Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
16/05/2024, 05:57
Static task
static1
Behavioral task
behavioral1
Sample
aaa5ac8b8ab68ad695e72be9ca9571a0_NeikiAnalytics.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
aaa5ac8b8ab68ad695e72be9ca9571a0_NeikiAnalytics.exe
Resource
win10v2004-20240426-en
General
-
Target
aaa5ac8b8ab68ad695e72be9ca9571a0_NeikiAnalytics.exe
-
Size
6.1MB
-
MD5
aaa5ac8b8ab68ad695e72be9ca9571a0
-
SHA1
68dc4eba558e5a76880fcf4d0e997a1b7cc7a00e
-
SHA256
3b341eea8340078ee9eb0c11e876c24142f448174126b7c1c7d060ad65dbe607
-
SHA512
49214cc8ab2f74256f3cbc5e7cb0359007be2d4aad3019379f164bb878e23d88d05b869ca59c5a8d40f5c430843a0fc6982740e691a6d42bce67ff1f17de20a4
-
SSDEEP
196608:A6q0HkQgN1DmfJLO03/Vnaiq2L8dET6WBse0aUCeVMRmLnPKy:A6jCKLO03ZFn846WBsnaiVMRYnr
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "Explorer.exe sIRC4.exe" aaa5ac8b8ab68ad695e72be9ca9571a0_NeikiAnalytics.exe -
Drops file in System32 directory 28 IoCs
description ioc Process File created C:\Windows\SysWOW64\xdccPrograms\Uninstall.exe aaa5ac8b8ab68ad695e72be9ca9571a0_NeikiAnalytics.exe File created C:\Windows\SysWOW64\xdccPrograms\mip.exe aaa5ac8b8ab68ad695e72be9ca9571a0_NeikiAnalytics.exe File opened for modification C:\Windows\SysWOW64\DC++ Share\MSOXMLED.exe aaa5ac8b8ab68ad695e72be9ca9571a0_NeikiAnalytics.exe File created C:\Windows\SysWOW64\sIRC4.exe aaa5ac8b8ab68ad695e72be9ca9571a0_NeikiAnalytics.exe File opened for modification C:\Windows\SysWOW64\sIRC4.exe aaa5ac8b8ab68ad695e72be9ca9571a0_NeikiAnalytics.exe File opened for modification C:\Windows\SysWOW64\xdccPrograms\InputPersonalization.exe aaa5ac8b8ab68ad695e72be9ca9571a0_NeikiAnalytics.exe File created C:\Windows\SysWOW64\DC++ Share\TabTip.exe aaa5ac8b8ab68ad695e72be9ca9571a0_NeikiAnalytics.exe File created C:\Windows\SysWOW64\DC++ Share\DVDMaker.exe aaa5ac8b8ab68ad695e72be9ca9571a0_NeikiAnalytics.exe File opened for modification C:\Windows\SysWOW64\xdccPrograms\Uninstall.exe aaa5ac8b8ab68ad695e72be9ca9571a0_NeikiAnalytics.exe File created C:\Windows\SysWOW64\xdccPrograms\FlickLearningWizard.exe aaa5ac8b8ab68ad695e72be9ca9571a0_NeikiAnalytics.exe File created C:\Windows\SysWOW64\DC++ Share\ShapeCollector.exe aaa5ac8b8ab68ad695e72be9ca9571a0_NeikiAnalytics.exe File opened for modification C:\Windows\SysWOW64\DC++ Share\OSPPSVC.exe aaa5ac8b8ab68ad695e72be9ca9571a0_NeikiAnalytics.exe File created C:\Windows\SysWOW64\DC++ Share\VSTOInstaller.exe aaa5ac8b8ab68ad695e72be9ca9571a0_NeikiAnalytics.exe File opened for modification C:\Windows\SysWOW64\xdccPrograms\mip.exe aaa5ac8b8ab68ad695e72be9ca9571a0_NeikiAnalytics.exe File opened for modification C:\Windows\SysWOW64\xdccPrograms\7zFM.exe aaa5ac8b8ab68ad695e72be9ca9571a0_NeikiAnalytics.exe File opened for modification