Analysis
-
max time kernel
99s -
max time network
103s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
15/05/2024, 09:12
Static task
static1
Behavioral task
behavioral1
Sample
b7df08711da06fc9ad1c594ef23ba9d0_NeikiAnalytics.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
b7df08711da06fc9ad1c594ef23ba9d0_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
b7df08711da06fc9ad1c594ef23ba9d0_NeikiAnalytics.exe
-
Size
479KB
-
MD5
b7df08711da06fc9ad1c594ef23ba9d0
-
SHA1
f541f777d603a1680a207fa6d4118fecc771d55f
-
SHA256
cf7dbdf018e4f3d2507dd6d0028a939c418c0aa4230da1070a0dd324d980b767
-
SHA512
2c48f3dd1ca75ae057e3c1b426ad1c2b1c72cd5153d216b27daebc77d8c4db3374fd3de00b19f3b2cebedb9e2022d9661316d4c8e0092474e87714b526db7ee9
-
SSDEEP
6144:hGTDUppmzyPOwXYrMdlvkGr0f+uPOwXYrMdl2MPnhd8+ZDI:htChwIaJwISfPI
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad b7df08711da06fc9ad1c594ef23ba9d0_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" b7df08711da06fc9ad1c594ef23ba9d0_NeikiAnalytics.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ncldnkae.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ncldnkae.exe -
Executes dropped EXE 2 IoCs
pid Process 3276 Ncldnkae.exe 1812 Nkcmohbg.exe -
Drops file in System32 directory 6 IoCs
description ioc Process File created C:\Windows\SysWOW64\Ncldnkae.exe b7df08711da06fc9ad1c594ef23ba9d0_NeikiAnalytics.exe File opened for modification C:\Windows\SysWOW64\Ncldnkae.exe b7df08711da06fc9ad1c594ef23ba9d0_NeikiAnalytics.exe File created C:\Windows\SysWOW64\Dlddhggk.dll b7df08711da06fc9ad1c594ef23ba9d0_NeikiAnalytics.exe File created C:\Windows\SysWOW64\Nkcmohbg.exe Ncldnkae.exe File opened for modification C:\Windows\SysWOW64\Nkcmohbg.exe Ncldnkae.exe File created C:\Windows\SysWOW64\Hnibdpde.dll Ncldnkae.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 4532 1812 WerFault.exe 83 -
Modifies registry class 9 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 b7df08711da06fc9ad1c594ef23ba9d0_NeikiAnalytics.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node b7df08711da06fc9ad1c594ef23ba9d0_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" b7df08711da06fc9ad1c594ef23ba9d0_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hnibdpde.dll" Ncldnkae.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID b7df08711da06fc9ad1c594ef23ba9d0_NeikiAnalytics.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738} b7df08711da06fc9ad1c594ef23ba9d0_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Dlddhggk.dll" b7df08711da06fc9ad1c594ef23ba9d0_NeikiAnalytics.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ncldnkae.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ncldnkae.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4728 wrote to memory of 3276 4728 b7df08711da06fc9ad1c594ef23ba9d0_NeikiAnalytics.exe 82 PID 4728 wrote to memory of 3276 4728 b7df08711da06fc9ad1c594ef23ba9d0_NeikiAnalytics.exe 82 PID 4728 wrote to memory of 3276 4728 b7df08711da06fc9ad1c594ef23ba9d0_NeikiAnalytics.exe 82 PID 3276 wrote to memory of 1812 3276 Ncldnkae.exe 83 PID 3276 wrote to memory of 1812 3276 Ncldnkae.exe 83 PID 3276 wrote to memory of 1812 3276 Ncldnkae.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\b7df08711da06fc9ad1c594ef23ba9d0_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\b7df08711da06fc9ad1c594ef23ba9d0_NeikiAnalytics.exe"1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4728 -
C:\Windows\SysWOW64\Ncldnkae.exeC:\Windows\system32\Ncldnkae.exe2⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3276 -
C:\Windows\SysWOW64\Nkcmohbg.exeC:\Windows\system32\Nkcmohbg.exe3⤵
- Executes dropped EXE
PID:1812 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1812 -s 4004⤵
- Program crash
PID:4532
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1812 -ip 18121⤵PID:428
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
479KB
MD5bad97e82a59c3f6b24bf1feaeaaeb6b4
SHA1188332efa89138c8e9e595232aa648762fa93c1b
SHA2561d7642d7ea585b48f56a79e8bac282ab3ef8f3c143e60fb4aa3b52c06d555cfa
SHA5129b517dc6b7462c50811cb7b7cdcde96a7709d765973acf6264ae17bcb2075d53ca619295126ba0d79ae27438e9ad032048ff0cccafeebf89a8a7cea87813fc6d
-
Filesize
479KB
MD51a62c3f420e58be4e86ce17efa68404f
SHA18722ad3d80f773050da0d46ac1ecb037e032dd3a
SHA25686449b222f9df27875e182ef57a64607624627eaaabed8784b6d7819b6285700
SHA5125ec4ef430283f172dcf6db3aae965bf7d74fcfeb95a077d80954b4796c782cf50cb24c020e02ced9173c13865b02d955fcbbc9ca604cec8dcdde316fb44598e9