Analysis
-
max time kernel
149s -
max time network
137s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
17-05-2024 09:43
Static task
static1
Behavioral task
behavioral1
Sample
e7cbbc8dd2fb767b462a04c442078ff0_NeikiAnalytics.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
e7cbbc8dd2fb767b462a04c442078ff0_NeikiAnalytics.exe
Resource
win10v2004-20240426-en
General
-
Target
e7cbbc8dd2fb767b462a04c442078ff0_NeikiAnalytics.exe
-
Size
116KB
-
MD5
e7cbbc8dd2fb767b462a04c442078ff0
-
SHA1
575c7119d8947e31b65c5c28fd1b790b98660d07
-
SHA256
67ec8d928636d51ec6cfc6ce0dd87e8c61b7f4f224a9301d478bb0b932cf27a1
-
SHA512
d3d4a4f85ab1b6fcfb902c610e1ae19e48b76b47e8b4c6eacd1c7736ba85753f7ca6047074764a4ef4c1616b4092568e7c4e5e0029305bb38099af7bd793c8e4
-
SSDEEP
1536:GTJghTadSz0Ojs8koyAFx57YjHzZ5oFDChQHy4ktJs:CC4ozfjMLdjHzbochayJs
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" e7cbbc8dd2fb767b462a04c442078ff0_NeikiAnalytics.exe Set value (int) \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" woizoj.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\Control Panel\International\Geo\Nation e7cbbc8dd2fb767b462a04c442078ff0_NeikiAnalytics.exe -
Executes dropped EXE 1 IoCs
pid Process 3144 woizoj.exe -
Adds Run key to start application 2 TTPs 26 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\woizoj = "C:\\Users\\Admin\\woizoj.exe /s" woizoj.exe Set value (str) \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\woizoj = "C:\\Users\\Admin\\woizoj.exe /u" woizoj.exe Set value (str) \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\woizoj = "C:\\Users\\Admin\\woizoj.exe /k" woizoj.exe Set value (str) \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\woizoj = "C:\\Users\\Admin\\woizoj.exe /p" woizoj.exe Set value (str) \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\woizoj = "C:\\Users\\Admin\\woizoj.exe /a" woizoj.exe Set value (str) \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\woizoj = "C:\\Users\\Admin\\woizoj.exe /x" woizoj.exe Set value (str) \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\woizoj = "C:\\Users\\Admin\\woizoj.exe /q" woizoj.exe Set value (str) \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\woizoj = "C:\\Users\\Admin\\woizoj.exe /b" e7cbbc8dd2fb767b462a04c442078ff0_NeikiAnalytics.exe Set value (str) \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\woizoj = "C:\\Users\\Admin\\woizoj.exe /t" woizoj.exe Set value (str) \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\woizoj = "C:\\Users\\Admin\\woizoj.exe /h" woizoj.exe Set value (str) \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\woizoj = "C:\\Users\\Admin\\woizoj.exe /w" woizoj.exe Set value (str) \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\woizoj = "C:\\Users\\Admin\\woizoj.exe /o" woizoj.exe Set value (str) \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\woizoj = "C:\\Users\\Admin\\woizoj.exe /f" woizoj.exe Set value (str) \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\woizoj = "C:\\Users\\Admin\\woizoj.exe /j" woizoj.exe Set value (str) \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\woizoj = "C:\\Users\\Admin\\woizoj.exe /c" woizoj.exe Set value (str) \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\woizoj = "C:\\Users\\Admin\\woizoj.exe /n" woizoj.exe Set value (str) \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\woizoj = "C:\\Users\\Admin\\woizoj.exe /m" woizoj.exe Set