Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
16-05-2024 11:04
Static task
static1
Behavioral task
behavioral1
Sample
dbd4b7876a77f48240518ce1217c3420_NeikiAnalytics.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
dbd4b7876a77f48240518ce1217c3420_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
dbd4b7876a77f48240518ce1217c3420_NeikiAnalytics.exe
-
Size
53KB
-
MD5
dbd4b7876a77f48240518ce1217c3420
-
SHA1
7f9b7902d9d113d2a50243096f59cd4128bdc0c8
-
SHA256
8b0f74da6c473134fec04a650c7e8b31d3c59351c8fc955fdfef46192dc36484
-
SHA512
d16e003200a932e1bd62d4f1775c6ee16b6595a1f2630c27ad982280e11f107899f03d3c806de9191b75b81a938e042f129bfb12b2be71b6e95f31c9e2d8fad4
-
SSDEEP
1536:vNIg8r8Q3LFLr7Kp3StjEMjmLM3ztDJWZsXy4JzxPM0:ALFLrJJjmLM3zRJWZsXy4Jd
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" youvoo.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation dbd4b7876a77f48240518ce1217c3420_NeikiAnalytics.exe -
Executes dropped EXE 1 IoCs
pid Process 2840 youvoo.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\youvoo = "C:\\Users\\Admin\\youvoo.exe" youvoo.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2840 youvoo.exe 2840 youvoo.exe 2840 youvoo.exe 2840 youvoo.exe 2840 youvoo.exe 2840 youvoo.exe 2840 youvoo.exe 2840 youvoo.exe 2840 youvoo.exe 2840 youvoo.exe 2840 youvoo.exe 2840 youvoo.exe 2840 youvoo.exe 2840 youvoo.exe 2840 youvoo.exe 2840 youvoo.exe 2840 youvoo.exe 2840 youvoo.exe 2840 youvoo.exe 2840 youvoo.exe 2840 youvoo.exe 2840 youvoo.exe 2840 youvoo.exe 2840 youvoo.exe 2840 youvoo.exe 2840 youvoo.exe 2840 youvoo.exe 2840 youvoo.exe 2840 youvoo.exe 2840 youvoo.exe 2840 youvoo.exe 2840 youvoo.exe 2840 youvoo.exe 2840 youvoo.exe 2840 youvoo.exe 2840 youvoo.exe 2840 youvoo.exe 2840 youvoo.exe 2840 youvoo.exe 2840 youvoo.exe 2840 youvoo.exe 2840 youvoo.exe 2840 youvoo.exe 2840 youvoo.exe 2840 youvoo.exe 2840 youvoo.exe 2840 youvoo.exe 2840 youvoo.exe 2840 youvoo.exe 2840 youvoo.exe 2840 youvoo.exe 2840 youvoo.exe 2840 youvoo.exe 2840 youvoo.exe 2840 youvoo.exe 2840 youvoo.exe 2840 youvoo.exe 2840 youvoo.exe 2840 youvoo.exe 2840 youvoo.exe 2840 youvoo.exe 2840 youvoo.exe 2840 youvoo.exe 2840 youvoo.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 64 dbd4b7876a77f48240518ce1217c3420_NeikiAnalytics.exe 2840 youvoo.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 64 wrote to memory of 2840 64 dbd4b7876a77f48240518ce1217c3420_NeikiAnalytics.exe 90 PID 64 wrote to memory of 2840 64 dbd4b7876a77f48240518ce1217c3420_NeikiAnalytics.exe 90 PID 64 wrote to memory of 2840 64 dbd4b7876a77f48240518ce1217c3420_NeikiAnalytics.exe 90 PID 2840 wrote to memory of 64 2840 youvoo.exe 82 PID 2840 wrote to memory of 64 2840 youvoo.exe 82 PID 2840 wrote to memory of 64 2840 youvoo.exe 82 PID 2840 wrote to memory of 64 2840 youvoo.exe 82 PID 2840 wrote to memory of 64 2840 youvoo.exe 82 PID 2840 wrote to memory of 64 2840 youvoo.exe 82 PID 2840 wrote to memory of 64 2840 youvoo.exe 82 PID 2840 wrote to memory of 64 2840 youvoo.exe 82 PID 2840 wrote to memory of 64 2840 youvoo.exe 82 PID 2840 wrote to memory of 64 2840 youvoo.exe 82 PID 2840 wrote to memory of 64 2840 youvoo.exe 82 PID 2840 wrote to memory of 64 2840 