Analysis
-
max time kernel
149s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
16/05/2024, 12:31
Static task
static1
Behavioral task
behavioral1
Sample
dea397043eac41a1bca5e5580c4c61d0_NeikiAnalytics.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
dea397043eac41a1bca5e5580c4c61d0_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
dea397043eac41a1bca5e5580c4c61d0_NeikiAnalytics.exe
-
Size
132KB
-
MD5
dea397043eac41a1bca5e5580c4c61d0
-
SHA1
8e0c74b7db3f9222727b2bce80e4280a04ce7cf6
-
SHA256
e3d334ab5fdeca11243d90e28fbdb926d048f1e3caeb327eb169347bc069dcfc
-
SHA512
3a20eefc07fe123d37fa9dfbbffbae9cda2f901eab2c037e10d96755b04998fad36901df0e60b8e97d2cbbaa8406295e64fe73c613abe97dda87b90bfa2b196e
-
SSDEEP
1536:UwWZugYu9+7gWbrimfWSeJFzkRcTwdE1dIumgDL0FfxTGLTej7j:Uw6T8gWi2eJFzkRswZumgDLOfOTenj
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" dea397043eac41a1bca5e5580c4c61d0_NeikiAnalytics.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" fefey.exe -
Executes dropped EXE 1 IoCs
pid Process 2640 fefey.exe -
Loads dropped DLL 2 IoCs
pid Process 1648 dea397043eac41a1bca5e5580c4c61d0_NeikiAnalytics.exe 1648 dea397043eac41a1bca5e5580c4c61d0_NeikiAnalytics.exe -
Adds Run key to start application 2 TTPs 52 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Windows\CurrentVersion\Run\fefey = "C:\\Users\\Admin\\fefey.exe /t" fefey.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Windows\CurrentVersion\Run\fefey = "C:\\Users\\Admin\\fefey.exe /w" fefey.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Windows\CurrentVersion\Run\fefey = "C:\\Users\\Admin\\fefey.exe /B" fefey.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Windows\CurrentVersion\Run\fefey = "C:\\Users\\Admin\\fefey.exe /N" fefey.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Windows\CurrentVersion\Run\fefey = "C:\\Users\\Admin\\fefey.exe /L" fefey.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Windows\CurrentVersion\Run\fefey = "C:\\Users\\Admin\\fefey.exe /r" fefey.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Windows\CurrentVersion\Run\fefey = "C:\\Users\\Admin\\fefey.exe /y" fefey.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Windows\CurrentVersion\Run\fefey = "C:\\Users\\Admin\\fefey.exe /Z" fefey.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Windows\CurrentVersion\Run\fefey = "C:\\Users\\Admin\\fefey.exe /E" fefey.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Windows\CurrentVersion\Run\fefey = "C:\\Users\\Admin\\fefey.exe /f" fefey.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Windows\CurrentVersion\Run\fefey = "C:\\Users\\Admin\\fefey.exe /D" fefey.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Windows\CurrentVersion\Run\fefey = "C:\\Users\\Admin\\fefey.exe /H" fefey.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Windows\CurrentVersion\Run\fefey = "C:\\Users\\Admin\\fefey.exe /Q" fefey.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Windows\CurrentVersion\Run\fefey = "C:\\Users\\Admin\\fefey.exe /l" fefey.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Windows\CurrentVersion\Run\fefey = "C:\\Users\\Admin\\fefey.exe /u" fefey.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Windows\CurrentVersion\Run\fefey = "C:\\Users\\Admin\\fefey.exe /h" fefey.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Windows\CurrentVersion\Run\fefey = "C:\\Users\\Admin\\fefey.exe /k" fefey.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Windows\CurrentVersion\Run\fefey = "C:\\Users\\Admin\\fefey.exe /P" fefey.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Windows\CurrentVersion\Run\fefey = "C:\\Users\\Admin\\fefey.exe /A" fefey.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Windows\CurrentVersion\Run\fefey = "C:\\Users\\Admin\\fefey.exe /K" fefey.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Windows\CurrentVersion\Run\fefey = "C:\\Users\\Admin\\fefey.exe /d" fefey.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Windows\CurrentVersion\Run\fefey = "C:\\Users\\Admin\\fefey.exe /X" fefey.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Windows\CurrentVersion\Run\fefey = "C:\\Users\\Admin\\fefey.exe /v" fefey.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Windows\CurrentVersion\Run\fefey = "C:\\Users\\Admin\\fefey.exe /G" fefey.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Windows\CurrentVersion\Run\fefey = "C:\\Users\\Admin\\fefey.exe /q" fefey.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Windows\CurrentVersion\Run\fefey = "C:\\Users\\Admin\\fefey.exe /j" fefey.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Windows\CurrentVersion\Run\fefey = "C:\\Users\\Admin\\fefey.exe /i" fefey.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Windows\CurrentVersion\Run\fefey = "C:\\Users\\Admin\\fefey.exe /s" fefey.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Windows\CurrentVersion\Run\fefey = "C:\\Users\\Admin\\fefey.exe /p" fefey.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Windows\CurrentVersion\Run\fefey = "C:\\Users\\Admin\\fefey.exe /O" fefey.