Analysis
-
max time kernel
136s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
15-05-2024 15:23
Static task
static1
Behavioral task
behavioral1
Sample
d86aaa8cc228dbba5201329ddd56ad50_NeikiAnalytics.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
d86aaa8cc228dbba5201329ddd56ad50_NeikiAnalytics.exe
Resource
win10v2004-20240426-en
General
-
Target
d86aaa8cc228dbba5201329ddd56ad50_NeikiAnalytics.exe
-
Size
112KB
-
MD5
d86aaa8cc228dbba5201329ddd56ad50
-
SHA1
933b1158436d1e68287bafc568935f041c3c147d
-
SHA256
ca9aa9c2d0ebef5f2d182faca7527bf93d96ce53d7a0db09a45d46ed65a58e5e
-
SHA512
b26117bd987b982012a26eb2fbff81549dcb0cf60b973ee965dc5b124b024ebf27e7527b2a08cebe0f807c2960c30cf3d9ace2dafba816d7b7327ca7c40b3fb5
-
SSDEEP
1536:t2ovIa47CqIf2f3w41p7sDcX7juR/JSJw8EeNshUDGXJ:tVIr7zI+fAceoGxSKKo5
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
ModiLoader Second Stage 5 IoCs
Processes:
resource yara_rule behavioral2/memory/3220-61-0x0000000000400000-0x0000000000414000-memory.dmp modiloader_stage2 behavioral2/memory/3220-65-0x0000000000400000-0x0000000000414000-memory.dmp modiloader_stage2 behavioral2/memory/3220-63-0x0000000000400000-0x0000000000414000-memory.dmp modiloader_stage2 behavioral2/memory/3220-64-0x0000000000400000-0x0000000000414000-memory.dmp modiloader_stage2 behavioral2/memory/3220-71-0x0000000000400000-0x0000000000414000-memory.dmp modiloader_stage2 -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
d86aaa8cc228dbba5201329ddd56ad50_NeikiAnalytics.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\International\Geo\Nation d86aaa8cc228dbba5201329ddd56ad50_NeikiAnalytics.exe -
Executes dropped EXE 3 IoCs
Processes:
WAMain.exeWAMain.exeWAMain.exepid process 4180 WAMain.exe 4720 WAMain.exe 3220 WAMain.exe -
Processes:
resource yara_rule behavioral2/memory/1232-17-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/memory/1232-21-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/memory/1232-12-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/memory/3220-61-0x0000000000400000-0x0000000000414000-memory.dmp upx behavioral2/memory/3220-65-0x0000000000400000-0x0000000000414000-memory.dmp upx behavioral2/memory/3220-63-0x0000000000400000-0x0000000000414000-memory.dmp upx behavioral2/memory/3220-60-0x0000000000400000-0x0000000000414000-memory.dmp upx behavioral2/memory/3220-64-0x0000000000400000-0x0000000000414000-memory.dmp upx behavioral2/memory/3220-57-0x0000000000400000-0x0000000000414000-memory.dmp upx behavioral2/memory/1232-68-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/memory/3220-71-0x0000000000400000-0x0000000000414000-memory.dmp upx behavioral2/memory/4720-70-0x0000000000400000-0x000000000040B000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
reg.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Windows WA = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\WAMain.exe" reg.exe -
Suspicious use of SetThreadContext 5 IoCs
Processes:
d86aaa8cc228dbba5201329ddd56ad50_NeikiAnalytics.exeWAMain.exedescription pid process target process PID 644 set thread context of 3028 644 d86aaa8cc228dbba5201329ddd56ad50_NeikiAnalytics.exe svchost.exe PID 644 set thread context of 1232 644 d86aaa8cc228dbba5201329ddd56ad50_NeikiAnalytics.exe d86aaa8cc228dbba5201329ddd56ad50_NeikiAnalytics.exe PID 4180 set thread context of 4940 4180 WAMain.exe svchost.exe PID 4180 set thread context of 4720 4180 WAMain.exe WAMain.exe PID 4180 set thread context of 3220 4180 WAMain.exe WAMain.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 3624 4940 WerFault.exe svchost.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
