Analysis
-
max time kernel
150s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
17-05-2024 07:11
Static task
static1
Behavioral task
behavioral1
Sample
cb585c611c5027b7eef337b602f0e700_NeikiAnalytics.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
cb585c611c5027b7eef337b602f0e700_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
cb585c611c5027b7eef337b602f0e700_NeikiAnalytics.exe
-
Size
53KB
-
MD5
cb585c611c5027b7eef337b602f0e700
-
SHA1
76a0215bc3d5dd9daeb91be56f6d973b93a4a0b9
-
SHA256
403222646e3585a1762aae15c6cb2ed028b94183a86c3904163790309c2d8602
-
SHA512
2849782befdb5133d34f17a200ee5cf5e4ba51a6c6cc86f0b86e27f249baf1d5ac10ff77f6c29164fe152bc5764df66314385df893d0eaf38e79f69f42320f19
-
SSDEEP
1536:vNjBg8r8QBs2kdMu7P7Kp3StjEMjmLM3ztDJWZsXy4JzxPMk:l3s2kdMuLJJjmLM3zRJWZsXy4JN
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" duagiis.exe -
Executes dropped EXE 1 IoCs
pid Process 2232 duagiis.exe -
Loads dropped DLL 2 IoCs
pid Process 616 cb585c611c5027b7eef337b602f0e700_NeikiAnalytics.exe 616 cb585c611c5027b7eef337b602f0e700_NeikiAnalytics.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Windows\CurrentVersion\Run\duagiis = "C:\\Users\\Admin\\duagiis.exe" duagiis.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2232 duagiis.exe 2232 duagiis.exe 2232 duagiis.exe 2232 duagiis.exe 2232 duagiis.exe 2232 duagiis.exe 2232 duagiis.exe 2232 duagiis.exe 2232 duagiis.exe 2232 duagiis.exe 2232 duagiis.exe 2232 duagiis.exe 2232 duagiis.exe 2232 duagiis.exe 2232 duagiis.exe 2232 duagiis.exe 2232 duagiis.exe 2232 duagiis.exe 2232 duagiis.exe 2232 duagiis.exe 2232 duagiis.exe 2232 duagiis.exe 2232 duagiis.exe 2232 duagiis.exe 2232 duagiis.exe 2232 duagiis.exe 2232 duagiis.exe 2232 duagiis.exe 2232 duagiis.exe 2232 duagiis.exe 2232 duagiis.exe 2232 duagiis.exe 2232 duagiis.exe 2232 duagiis.exe 2232 duagiis.exe 2232 duagiis.exe 2232 duagiis.exe 2232 duagiis.exe 2232 duagiis.exe 2232 duagiis.exe 2232 duagiis.exe 2232 duagiis.exe 2232 duagiis.exe 2232 duagiis.exe 2232 duagiis.exe 2232 duagiis.exe 2232 duagiis.exe 2232 duagiis.exe 2232 duagiis.exe 2232 duagiis.exe 2232 duagiis.exe 2232 duagiis.exe 2232 duagiis.exe 2232 duagiis.exe 2232 duagiis.exe 2232 duagiis.exe 2232 duagiis.exe 2232 duagiis.exe 2232 duagiis.exe 2232 duagiis.exe 2232 duagiis.exe 2232 duagiis.exe 2232 duagiis.exe 2232 duagiis.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 616 cb585c611c5027b7eef337b602f0e700_NeikiAnalytics.exe 2232 duagiis.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 616 wrote to memory of 2232 616 cb585c611c5027b7eef337b602f0e700_NeikiAnalytics.exe 28 PID 616 wrote to memory of 2232 616 cb585c611c5027b7eef337b602f0e700_NeikiAnalytics.exe 28 PID 616 wrote to memory of 2232 616 cb585c611c5027b7eef337b602f0e700_NeikiAnalytics.exe 28 PID 616 wrote to memory of 2232 616 cb585c611c5027b7eef337b602f0e700_NeikiAnalytics.exe 28 PID 2232 wrote to memory of 616 2232 duagiis.exe 27 PID 2232 wrote to memory of 616 2232 duagiis.exe 27 PID 2232 wrote to memory of 616 2232 duagiis.exe 27 PID 2232 wrote to memory of 616 2232 duagiis.exe 27 PID 2232 wrote to memory of 616 2232 duagiis.exe 27 PID 2232 wrote to memory of 616 2232 duagiis.exe 27 PID 2232 wrote to memory of 616 2232 duagiis.exe 27 PID 2232 wrote to memory of 616 2232 duagiis.exe 27 PID 2232 wrote to memory of 616 2232 duagiis.exe 27 