9cd07921ebd4f0b7169620489a684b17d62fa40586d5fd5618272c6614c915
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fa475b9079ab262892f582db08cc2eaf
SHA131bb2f4464bf86a9c670ad6dda6723e34cb94525
SHA256d3cf28d134d41ce58a5ffc460390b70464dd400ed40d8414610faa519b4034bb
SHA512b26b03c2c5c38a98d666d3cf6864b0fffed6d6b3bd987cf7adc0702ee6891192aa70aaec8340f15b646b20c491844b44af95bd246ac8e86756805dadb7babe1f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53d2b779078d84551df0f7d7375c90064
SHA15bf37a8e079f78b8825a7b52b354bc840dd7ed93
SHA256c54edab2a971636de7b7eea28efb3e1c671ddede82a739cab4c928852696c6d6
SHA5121f0b6136a508f3914c0c56fec30e678029c8b9a07e10c5a1528b74a55047629829c444c33e537c3c5372edca759ddc2a25d3108cc3ac365a0b3aabbff02d1bfa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5143e2f1f4afe607089363839e4a9befc
SHA152e4ec5b33580bd39f1a1c92729ec3a3925229a5
SHA256ace2990384cb4acfa4caded801437a336af5b02786ba9b5a548e2a026e889df6
SHA5121a814d329a478ac8ef723884c4a462b25d9e89d5045419cab4956d8bb243ea6c72f854b309d15282ca060cdb0107decac3758a783e71fdb460001b81a60e2e3b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ae1faf8206a12fa6d94470e6293f57bd
SHA1e97ad8ad37655a2abd50cee0304e25fbff37cce8
SHA256b57ac1140a92cf0f75cab1634dd92bffa4c8d8bbdca44f3eda8cc7370318c883
SHA512b1f22c88133e0e24627c0273aa6a5e6fb8ef04ac73f7dead2fe708c4964766d7a253c5337e5a0c7602f0a71cac38040a92820f9a2bebe42535ad02958251f9dc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f7d11d3097a63090c3ea2a8b8017b9c0
SHA1130c2cfdf3f01b9387750b4e0e8753c983ec5004
SHA2563901791c92bafe0d36f3fd5eb47f6952f77bf4eeeffff819ec1fdd9f40ae8284
SHA512770eeab0286b371a402eb3ade291caca4b0758f51a4b70ee49fccf9a8815f2b03745898bb63ecb290f43ed20aad38c457cb5b93f6d237dddcf9ff058d5590e1c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54cd29af73251a46bfc9a608c0fc84ab5
SHA1fbff90a109c5af49547662325ccf6fb5b8d9f20c
SHA256eb52a3d657be5016a9d3357a36fe34e38da37acecc495442f4d3e6f4578897e0
SHA5122372086e06d964df882d69bf83a5c60de9b430de6756c035df89bf8e10282380c0846511c0a68dc03f591cecc2f031b333d99ea4251547f070d336ffa2235530
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ce330e5a113c97b429f7310213ff6c05
SHA1f50fc85eaca3ba0e3f94fe16ad4880b39b544e67
SHA256b5ada7969c39b92eaa54502eb54f666466d61376173f838b257b79c884527677
SHA51256301fb61e7a627a9c8f84348eebb1aba444169d248f85519c8cc9f45097939f76c0deaa452bebc919502c71ada591002833333007ae843f9469bdeaf826716d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD580f27eb8e955c01af7ec5693c51836b7
SHA141e8d863f541183d1daf7e4fc48928091f4808f2
SHA256b589163cdeea302e9bacdfbd19e2279e20800575b41bcd00770230e1c32c89a3
SHA512e6f1243076c7a7fa4532228a1e6fd144e5b8d9879321aa8ec667b0171e24adeeee3369daf0a940e15986e4eeb632d092ebbffe506ea22201268a896edccf9bfc
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a