svchost.exepid process 3028 svchost.exe 3028 svchost.exe 3028 svchost.exe 3028 svchost.exe 3028 svchost.exe 3028 svchost.exe 3028 svchost.exe 3028 svchost.exe 3028 svchost.exe 3028 svchost.exe 3028 svchost.exe 3028 svchost.exe 3028 svchost.exe 3028 svchost.exe 3028 svchost.exe 3028 svchost.exe 3028 svchost.exe 3028 svchost.exe 3028 svchost.exe 3028 svchost.exe 3028 svchost.exe 3028 svchost.exe 3028 svchost.exe 3028 svchost.exe 3028 svchost.exe 3028 svchost.exe 3028 svchost.exe 3028 svchost.exe 3028 svchost.exe 3028 svchost.exe 3028 svchost.exe 3028 svchost.exe 3028 svchost.exe 3028 svchost.exe 3028 svchost.exe 3028 svchost.exe 3028 svchost.exe 3028 svchost.exe 3028 svchost.exe 3028 svchost.exe 3028 svchost.exe 3028 svchost.exe 3028 svchost.exe 3028 svchost.exe 3028 svchost.exe 3028 svchost.exe 3028 svchost.exe 3028 svchost.exe 3028 svchost.exe 3028 svchost.exe 3028 svchost.exe 3028 svchost.exe 3028 svchost.exe 3028 svchost.exe 3028 svchost.exe 3028 svchost.exe 3028 svchost.exe 3028 svchost.exe 3028 svchost.exe 3028 svchost.exe 3028 svchost.exe 3028 svchost.exe 3028 svchost.exe 3028 svchost.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
WAMain.exedescription pid process Token: SeDebugPrivilege 4720 WAMain.exe Token: SeDebugPrivilege 4720 WAMain.exe Token: SeDebugPrivilege 4720 WAMain.exe Token: SeDebugPrivilege 4720 WAMain.exe Token: SeDebugPrivilege 4720 WAMain.exe Token: SeDebugPrivilege 4720 WAMain.exe Token: SeDebugPrivilege 4720 WAMain.exe Token: SeDebugPrivilege 4720 WAMain.exe Token: SeDebugPrivilege 4720 WAMain.exe Token: SeDebugPrivilege 4720 WAMain.exe Token: SeDebugPrivilege 4720 WAMain.exe Token: SeDebugPrivilege 4720 WAMain.exe Token: SeDebugPrivilege 4720 WAMain.exe Token: SeDebugPrivilege 4720 WAMain.exe Token: SeDebugPrivilege 4720 WAMain.exe Token: SeDebugPrivilege 4720 WAMain.exe Token: SeDebugPrivilege 4720 WAMain.exe Token: SeDebugPrivilege 4720 WAMain.exe Token: SeDebugPrivilege 4720 WAMain.exe Token: SeDebugPrivilege 4720 WAMain.exe Token: SeDebugPrivilege 4720 WAMain.exe Token: SeDebugPrivilege 4720 WAMain.exe Token: SeDebugPrivilege 4720 WAMain.exe Token: SeDebugPrivilege 4720 WAMain.exe Token: SeDebugPrivilege 4720 WAMain.exe Token: SeDebugPrivilege 4720 WAMain.exe Token: SeDebugPrivilege 4720 WAMain.exe Token: SeDebugPrivilege 4720 WAMain.exe Token: SeDebugPrivilege 4720 WAMain.exe Token: SeDebugPrivilege 4720 WAMain.exe Token: SeDebugPrivilege 4720 WAMain.exe Token: SeDebugPrivilege 4720 WAMain.exe Token: SeDebugPrivilege 4720 WAMain.exe Token: SeDebugPrivilege 4720 WAMain.exe Token: SeDebugPrivilege 4720 WAMain.exe Token: SeDebugPrivilege 4720 WAMain.exe Token: SeDebugPrivilege 4720 WAMain.exe Token: SeDebugPrivilege 4720 WAMain.exe Token: SeDebugPrivilege 4720 WAMain.exe Token: SeDebugPrivilege 4720 WAMain.exe Token: SeDebugPrivilege 4720 WAMain.exe Token: SeDebugPrivilege 4720 WAMain.exe Token: SeDebugPrivilege 4720 WAMain.exe Token: SeDebugPrivilege 4720 WAMain.exe Token: SeDebugPrivilege 4720 WAMain.exe Token: SeDebugPrivilege 4720 WAMain.exe Token: SeDebugPrivilege 4720 WAMain.exe Token: SeDebugPrivilege 4720 WAMain.exe Token: SeDebugPrivilege 4720 WAMain.exe Token: SeDebugPrivilege 4720 WAMain.exe Token: SeDebugPrivilege 4720 WAMain.exe Token: SeDebugPrivilege 4720 WAMain.exe Token: SeDebugPrivilege 4720 WAMain.exe Token: SeDebugPrivilege 4720 WAMain.exe Token: SeDebugPrivilege 4720 WAMain.exe Token: SeDebugPrivilege 4720 WAMain.exe Token: SeDebugPrivilege 4720 WAMain.exe Token: SeDebugPrivilege 4720 WAMain.exe Token: SeDebugPrivilege 4720 WAMain.exe Token: SeDebugPrivilege 4720 WAMain.exe Token: SeDebugPrivilege 4720 WAMain.exe Token: SeDebugPrivilege 4720 WAMain.exe Token: SeDebugPrivilege 4720 WAMain.exe Token: SeDebugPrivilege 4720 WAMain.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