PID 2232 wrote to memory of 616 2232 duagiis.exe 27 PID 2232 wrote to memory of 616 2232 duagiis.exe 27 PID 2232 wrote to memory of 616 2232 duagiis.exe 27 PID 2232 wrote to memory of 616 2232 duagiis.exe 27 PID 2232 wrote to memory of 616 2232 duagiis.exe 27 PID 2232 wrote to memory of 616 2232 duagiis.exe 27 PID 2232 wrote to memory of 616 2232 duagiis.exe 27 PID 2232 wrote to memory of 616 2232 duagiis.exe 27 PID 2232 wrote to memory of 616 2232 duagiis.exe 27 PID 2232 wrote to memory of 616 2232 duagiis.exe 27 PID 2232 wrote to memory of 616 2232 duagiis.exe 27 PID 2232 wrote to memory of 616 2232 duagiis.exe 27 PID 2232 wrote to memory of 616 2232 duagiis.exe 27 PID 2232 wrote to memory of 616 2232 duagiis.exe 27 PID 2232 wrote to memory of 616 2232 duagiis.exe 27 PID 2232 wrote to memory of 616 2232 duagiis.exe 27 PID 2232 wrote to memory of 616 2232 duagiis.exe 27 PID 2232 wrote to memory of 616 2232 duagiis.exe 27 PID 2232 wrote to memory of 616 2232 duagiis.exe 27 PID 2232 wrote to memory of 616 2232 duagiis.exe 27 PID 2232 wrote to memory of 616 2232 duagiis.exe 27 PID 2232 wrote to memory of 616 2232 duagiis.exe 27 PID 2232 wrote to memory of 616 2232 duagiis.exe 27 PID 2232 wrote to memory of 616 2232 duagiis.exe 27 PID 2232 wrote to memory of 616 2232 duagiis.exe 27 PID 2232 wrote to memory of 616 2232 duagiis.exe 27 PID 2232 wrote to memory of 616 2232 duagiis.exe 27 PID 2232 wrote to memory of 616 2232 duagiis.exe 27 PID 2232 wrote to memory of 616 2232 duagiis.exe 27 PID 2232 wrote to memory of 616 2232 duagiis.exe 27 PID 2232 wrote to memory of 616 2232 duagiis.exe 27 PID 2232 wrote to memory of 616 2232 duagiis.exe 27 PID 2232 wrote to memory of 616 2232 duagiis.exe 27 PID 2232 wrote to memory of 616 2232 duagiis.exe 27 PID 2232 wrote to memory of 616 2232 duagiis.exe 27 PID 2232 wrote to memory of 616 2232 duagiis.exe 27 PID 2232 wrote to memory of 616 2232 duagiis.exe 27 PID 2232 wrote to memory of 616 2232 duagiis.exe 27 PID 2232 wrote to memory of 616 2232 duagiis.exe 27 PID 2232 wrote to memory of 616 2232 duagiis.exe 27 PID 2232 wrote to memory of 616 2232 duagiis.exe 27 PID 2232 wrote to memory of 616 2232 duagiis.exe 27 PID 2232 wrote to memory of 616 2232 duagiis.exe 27 PID 2232 wrote to memory of 616 2232 duagiis.exe 27 PID 2232 wrote to memory of 616 2232 duagiis.exe 27 PID 2232 wrote to memory of 616 2232 duagiis.exe 27 PID 2232 wrote to memory of 616 2232 duagiis.exe 27 PID 2232 wrote to memory of 616 2232 duagiis.exe 27 PID 2232 wrote to memory of 616 2232 duagiis.exe 27 PID 2232 wrote to memory of 616 2232 duagiis.exe 27 PID 2232 wrote to memory of 616 2232 duagiis.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\cb585c611c5027b7eef337b602f0e700_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\cb585c611c5027b7eef337b602f0e700_NeikiAnalytics.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:616 -
C:\Users\Admin\duagiis.exe"C:\Users\Admin\duagiis.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2232
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
53KB
MD500ee52422b3cbe19aaffaad21720ffe6
SHA1a268b9135175ced24b7ae0945cf63eb9eebcdd40
SHA256e44a68d6d32bf8fc673e1878505f514f652eec63651549bc20ab5193d766a853
SHA512013ce1e4c290f3768faad69765ec3f6119796a7fcf4857c5f81fd43a228f983d572ca227ee2bb042d76d75a4e49f6055f044fea3caa7609d6f71fdc1743cc490