Analysis
-
max time kernel
145s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
15/05/2024, 15:35
Static task
static1
Behavioral task
behavioral1
Sample
d8c6692c85ae72dc6a80dc0a1f92a6a0_NeikiAnalytics.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
d8c6692c85ae72dc6a80dc0a1f92a6a0_NeikiAnalytics.html
Resource
win10v2004-20240426-en
General
-
Target
d8c6692c85ae72dc6a80dc0a1f92a6a0_NeikiAnalytics.html
-
Size
146KB
-
MD5
d8c6692c85ae72dc6a80dc0a1f92a6a0
-
SHA1
0ecdc7d957aaf40385bbbc557e94c656fc0df087
-
SHA256
29ff6e7ccc30581d62eb9904d8d34fe6ed1f77d2e1829b03ab0e80bdd7e68843
-
SHA512
db5f363d8292b619494408dc3aa57e0aa380dd401d07b9a92197643f4540a2c91ff4d33b9fb304ee64b59f9c4329af135d1411aff54fb3e5ef1b7ef6567d3a08
-
SSDEEP
3072:Lp1D4+UE97v6J9XOHriwMm4rFp55KWlHdLbLozK:rr7iTXX5
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3800 msedge.exe 3800 msedge.exe 3884 msedge.exe 3884 msedge.exe 1840 identity_helper.exe 1840 identity_helper.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 3884 msedge.exe 3884 msedge.exe 3884 msedge.exe 3884 msedge.exe 3884 msedge.exe 3884 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3884 msedge.exe 3884 msedge.exe 3884 msedge.exe 3884 msedge.exe 3884 msedge.exe 3884 msedge.exe 3884 msedge.exe 3884 msedge.exe 3884 msedge.exe 3884 msedge.exe 3884 msedge.exe 3884 msedge.exe 3884 msedge.exe 3884 msedge.exe 3884 msedge.exe 3884 msedge.exe 3884 msedge.exe 3884 msedge.exe 3884 msedge.exe 3884 msedge.exe 3884 msedge.exe 3884 msedge.exe 3884 msedge.exe 3884 msedge.exe 3884 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3884 msedge.exe 3884 msedge.exe 3884 msedge.exe 3884 msedge.exe 3884 msedge.exe 3884 msedge.exe 3884 msedge.exe 3884 msedge.exe 3884 msedge.exe 3884 msedge.exe 3884 msedge.exe 3884 msedge.exe 3884 msedge.exe 3884 msedge.exe 3884 msedge.exe 3884 msedge.exe 3884 msedge.exe 3884 msedge.exe 3884 msedge.exe 3884 msedge.exe 3884 msedge.exe 3884 msedge.exe 3884 msedge.exe 3884 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3884 wrote to memory of 3212 3884 msedge.exe 83 PID 3884 wrote to memory of 3212 3884 msedge.exe 83 PID 3884 wrote to memory of 1756 3884 msedge.exe 84 PID 3884 wrote to memory of 1756 3884 msedge.exe 84 PID 3884 wrote to memory of 1756 3884 msedge.exe 84 PID 3884 wrote to memory of 1756 3884 msedge.exe 84 PID 3884 wrote to memory of 1756 3884 msedge.exe 84 PID 3884 wrote to memory of 1756 3884 msedge.exe 84 PID 3884 wrote to memory of 1756 3884 msedge.exe 84 PID 3884 wrote to memory of 1756 3884 msedge.exe 84 PID 3884 wrote to memory of 1756 3884 msedge.exe 84 PID 3884 wrote to memory of 1756 3884 msedge.exe 84 PID 3884 wrote to memory of 1756 3884 msedge.exe 84 PID 3884 wrote to memory of 1756 3884 msedge.exe 84 PID 3884 wrote to memory of 1756 3884 msedge.exe 84 PID 3884 wrote to memory of 1756 3884 msedge.exe 84 PID 3884 wrote to memory of 1756 3884 msedge.exe 84 PID 3884 wrote to memory of 1756 3884 msedge.exe 84 PID 3884 wrote to memory of 1756 3884 msedge.exe 84 PID 3884 wrote to memory of 1756 3884 msedge.exe 84 PID 3884 wrote to memory of 1756 3884 msedge.exe 84 PID 3884 wrote to memory of 1756 3884 msedge.exe 84 PID 3884 wrote to memory of 1756 3884 msedge.exe 84 PID 3884 wrote to memory of 1756 3884 msedge.exe 84 PID 3884 wrote to memory