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Windows\CurrentVersion\Run\fefey = "C:\\Users\\Admin\\fefey.exe /o" fefey.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Windows\CurrentVersion\Run\fefey = "C:\\Users\\Admin\\fefey.exe /V" fefey.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Windows\CurrentVersion\Run\fefey = "C:\\Users\\Admin\\fefey.exe /T" fefey.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Windows\CurrentVersion\Run\fefey = "C:\\Users\\Admin\\fefey.exe /e" fefey.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Windows\CurrentVersion\Run\fefey = "C:\\Users\\Admin\\fefey.exe /b" fefey.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Windows\CurrentVersion\Run\fefey = "C:\\Users\\Admin\\fefey.exe /a" fefey.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Windows\CurrentVersion\Run\fefey = "C:\\Users\\Admin\\fefey.exe /I" fefey.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Windows\CurrentVersion\Run\fefey = "C:\\Users\\Admin\\fefey.exe /m" fefey.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Windows\CurrentVersion\Run\fefey = "C:\\Users\\Admin\\fefey.exe /n" fefey.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Windows\CurrentVersion\Run\fefey = "C:\\Users\\Admin\\fefey.exe /R" fefey.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Windows\CurrentVersion\Run\fefey = "C:\\Users\\Admin\\fefey.exe /M" fefey.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Windows\CurrentVersion\Run\fefey = "C:\\Users\\Admin\\fefey.exe /z" fefey.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Windows\CurrentVersion\Run\fefey = "C:\\Users\\Admin\\fefey.exe /C" fefey.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Windows\CurrentVersion\Run\fefey = "C:\\Users\\Admin\\fefey.exe /U" dea397043eac41a1bca5e5580c4c61d0_NeikiAnalytics.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Windows\CurrentVersion\Run\fefey = "C:\\Users\\Admin\\fefey.exe /S" fefey.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Windows\CurrentVersion\Run\fefey = "C:\\Users\\Admin\\fefey.exe /J" fefey.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Windows\CurrentVersion\Run\fefey = "C:\\Users\\Admin\\fefey.exe /W" fefey.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Windows\CurrentVersion\Run\fefey = "C:\\Users\\Admin\\fefey.exe /U" fefey.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Windows\CurrentVersion\Run\fefey = "C:\\Users\\Admin\\fefey.exe /c" fefey.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Windows\CurrentVersion\Run\fefey = "C:\\Users\\Admin\\fefey.exe /x" fefey.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Windows\CurrentVersion\Run\fefey = "C:\\Users\\Admin\\fefey.exe /Y" fefey.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Windows\CurrentVersion\Run\fefey = "C:\\Users\\Admin\\fefey.exe /g" fefey.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1648 dea397043eac41a1bca5e5580c4c61d0_NeikiAnalytics.exe 2640 fefey.exe 2640 fefey.exe 2640 fefey.exe 2640 fefey.exe 2640 fefey.exe 2640 fefey.exe 2640 fefey.exe 2640 fefey.exe 2640 fefey.exe 2640 fefey.exe 2640 fefey.exe 2640 fefey.exe 2640 fefey.exe 2640 fefey.exe 2640 fefey.exe 2640 fefey.exe 2640 fefey.exe 2640 fefey.exe 2640 fefey.exe 2640 fefey.exe 2640 fefey.exe 2640 fefey.exe 2640 fefey.exe 2640 fefey.exe 2640 fefey.exe 2640 fefey.exe 2640 fefey.exe 2640 fefey.exe 2640 fefey.exe 2640 fefey.exe 2640 fefey.exe 2640 fefey.exe 2640 fefey.exe 2640 fefey.exe 2640 fefey.exe 2640 fefey.exe 2640 fefey.exe 2640 fefey.exe 2640 fefey.exe 2640 fefey.exe 2640 fefey.exe 2640 fefey.exe 2640 fefey.exe 2640 fefey.exe 2640 fefey.exe 2640 fefey.exe 2640 fefey.exe 2640 fefey.exe 2640 fefey.exe 2640 fefey.exe 2640 fefey.exe 2640 fefey.exe 2640 fefey.exe 2640 fefey.exe 2640 fefey.exe 2640 fefey.exe 2640 fefey.exe 2640 fefey.exe 2640 fefey.exe 2640 fefey.exe 2640 fefey.exe 2640 fefey.exe 2640 fefey.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1648 dea397043eac41a1bca5e5580c4c61d0_NeikiAnalytics.exe 2640 fefey.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1648 wrote to memory of 2640 1648 dea397043eac41a1bca5e5580c4c61d0_NeikiAnalytics.exe 28 PID 1648 wrote to memory of 2640 1648 dea397043eac41a1bca5e5580c4c61d0_NeikiAnalytics.exe 28 PID 1648 wrote to memory of 2640 1648 dea397043eac41a1bca5e5580c4c61d0_NeikiAnalytics.exe 28 PID 1648 wrote to memory of 2640 1648 dea397043eac41a1bca5e5580c4c61d0_NeikiAnalytics.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\dea397043eac41a1bca5e5580c4c61d0_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\dea397043eac41a1bca5e5580c4c61d0_NeikiAnalytics.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1648 -
C:\Users\Admin\fefey.exe"C:\Users\Admin\fefey.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2640
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
132KB
MD5a4e1c968e5bc775e3f6e3803418a0d74
SHA1cbbc3b2cc267733303ad7f6b6e26cd1de706df62
SHA25603312c77dd3f40a3f7938cddf62c80518ef95206ec0d99c99388d1a7bf80eac5
SHA512137cdbf2b8a8b8572e4278c345ecbdc9fb8e7a1fd8ee2411153116b400ee3bf546b491d80f1f59432faf4a12b94d58966a801b64112ba8d4ff07f8c1d5ce53b5