Processes:
d86aaa8cc228dbba5201329ddd56ad50_NeikiAnalytics.exesvchost.exed86aaa8cc228dbba5201329ddd56ad50_NeikiAnalytics.exeWAMain.exeWAMain.exepid process 644 d86aaa8cc228dbba5201329ddd56ad50_NeikiAnalytics.exe 3028 svchost.exe 1232 d86aaa8cc228dbba5201329ddd56ad50_NeikiAnalytics.exe 4180 WAMain.exe 4720 WAMain.exe -
Suspicious use of WriteProcessMemory 46 IoCs
Processes:
d86aaa8cc228dbba5201329ddd56ad50_NeikiAnalytics.exed86aaa8cc228dbba5201329ddd56ad50_NeikiAnalytics.execmd.exeWAMain.exedescription pid process target process PID 644 wrote to memory of 3028 644 d86aaa8cc228dbba5201329ddd56ad50_NeikiAnalytics.exe svchost.exe PID 644 wrote to memory of 3028 644 d86aaa8cc228dbba5201329ddd56ad50_NeikiAnalytics.exe svchost.exe PID 644 wrote to memory of 3028 644 d86aaa8cc228dbba5201329ddd56ad50_NeikiAnalytics.exe svchost.exe PID 644 wrote to memory of 3028 644 d86aaa8cc228dbba5201329ddd56ad50_NeikiAnalytics.exe svchost.exe PID 644 wrote to memory of 3028 644 d86aaa8cc228dbba5201329ddd56ad50_NeikiAnalytics.exe svchost.exe PID 644 wrote to memory of 3028 644 d86aaa8cc228dbba5201329ddd56ad50_NeikiAnalytics.exe svchost.exe PID 644 wrote to memory of 3028 644 d86aaa8cc228dbba5201329ddd56ad50_NeikiAnalytics.exe svchost.exe PID 644 wrote to memory of 3028 644 d86aaa8cc228dbba5201329ddd56ad50_NeikiAnalytics.exe svchost.exe PID 644 wrote to memory of 3028 644 d86aaa8cc228dbba5201329ddd56ad50_NeikiAnalytics.exe svchost.exe PID 644 wrote to memory of 1232 644 d86aaa8cc228dbba5201329ddd56ad50_NeikiAnalytics.exe d86aaa8cc228dbba5201329ddd56ad50_NeikiAnalytics.exe PID 644 wrote to memory of 1232 644 d86aaa8cc228dbba5201329ddd56ad50_NeikiAnalytics.exe d86aaa8cc228dbba5201329ddd56ad50_NeikiAnalytics.exe PID 644 wrote to memory of 1232 644 d86aaa8cc228dbba5201329ddd56ad50_NeikiAnalytics.exe d86aaa8cc228dbba5201329ddd56ad50_NeikiAnalytics.exe PID 644 wrote to memory of 1232 644 d86aaa8cc228dbba5201329ddd56ad50_NeikiAnalytics.exe d86aaa8cc228dbba5201329ddd56ad50_NeikiAnalytics.exe PID 644 wrote to memory of 1232 644 d86aaa8cc228dbba5201329ddd56ad50_NeikiAnalytics.exe d86aaa8cc228dbba5201329ddd56ad50_NeikiAnalytics.exe PID 644 wrote to memory of 1232 644 d86aaa8cc228dbba5201329ddd56ad50_NeikiAnalytics.exe d86aaa8cc228dbba5201329ddd56ad50_NeikiAnalytics.exe PID 644 wrote to memory of 1232 644 d86aaa8cc228dbba5201329ddd56ad50_NeikiAnalytics.exe d86aaa8cc228dbba5201329ddd56ad50_NeikiAnalytics.exe PID 644 wrote to memory of 1232 644 d86aaa8cc228dbba5201329ddd56ad50_NeikiAnalytics.exe d86aaa8cc228dbba5201329ddd56ad50_NeikiAnalytics.exe PID 1232 wrote to memory of 2992 1232 d86aaa8cc228dbba5201329ddd56ad50_NeikiAnalytics.exe cmd.exe PID 1232 wrote to memory of 2992 1232 d86aaa8cc228dbba5201329ddd56ad50_NeikiAnalytics.exe cmd.exe PID 1232 wrote to memory of 2992 1232 d86aaa8cc228dbba5201329ddd56ad50_NeikiAnalytics.exe cmd.exe PID 2992 wrote to memory of 740 2992 cmd.exe reg.exe PID 2992 wrote to memory of 740 2992 cmd.exe reg.exe PID 2992 wrote to memory of 740 2992 cmd.exe reg.exe PID 1232 wrote to memory of 4180 1232 d86aaa8cc228dbba5201329ddd56ad50_NeikiAnalytics.exe WAMain.exe PID 1232 wrote to memory of 4180 1232 d86aaa8cc228dbba5201329ddd56ad50_NeikiAnalytics.exe WAMain.exe PID 1232 wrote to memory of 4180 1232 d86aaa8cc228dbba5201329ddd56ad50_NeikiAnalytics.exe WAMain.exe