of 1756 3884 msedge.exe 84 PID 3884 wrote to memory of 1756 3884 msedge.exe 84 PID 3884 wrote to memory of 1756 3884 msedge.exe 84 PID 3884 wrote to memory of 1756 3884 msedge.exe 84 PID 3884 wrote to memory of 1756 3884 msedge.exe 84 PID 3884 wrote to memory of 1756 3884 msedge.exe 84 PID 3884 wrote to memory of 1756 3884 msedge.exe 84 PID 3884 wrote to memory of 1756 3884 msedge.exe 84 PID 3884 wrote to memory of 1756 3884 msedge.exe 84 PID 3884 wrote to memory of 1756 3884 msedge.exe 84 PID 3884 wrote to memory of 1756 3884 msedge.exe 84 PID 3884 wrote to memory of 1756 3884 msedge.exe 84 PID 3884 wrote to memory of 1756 3884 msedge.exe 84 PID 3884 wrote to memory of 1756 3884 msedge.exe 84 PID 3884 wrote to memory of 1756 3884 msedge.exe 84 PID 3884 wrote to memory of 1756 3884 msedge.exe 84 PID 3884 wrote to memory of 1756 3884 msedge.exe 84 PID 3884 wrote to memory of 1756 3884 msedge.exe 84 PID 3884 wrote to memory of 3800 3884 msedge.exe 85 PID 3884 wrote to memory of 3800 3884 msedge.exe 85 PID 3884 wrote to memory of 1896 3884 msedge.exe 86 PID 3884 wrote to memory of 1896 3884 msedge.exe 86 PID 3884 wrote to memory of 1896 3884 msedge.exe 86 PID 3884 wrote to memory of 1896 3884 msedge.exe 86 PID 3884 wrote to memory of 1896 3884 msedge.exe 86 PID 3884 wrote to memory of 1896 3884 msedge.exe 86 PID 3884 wrote to memory of 1896 3884 msedge.exe 86 PID 3884 wrote to memory of 1896 3884 msedge.exe 86 PID 3884 wrote to memory of 1896 3884 msedge.exe 86 PID 3884 wrote to memory of 1896 3884 msedge.exe 86 PID 3884 wrote to memory of 1896 3884 msedge.exe 86 PID 3884 wrote to memory of 1896 3884 msedge.exe 86 PID 3884 wrote to memory of 1896 3884 msedge.exe 86 PID 3884 wrote to memory of 1896 3884 msedge.exe 86 PID 3884 wrote to memory of 1896 3884 msedge.exe 86 PID 3884 wrote to memory of 1896 3884 msedge.exe 86 PID 3884 wrote to memory of 1896 3884 msedge.exe 86 PID 3884 wrote to memory of 1896 3884 msedge.exe 86 PID 3884 wrote to memory of 1896 3884 msedge.exe 86 PID 3884 wrote to memory of 1896 3884 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\d8c6692c85ae72dc6a80dc0a1f92a6a0_NeikiAnalytics.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3884 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0x74,0x108,0x7ff8d05046f8,0x7ff8d0504708,0x7ff8d05047182⤵PID:3212
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2108,13202777119856070515,14668658510821459148,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2124 /prefetch:22⤵PID:1756
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2108,13202777119856070515,14668658510821459148,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2184 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3800
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2108,13202777119856070515,14668658510821459148,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2904 /prefetch:82⤵PID:1896
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,13202777119856070515,14668658510821459148,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3300 /prefetch:12⤵PID:4220
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,13202777119856070515,14668658510821459148,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3308 /prefetch:12⤵PID:1276
