Analysis
-
max time kernel
151s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
16-05-2024 09:45
Static task
static1
Behavioral task
behavioral1
Sample
d8038817cbcb9b02b78c9a9c8a340df0_NeikiAnalytics.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
d8038817cbcb9b02b78c9a9c8a340df0_NeikiAnalytics.exe
Resource
win10v2004-20240226-en
General
-
Target
d8038817cbcb9b02b78c9a9c8a340df0_NeikiAnalytics.exe
-
Size
135KB
-
MD5
d8038817cbcb9b02b78c9a9c8a340df0
-
SHA1
3f15eacf256fb9487a4c29d761af0e0d605398bc
-
SHA256
06fa71b51e1e78dcb852cd031ac8e2650af0f5c69460223e35cf3ebdf0a24d4f
-
SHA512
1c96cd3ab801ae3b9ab43580394496bc63cd0d1cde2b8f92ba3c76d1b3320ee0e8cf8e8f1706f338cf38f5ff0a9d656961f5498cc87e57a17835c0f5885e79a9
-
SSDEEP
1536:UfsEqouTRcG/Mzvgf7xEuvnXNTRdUzwTekUOisZ1yDDajtXbVCa:UVqoCl/YgjxEufVU0TbTyDDalQa
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" svchost.exe -
Executes dropped EXE 4 IoCs
pid Process 4520 explorer.exe 2688 spoolsv.exe 2044 svchost.exe 1120 spoolsv.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\resources\\themes\\explorer.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\resources\\svchost.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\resources\\themes\\explorer.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\resources\\svchost.exe RO" svchost.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\explorer.exe explorer.exe File opened for modification C:\Windows\SysWOW64\explorer.exe svchost.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification \??\c:\windows\resources\themes\explorer.exe d8038817cbcb9b02b78c9a9c8a340df0_NeikiAnalytics.exe File opened for modification \??\c:\windows\resources\spoolsv.exe explorer.exe File opened for modification \??\c:\windows\resources\svchost.exe spoolsv.exe File opened for modification C:\Windows\Resources\tjud.exe explorer.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2112 d8038817cbcb9b02b78c9a9c8a340df0_NeikiAnalytics.exe 2112 d8038817cbcb9b02b78c9a9c8a340df0_NeikiAnalytics.exe 2112 d8038817cbcb9b02b78c9a9c8a340df0_NeikiAnalytics.exe 2112 d8038817cbcb9b02b78c9a9c8a340df0_NeikiAnalytics.exe 2112 d8038817cbcb9b02b78c9a9c8a340df0_NeikiAnalytics.exe 2112 d8038817cbcb9b02b78c9a9c8a340df0_NeikiAnalytics.exe 2112 d8038817cbcb9b02b78c9a9c8a340df0_NeikiAnalytics.exe 2112 d8038817cbcb9b02b78c9a9c8a340df0_NeikiAnalytics.exe 2112 d8038817cbcb9b02b78c9a9c8a340df0_NeikiAnalytics.exe 2112 d8038817cbcb9b02b78c9a9c8a340df0_NeikiAnalytics.exe 2112 d8038817cbcb9b02b78c9a9c8a340df0_NeikiAnalytics.exe 2112 d8038817cbcb9b02b78c9a9c8a340df0_NeikiAnalytics.exe 2112 d8038817cbcb9b02b78c9a9c8a340df0_NeikiAnalytics.exe 2112 d8038817cbcb9b02b78c9a9c8a340df0_NeikiAnalytics.exe 2112 d8038817cbcb9b02b78c9a9c8a340df0_NeikiAnalytics.exe 2112 d8038817cbcb9b02b78c9a9c8a340df0_NeikiAnalytics.exe 2112 d8038817cbcb9b02b78c9a9c8a340df0_NeikiAnalytics.exe 2112 d8038817cbcb9b02b78c9a9c8a340df0_NeikiAnalytics.exe 2112 d8038817cbcb9b02b78c9a9c8a340df0_NeikiAnalytics.exe 2112 d8038817cbcb9b02b78c9a9c8a340df0_NeikiAnalytics.exe 2112 d8038817cbcb9b02b78c9a9c8a340df0_NeikiAnalytics.exe 2112 d8038817cbcb9b02b78c9a9c8a340df0_NeikiAnalytics.exe 2112 d8038817cbcb9b02b78c9a9c8a340df0_NeikiAnalytics.exe 2112 d8038817cbcb9b02b78c9a9c8a340df0_NeikiAnalytics.exe 2112 d8038817cbcb9b02b78c9a9c8a340df0_NeikiAnalytics.exe 2112 d8038817cbcb9b02b78c9a9c8a340df0_NeikiAnalytics.exe 2112 d8038817cbcb9b02b78c9a9c8a340df0_NeikiAnalytics.exe 2112 d8038817cbcb9b02b78c9a9c8a340df0_NeikiAnalytics.exe 2112 d8038817cbcb9b02b78c9a9c8a340df0_NeikiAnalytics.exe 2112 d8038817cbcb9b02b78c9a9c8a340df0_NeikiAnalytics.exe 2112 d8038817cbcb9b02b78c9a9c8a340df0_NeikiAnalytics.exe 2112 d8038817cbcb9b02b78c9a9c8a340df0_NeikiAnalytics.exe 2112 