youvoo.exe 82 PID 2840 wrote to memory of 64 2840 youvoo.exe 82 PID 2840 wrote to memory of 64 2840 youvoo.exe 82 PID 2840 wrote to memory of 64 2840 youvoo.exe 82 PID 2840 wrote to memory of 64 2840 youvoo.exe 82 PID 2840 wrote to memory of 64 2840 youvoo.exe 82 PID 2840 wrote to memory of 64 2840 youvoo.exe 82 PID 2840 wrote to memory of 64 2840 youvoo.exe 82 PID 2840 wrote to memory of 64 2840 youvoo.exe 82 PID 2840 wrote to memory of 64 2840 youvoo.exe 82 PID 2840 wrote to memory of 64 2840 youvoo.exe 82 PID 2840 wrote to memory of 64 2840 youvoo.exe 82 PID 2840 wrote to memory of 64 2840 youvoo.exe 82 PID 2840 wrote to memory of 64 2840 youvoo.exe 82 PID 2840 wrote to memory of 64 2840 youvoo.exe 82 PID 2840 wrote to memory of 64 2840 youvoo.exe 82 PID 2840 wrote to memory of 64 2840 youvoo.exe 82 PID 2840 wrote to memory of 64 2840 youvoo.exe 82 PID 2840 wrote to memory of 64 2840 youvoo.exe 82 PID 2840 wrote to memory of 64 2840 youvoo.exe 82 PID 2840 wrote to memory of 64 2840 youvoo.exe 82 PID 2840 wrote to memory of 64 2840 youvoo.exe 82 PID 2840 wrote to memory of 64 2840 youvoo.exe 82 PID 2840 wrote to memory of 64 2840 youvoo.exe 82 PID 2840 wrote to memory of 64 2840 youvoo.exe 82 PID 2840 wrote to memory of 64 2840 youvoo.exe 82 PID 2840 wrote to memory of 64 2840 youvoo.exe 82 PID 2840 wrote to memory of 64 2840 youvoo.exe 82 PID 2840 wrote to memory of 64 2840 youvoo.exe 82 PID 2840 wrote to memory of 64 2840 youvoo.exe 82 PID 2840 wrote to memory of 64 2840 youvoo.exe 82 PID 2840 wrote to memory of 64 2840 youvoo.exe 82 PID 2840 wrote to memory of 64 2840 youvoo.exe 82 PID 2840 wrote to memory of 64 2840 youvoo.exe 82 PID 2840 wrote to memory of 64 2840 youvoo.exe 82 PID 2840 wrote to memory of 64 2840 youvoo.exe 82 PID 2840 wrote to memory of 64 2840 youvoo.exe 82 PID 2840 wrote to memory of 64 2840 youvoo.exe 82 PID 2840 wrote to memory of 64 2840 youvoo.exe 82 PID 2840 wrote to memory of 64 2840 youvoo.exe 82 PID 2840 wrote to memory of 64 2840 youvoo.exe 82 PID 2840 wrote to memory of 64 2840 youvoo.exe 82 PID 2840 wrote to memory of 64 2840 youvoo.exe 82 PID 2840 wrote to memory of 64 2840 youvoo.exe 82 PID 2840 wrote to memory of 64 2840 youvoo.exe 82 PID 2840 wrote to memory of 64 2840 youvoo.exe 82 PID 2840 wrote to memory of 64 2840 youvoo.exe 82 PID 2840 wrote to memory of 64 2840 youvoo.exe 82 PID 2840 wrote to memory of 64 2840 youvoo.exe 82 PID 2840 wrote to memory of 64 2840 youvoo.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\dbd4b7876a77f48240518ce1217c3420_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\dbd4b7876a77f48240518ce1217c3420_NeikiAnalytics.exe"1⤵
- Checks computer location settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:64 -
C:\Users\Admin\youvoo.exe"C:\Users\Admin\youvoo.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2840
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
53KB
MD5af8d318fa8aa1f0fdf28fc1754e60b0e
SHA1ce0395bc21413a4d15238b08a179e58ca860a720
SHA2567470602ce3a5c025cbc717aee4a6b5c95cdf8048bd9632118cf30bdfe08085b3
SHA5122888c145f4054cdcee1ac27f64cb6bc469050cd83d0ee4a91b435daa9e8b6141c68e3abdf94c7ded70b9032cfa6e609e25503909f1fd10d0aa07ea89f3c381eb