Analysis
-
max time kernel
149s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
16-05-2024 16:24
Static task
static1
Behavioral task
behavioral1
Sample
e501c569136c26be41c69e6f059abc20_NeikiAnalytics.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
e501c569136c26be41c69e6f059abc20_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
e501c569136c26be41c69e6f059abc20_NeikiAnalytics.exe
-
Size
4.1MB
-
MD5
e501c569136c26be41c69e6f059abc20
-
SHA1
8f1e0b52f4676326c829aa20e745f217a94b11e2
-
SHA256
ef239bcf65c1d9dbd161b29258dd0e199a0c7b0e69391e58d34c9d53e20f4653
-
SHA512
ed1e08cdb39faa0dd0f54e8e0ab68862b93e621db129750c7ad0a7f09eda33a5606953cf5b5e9f8fea84aa4b2ee6c057d4d213fba9e7abf93e9b4410c592e350
-
SSDEEP
98304:+R0pI/IQlUoMPdmpSpz4ADtnkgvNWlw6aTfN41v:+R0pIAQhMPdmI5n9klRKN41v
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1300 xdobec.exe -
Loads dropped DLL 1 IoCs
pid Process 2308 e501c569136c26be41c69e6f059abc20_NeikiAnalytics.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\Parametr = "C:\\FilesIF\\xdobec.exe" e501c569136c26be41c69e6f059abc20_NeikiAnalytics.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\Parametr = "C:\\Mint3P\\bodxsys.exe" e501c569136c26be41c69e6f059abc20_NeikiAnalytics.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2308 e501c569136c26be41c69e6f059abc20_NeikiAnalytics.exe 2308 e501c569136c26be41c69e6f059abc20_NeikiAnalytics.exe 1300 xdobec.exe 2308 e501c569136c26be41c69e6f059abc20_NeikiAnalytics.exe 1300 xdobec.exe 2308 e501c569136c26be41c69e6f059abc20_NeikiAnalytics.exe 1300 xdobec.exe 2308 e501c569136c26be41c69e6f059abc20_NeikiAnalytics.exe 1300 xdobec.exe 2308 e501c569136c26be41c69e6f059abc20_NeikiAnalytics.exe 1300 xdobec.exe 2308 e501c569136c26be41c69e6f059abc20_NeikiAnalytics.exe 1300 xdobec.exe 2308 e501c569136c26be41c69e6f059abc20_NeikiAnalytics.exe 1300 xdobec.exe 2308 e501c569136c26be41c69e6f059abc20_NeikiAnalytics.exe 1300 xdobec.exe 2308 e501c569136c26be41c69e6f059abc20_NeikiAnalytics.exe 1300 xdobec.exe 2308 e501c569136c26be41c69e6f059abc20_NeikiAnalytics.exe 1300 xdobec.exe 2308 e501c569136c26be41c69e6f059abc20_NeikiAnalytics.exe 1300 xdobec.exe 2308 e501c569136c26be41c69e6f059abc20_NeikiAnalytics.exe 1300 xdobec.exe 2308 e501c569136c26be41c69e6f059abc20_NeikiAnalytics.exe 1300 xdobec.exe 2308 e501c569136c26be41c69e6f059abc20_NeikiAnalytics.exe 1300 xdobec.exe 2308 e501c569136c26be41c69e6f059abc20_NeikiAnalytics.exe 1300 xdobec.exe 2308 e501c569136c26be41c69e6f059abc20_NeikiAnalytics.exe 1300 xdobec.exe 2308 e501c569136c26be41c69e6f059abc20_NeikiAnalytics.exe 1300 xdobec.exe 2308 e501c569136c26be41c69e6f059abc20_NeikiAnalytics.exe 1300 xdobec.exe 2308 e501c569136c26be41c69e6f059abc20_NeikiAnalytics.exe 1300 xdobec.exe 2308 e501c569136c26be41c69e6f059abc20_NeikiAnalytics.exe 1300 xdobec.exe 2308 e501c569136c26be41c69e6f059abc20_NeikiAnalytics.exe 1300 xdobec.exe 2308 e501c569136c26be41c69e6f059abc20_NeikiAnalytics.exe 1300 xdobec.exe 2308 e501c569136c26be41c69e6f059abc20_NeikiAnalytics.exe 1300 xdobec.exe 2308 e501c569136c26be41c69e6f059abc20_NeikiAnalytics.exe 1300 xdobec.exe 2308 e501c569136c26be41c69e6f059abc20_NeikiAnalytics.exe 1300 xdobec.exe 2308 e501c569136c26be41c69e6f059abc20_NeikiAnalytics.exe 1300 xdobec.exe 2308 e501c569136c26be41c69e6f059abc20_NeikiAnalytics.exe 1300 xdobec.exe 2308 e501c569136c26be41c69e6f059abc20_NeikiAnalytics.exe 1300 xdobec.exe 2308 e501c569136c26be41c69e6f059abc20_NeikiAnalytics.exe 1300 xdobec.exe 2308 e501c569136c26be41c69e6f059abc20_NeikiAnalytics.exe 1300 xdobec.exe 2308 e501c569136c26be41c69e6f059abc20_NeikiAnalytics.exe 1300 xdobec.exe 2308 e501c569136c26be41c69e6f059abc20_NeikiAnalytics.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2308 wrote to memory of 1300 2308 e501c569136c26be41c69e6f059abc20_NeikiAnalytics.exe 28 PID 2308 wrote to memory of 1300 2308 e501c569136c26be41c69e6f059abc20_NeikiAnalytics.exe 28 PID 2308 wrote to memory of 1300 2308 e501c569136c26be41c69e6f059abc20_NeikiAnalytics.exe 28 PID 2308 wrote to memory of 1300 2308 e501c569136c26be41c69e6f059abc20_NeikiAnalytics.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\e501c569136c26be41c69e6f059abc20_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\e501c569136c26be41c69e6f059abc20_NeikiAnalytics.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2308 -
C:\FilesIF\xdobec.exeC:\FilesIF\xdobec.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:1300
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4.1MB
MD533e39165e0c39c2500e769c498738fbd
SHA124d1503b3ae38b303deb2479f15c52e7ac39e20e
SHA256d0de7bb9d10f4ea8006ef8545fff19828f709fadf51e46f1f09333042c95a9a1
SHA512ac4dc6c2f0a6314e1067949f423d3f312e58c939ecc27a94955a93493722f6e91ccc8369b90e5bcf92987d115846008eeb84301ee8bee65aaa7614fc5cb74918
-
Filesize
199B
MD5ade152b4ba44a63d0614584c98e4f3dd
SHA1e77547ba0d4fe52a006307ade632d32cdae07adf
SHA2566d15bba21e57d533751f8f5f1e18f87f8e80f6bdc3f450696b2ad01fd96fd3c0
SHA5125e38a4fa31244830a66d30bba63fb97d3b2b629a263d52d446588aa19a83cdcdea91d7c717ae36ac1ae25e5a8feb4d162ae6bff28e0ad9c60c305eab900f11ae
-
Filesize
4.1MB
MD5b897c444f233086be0974d9e16f7cf35
SHA116beaa383c322a9e6ecd3e44ca8d599b98a8fb8d
SHA256fd09124bfde15fe433c86a6551186edfde146dfb1f1d3a74779a1aebb47f5408
SHA5126c184b876b0e02d2c0835da3a32ee5dad3b4c753cc79e3d1e7f226123d3975bf3603732e07fde6f690251c838406b2b16d6f5d476b03b5717d06e2efb1d5b6eb