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2108,13202777119856070515,14668658510821459148,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5108 /prefetch:82⤵PID:4716
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2108,13202777119856070515,14668658510821459148,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5108 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1840
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,13202777119856070515,14668658510821459148,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5268 /prefetch:12⤵PID:5080
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,13202777119856070515,14668658510821459148,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5232 /prefetch:12⤵PID:3808
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,13202777119856070515,14668658510821459148,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5248 /prefetch:12⤵PID:4492
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,13202777119856070515,14668658510821459148,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3416 /prefetch:12⤵PID:5092
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2108,13202777119856070515,14668658510821459148,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4804 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4860
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2408
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3564
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5537815e7cc5c694912ac0308147852e4
SHA12ccdd9d9dc637db5462fe8119c0df261146c363c
SHA256b4b69d099507d88abdeff4835e06cc6711e1c47464c963d013cef0a278e52d4f
SHA51263969a69af057235dbdecddc483ef5ce0058673179a3580c5aa12938c9501513cdb72dd703a06fa7d4fc08d074f17528283338c795334398497c771ecbd1350a
-
Filesize
152B
MD58b167567021ccb1a9fdf073fa9112ef0
SHA13baf293fbfaa7c1e7cdacb5f2975737f4ef69898
SHA25626764cedf35f118b55f30b3a36e0693f9f38290a5b2b6b8b83a00e990ae18513
SHA512726098001ef1acf1dd154a658752fa27dea32bca8fbb66395c142cb666102e71632adbad1b7e2f717071cd3e3af3867471932a71707f2ae97b989f4be468ab54
-
Filesize
1KB
MD53390a01e4fd7568d0f02764a0996c0e4
SHA1772eb4a6daa525af485460cd6e9a87c7cbd74523
SHA2568ed5eecf13ccd5609751b486b0382df57e7b99560b837f7d2c2b8640cc8ca2d9
SHA512868aba940a9a712f3691d912f38e55d75cf31af3cedf5422ffd20fb5000cf483b3d47d911c52fdea3ef3e4366373905e230db5dbc2123bf2ec547b9310437c54
-
Filesize
5KB
MD5ded06525e8cfc7c81c5be2d26e630278
SHA109f931c9a8f654504c80e66fa0429e5bc389b19a
SHA256f1feb749173f8abe0dbae7a316c5652ac79825965adc51723b8fff50329c5eb2
SHA512b46617c812b6412c45ae7b175a1cf9ee73350edab2f8db40658db2f176c7b3da2a9f97a6deb244426c2e2094251f8f66b9b5984a9ddab14723fdd69c811c2455
-
Filesize
6KB
MD513281d56c357ac2ddd0e5a77adb07c67
SHA16a97d8e11550c221ff6a7b83780474c52745649e
SHA256ba88c1018d2d0d1d6629e90e03c1e4bd1aaeb24cbf5a8936709e918cad4b4612
SHA51245269e658b145085c7452f0db7811963ff701be3aa1a9736c33d8a3e58f957b022ee060e7dfb7c28d98ac6c35c9d25cb1bfdbcce2cf2361cb8e58c20725d173b
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD56a01be8e8ce18d5bb789a2f2b52790f8
SHA12544a202faf9a6bfe1d6ef4054ff2d57a425cdc0
SHA2561452004d8d9f02c0fd9f9e10075369eac315a34b61c818b261e86c267a39f0f8
SHA512c899348cee5d2bfa7be01f9c88d0cbecf3977894bba84776e9343bdb31c5afd68f0cbb7a5cc84f98e39a36eb520cf82f26d9e020c68438979ce30fa73e89ea4d