value (str) \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\woizoj = "C:\\Users\\Admin\\woizoj.exe /e" woizoj.exe Set value (str) \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\woizoj = "C:\\Users\\Admin\\woizoj.exe /z" woizoj.exe Set value (str) \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\woizoj = "C:\\Users\\Admin\\woizoj.exe /d" woizoj.exe Set value (str) \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\woizoj = "C:\\Users\\Admin\\woizoj.exe /y" woizoj.exe Set value (str) \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\woizoj = "C:\\Users\\Admin\\woizoj.exe /b" woizoj.exe Set value (str) \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\woizoj = "C:\\Users\\Admin\\woizoj.exe /i" woizoj.exe Set value (str) \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\woizoj = "C:\\Users\\Admin\\woizoj.exe /v" woizoj.exe Set value (str) \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\woizoj = "C:\\Users\\Admin\\woizoj.exe /l" woizoj.exe Set value (str) \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\woizoj = "C:\\Users\\Admin\\woizoj.exe /g" woizoj.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4488 e7cbbc8dd2fb767b462a04c442078ff0_NeikiAnalytics.exe 4488 e7cbbc8dd2fb767b462a04c442078ff0_NeikiAnalytics.exe 3144 woizoj.exe 3144 woizoj.exe 3144 woizoj.exe 3144 woizoj.exe 3144 woizoj.exe 3144 woizoj.exe 3144 woizoj.exe 3144 woizoj.exe 3144 woizoj.exe 3144 woizoj.exe 3144 woizoj.exe 3144 woizoj.exe 3144 woizoj.exe 3144 woizoj.exe 3144 woizoj.exe 3144 woizoj.exe 3144 woizoj.exe 3144 woizoj.exe 3144 woizoj.exe 3144 woizoj.exe 3144 woizoj.exe 3144 woizoj.exe 3144 woizoj.exe 3144 woizoj.exe 3144 woizoj.exe 3144 woizoj.exe 3144 woizoj.exe 3144 woizoj.exe 3144 woizoj.exe 3144 woizoj.exe 3144 woizoj.exe 3144 woizoj.exe 3144 woizoj.exe 3144 woizoj.exe 3144 woizoj.exe 3144 woizoj.exe 3144 woizoj.exe 3144 woizoj.exe 3144 woizoj.exe 3144 woizoj.exe 3144 woizoj.exe 3144 woizoj.exe 3144 woizoj.exe 3144 woizoj.exe 3144 woizoj.exe 3144 woizoj.exe 3144 woizoj.exe 3144 woizoj.exe 3144 woizoj.exe 3144 woizoj.exe 3144 woizoj.exe 3144 woizoj.exe 3144 woizoj.exe 3144 woizoj.exe 3144 woizoj.exe 3144 woizoj.exe 3144 woizoj.exe 3144 woizoj.exe 3144 woizoj.exe 3144 woizoj.exe 3144 woizoj.exe 3144 woizoj.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4488 e7cbbc8dd2fb767b462a04c442078ff0_NeikiAnalytics.exe 3144 woizoj.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4488 wrote to memory of 3144 4488 e7cbbc8dd2fb767b462a04c442078ff0_NeikiAnalytics.exe 96 PID 4488 wrote to memory of 3144 4488 e7cbbc8dd2fb767b462a04c442078ff0_NeikiAnalytics.exe 96 PID 4488 wrote to memory of 3144 4488 e7cbbc8dd2fb767b462a04c442078ff0_NeikiAnalytics.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\e7cbbc8dd2fb767b462a04c442078ff0_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\e7cbbc8dd2fb767b462a04c442078ff0_NeikiAnalytics.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4488 -
C:\Users\Admin\woizoj.exe"C:\Users\Admin\woizoj.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3144
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
116KB
MD558f989c00677eadc68c2e84de50f47ac
SHA1ea1e9a068a8ba0b61338624ce191cbd55c559301
SHA2567b64bd6bfb13d038013e180077e1ee0a74c3b8d07e9703e5787677382ce9e869
SHA512a38b071d36e1cd2f7d4f5f21686119a5fdba4bd2b44511f473f7ea9ba673049d9066c903c5caa3292fed8bd7f31acf16f920b9c8c12765742b3b7f6278efd9ad