PID 4180 wrote to memory of 4940 4180 WAMain.exe svchost.exe PID 4180 wrote to memory of 4940 4180 WAMain.exe svchost.exe PID 4180 wrote to memory of 4940 4180 WAMain.exe svchost.exe PID 4180 wrote to memory of 4940 4180 WAMain.exe svchost.exe PID 4180 wrote to memory of 4720 4180 WAMain.exe WAMain.exe PID 4180 wrote to memory of 4720 4180 WAMain.exe WAMain.exe PID 4180 wrote to memory of 4720 4180 WAMain.exe WAMain.exe PID 4180 wrote to memory of 4720 4180 WAMain.exe WAMain.exe PID 4180 wrote to memory of 4720 4180 WAMain.exe WAMain.exe PID 4180 wrote to memory of 4720 4180 WAMain.exe WAMain.exe PID 4180 wrote to memory of 4720 4180 WAMain.exe WAMain.exe PID 4180 wrote to memory of 4720 4180 WAMain.exe WAMain.exe PID 4180 wrote to memory of 3220 4180 WAMain.exe WAMain.exe PID 4180 wrote to memory of 3220 4180 WAMain.exe WAMain.exe PID 4180 wrote to memory of 3220 4180 WAMain.exe WAMain.exe PID 4180 wrote to memory of 3220 4180 WAMain.exe WAMain.exe PID 4180 wrote to memory of 3220 4180 WAMain.exe WAMain.exe PID 4180 wrote to memory of 3220 4180 WAMain.exe WAMain.exe PID 4180 wrote to memory of 3220 4180 WAMain.exe WAMain.exe PID 4180 wrote to memory of 3220 4180 WAMain.exe WAMain.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\d86aaa8cc228dbba5201329ddd56ad50_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\d86aaa8cc228dbba5201329ddd56ad50_NeikiAnalytics.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:644 -
C:\Windows\SysWOW64\svchost.exe"C:\Windows\system32\svchost.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3028
-
-
C:\Users\Admin\AppData\Local\Temp\d86aaa8cc228dbba5201329ddd56ad50_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\d86aaa8cc228dbba5201329ddd56ad50_NeikiAnalytics.exe"2⤵
- Checks computer location settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1232 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\UMBVR.bat" "3⤵
- Suspicious use of WriteProcessMemory
PID:2992 -
C:\Windows\SysWOW64\reg.exeREG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "Windows WA" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\Microsoft\WAMain.exe" /f4⤵
- Adds Run key to start application
PID:740
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\WAMain.exe"C:\Users\Admin\AppData\Roaming\Microsoft\WAMain.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4180 -
C:\Windows\SysWOW64\svchost.exe"C:\Windows\system32\svchost.exe"4⤵PID:4940
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4940 -s 845⤵
- Program crash
PID:3624
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\WAMain.exe"C:\Users\Admin\AppData\Roaming\Microsoft\WAMain.exe"4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:4720
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\WAMain.exe"C:\Users\Admin\AppData\Roaming\Microsoft\WAMain.exe"4⤵
- Executes dropped EXE
PID:3220
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4940 -ip 49401⤵PID:232
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
148B
MD53a4614705555abb049c3298e61170b7f
SHA1c8686410756f346d9551256a5b878b04770950ba
SHA256cff0663c8cfadf83b80583a871c313ffc5d950cb503809cb4a482f400c5d846b
SHA51265ce6fec00e6934f21635e7ccd74757f31ed4b0ddb52bd80d3ea9abeba56340128d23151ef7d9f5daacb5d61e4a4cca50dbb3a43132e350522311ee06e829007
-
Filesize
112KB
MD53655b895d335d2949ef75b400f35661b
SHA1fceb27836db0a2c705bb74fa7228d18fa52dda5c
SHA256a5c0a49dde51158e6cf2a1cfe187b754384fe0217139e3e87eeb83f8b1b86f83
SHA512e3ef8f2bb5e7e61f70424b62e256581a083c78c43b46ab8559f2b1d4e9a15fdc623be2ae5346a802e49f7adc06260a90a1eae776b8265bcf379ccc923a6c5050