C:\Windows\SysWOW64\xdccPrograms\7zG.exe aaa5ac8b8ab68ad695e72be9ca9571a0_NeikiAnalytics.exe File created C:\Windows\SysWOW64\DC++ Share\msinfo32.exe aaa5ac8b8ab68ad695e72be9ca9571a0_NeikiAnalytics.exe File created C:\Windows\SysWOW64\xdccPrograms\7zFM.exe aaa5ac8b8ab68ad695e72be9ca9571a0_NeikiAnalytics.exe File created C:\Windows\SysWOW64\xdccPrograms\7zG.exe aaa5ac8b8ab68ad695e72be9ca9571a0_NeikiAnalytics.exe File created C:\Windows\SysWOW64\xdccPrograms\ConvertInkStore.exe aaa5ac8b8ab68ad695e72be9ca9571a0_NeikiAnalytics.exe File opened for modification C:\Windows\SysWOW64\DC++ Share\TabTip.exe aaa5ac8b8ab68ad695e72be9ca9571a0_NeikiAnalytics.exe File created C:\Windows\SysWOW64\DC++ Share\OSPPSVC.exe aaa5ac8b8ab68ad695e72be9ca9571a0_NeikiAnalytics.exe File opened for modification C:\Windows\SysWOW64\DC++ Share\RCXE62.tmp aaa5ac8b8ab68ad695e72be9ca9571a0_NeikiAnalytics.exe File created C:\Windows\SysWOW64\xdccPrograms\7z.exe aaa5ac8b8ab68ad695e72be9ca9571a0_NeikiAnalytics.exe File created C:\Windows\SysWOW64\xdccPrograms\InkWatson.exe aaa5ac8b8ab68ad695e72be9ca9571a0_NeikiAnalytics.exe File created C:\Windows\SysWOW64\xdccPrograms\InputPersonalization.exe aaa5ac8b8ab68ad695e72be9ca9571a0_NeikiAnalytics.exe File created C:\Windows\SysWOW64\DC++ Share\MSOXMLED.exe aaa5ac8b8ab68ad695e72be9ca9571a0_NeikiAnalytics.exe File created C:\Windows\SysWOW64\DC++ Share\chrome_pwa_launcher.exe aaa5ac8b8ab68ad695e72be9ca9571a0_NeikiAnalytics.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2468 1720 WerFault.exe 27 -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1720 aaa5ac8b8ab68ad695e72be9ca9571a0_NeikiAnalytics.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1720 wrote to memory of 2468 1720 aaa5ac8b8ab68ad695e72be9ca9571a0_NeikiAnalytics.exe 28 PID 1720 wrote to memory of 2468 1720 aaa5ac8b8ab68ad695e72be9ca9571a0_NeikiAnalytics.exe 28 PID 1720 wrote to memory of 2468 1720 aaa5ac8b8ab68ad695e72be9ca9571a0_NeikiAnalytics.exe 28 PID 1720 wrote to memory of 2468 1720 aaa5ac8b8ab68ad695e72be9ca9571a0_NeikiAnalytics.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\aaa5ac8b8ab68ad695e72be9ca9571a0_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\aaa5ac8b8ab68ad695e72be9ca9571a0_NeikiAnalytics.exe"1⤵
- Modifies WinLogon for persistence
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1720 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1720 -s 1562⤵
- Program crash
PID:2468
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6.1MB
MD5bddd5f5b8a21fbcf534a09954305b87b
SHA15b6fb3a72e88af3d587681bd3fa29902767bf2a6
SHA256763155b2488fcba5ba881c932920768b1211633bd997268d6db52280566b98ad
SHA51211e6ad6ec23ef31740404d9cbfae4db3832be5da60aa67a25226d06c1dcb026b297d4f187da5b5debe75b6df1374b84cb26305ba2763a67a06544de8bdb49efd