d8038817cbcb9b02b78c9a9c8a340df0_NeikiAnalytics.exe 2112 d8038817cbcb9b02b78c9a9c8a340df0_NeikiAnalytics.exe 4520 explorer.exe 4520 explorer.exe 4520 explorer.exe 4520 explorer.exe 4520 explorer.exe 4520 explorer.exe 4520 explorer.exe 4520 explorer.exe 4520 explorer.exe 4520 explorer.exe 4520 explorer.exe 4520 explorer.exe 4520 explorer.exe 4520 explorer.exe 4520 explorer.exe 4520 explorer.exe 4520 explorer.exe 4520 explorer.exe 4520 explorer.exe 4520 explorer.exe 4520 explorer.exe 4520 explorer.exe 4520 explorer.exe 4520 explorer.exe 4520 explorer.exe 4520 explorer.exe 4520 explorer.exe 4520 explorer.exe 4520 explorer.exe 4520 explorer.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 4520 explorer.exe 2044 svchost.exe -
Suspicious use of SetWindowsHookEx 10 IoCs
pid Process 2112 d8038817cbcb9b02b78c9a9c8a340df0_NeikiAnalytics.exe 2112 d8038817cbcb9b02b78c9a9c8a340df0_NeikiAnalytics.exe 4520 explorer.exe 4520 explorer.exe 2688 spoolsv.exe 2688 spoolsv.exe 2044 svchost.exe 2044 svchost.exe 1120 spoolsv.exe 1120 spoolsv.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2112 wrote to memory of 4520 2112 d8038817cbcb9b02b78c9a9c8a340df0_NeikiAnalytics.exe 91 PID 2112 wrote to memory of 4520 2112 d8038817cbcb9b02b78c9a9c8a340df0_NeikiAnalytics.exe 91 PID 2112 wrote to memory of 4520 2112 d8038817cbcb9b02b78c9a9c8a340df0_NeikiAnalytics.exe 91 PID 4520 wrote to memory of 2688 4520 explorer.exe 92 PID 4520 wrote to memory of 2688 4520 explorer.exe 92 PID 4520 wrote to memory of 2688 4520 explorer.exe 92 PID 2688 wrote to memory of 2044 2688 spoolsv.exe 93 PID 2688 wrote to memory of 2044 2688 spoolsv.exe 93 PID 2688 wrote to memory of 2044 2688 spoolsv.exe 93 PID 2044 wrote to memory of 1120 2044 svchost.exe 94 PID 2044 wrote to memory of 1120 2044 svchost.exe 94 PID 2044 wrote to memory of 1120 2044 svchost.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\d8038817cbcb9b02b78c9a9c8a340df0_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\d8038817cbcb9b02b78c9a9c8a340df0_NeikiAnalytics.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2112 -
\??\c:\windows\resources\themes\explorer.exec:\windows\resources\themes\explorer.exe2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4520 -
\??\c:\windows\resources\spoolsv.exec:\windows\resources\spoolsv.exe SE3⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2688 -
\??\c:\windows\resources\svchost.exec:\windows\resources\svchost.exe4⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2044 -
\??\c:\windows\resources\spoolsv.exec:\windows\resources\spoolsv.exe PR5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1120
-
-
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4036 --field-trial-handle=2676,i,447940133669489189,1353734109898858672,262144 --variations-seed-version /prefetch:81⤵PID:4016
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
135KB
MD55199727abc5874c13549109eb57d1a7b
SHA1102ff5dc591fdb97695d482dd8faa6cd8a9543a8
SHA256cb5445217124926996237c4349cc6276b7718940db53f6cc6bb1c3c559926eb0
SHA51221b5d740af05093c3cd282d9d4cca44cf6fd2c16b89b478e80a97cbd18021a21585d6735f16ec39c5f693ed42a717e78fbca6d6dcfe64d8a047fd67b8f333fd3
-
Filesize
135KB
MD5ad89bedc3a385661dce071e150afb441
SHA10455ca846dd3ee5fb6b9a71f7d863f94045b1cda
SHA256bcb749ec50665cbb36770999e414629821f2a2c155ffbd6803d2fd536912c838
SHA512eef4e07e071c9b73826a57ed68edd94033a3ac531edde2b61ae0211812e0280064689e87af2fb7b7ed172606f0a90807c9253ee837fef143ba74273e90855457
-
Filesize
135KB
MD550ab32cc10aa007ed7616ee6b8f234bd
SHA1772e45da919721578e69df1de1f748da9ada8b09
SHA25656fb0a2752ee0a50480d867da7a8acd2ebf07458a66fa3b7dff81c8c85cbb66e
SHA5127b1bcb3818e266ac7f3e9c8395aee58d0b6611d8b8322e5268a69ad887d805c8e887bf525b54b62c4b0fa314ba357dd35b98171530314fcf23644b3d45339f24