Analysis
-
max time kernel
149s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
17/05/2024, 17:55
Static task
static1
Behavioral task
behavioral1
Sample
128eef13c62f907057675374a28c5ca0_NeikiAnalytics.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
128eef13c62f907057675374a28c5ca0_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
128eef13c62f907057675374a28c5ca0_NeikiAnalytics.exe
-
Size
40KB
-
MD5
128eef13c62f907057675374a28c5ca0
-
SHA1
b020d4f613b5ecfb224a122f16ba112e9bea3677
-
SHA256
e573ddf2987e9db3d19f6166cee22f44c851cd69fa1d4b89232eecdfb2b5940f
-
SHA512
5118491c7f4abe2ce173799aa7155e54cf5d5f83f1d9608d0ef93da92604c61a391f1d89f70101ccf3cba9089a3d98ac9b83e3fbe90bb6ccf6d0a0799be0c10d
-
SSDEEP
768:k/fko/XyGtJk+FBp8F9bdHXtHs7CQpcdHoCCvc:kUAtK+N8F95NWee1vc
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 128eef13c62f907057675374a28c5ca0_NeikiAnalytics.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" Admin.exe -
Executes dropped EXE 1 IoCs
pid Process 2520 Admin.exe -
Loads dropped DLL 2 IoCs
pid Process 1680 128eef13c62f907057675374a28c5ca0_NeikiAnalytics.exe 1680 128eef13c62f907057675374a28c5ca0_NeikiAnalytics.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Run\Admin = "C:\\Users\\Admin\\Admin.exe" 128eef13c62f907057675374a28c5ca0_NeikiAnalytics.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Run\Admin = "C:\\Users\\Admin\\Admin.exe" Admin.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1680 128eef13c62f907057675374a28c5ca0_NeikiAnalytics.exe 1680 128eef13c62f907057675374a28c5ca0_NeikiAnalytics.exe 1680 128eef13c62f907057675374a28c5ca0_NeikiAnalytics.exe 2520 Admin.exe 2520 Admin.exe 2520 Admin.exe 2520 Admin.exe 2520 Admin.exe 2520 Admin.exe 2520 Admin.exe 2520 Admin.exe 2520 Admin.exe 2520 Admin.exe 2520 Admin.exe 2520 Admin.exe 2520 Admin.exe 2520 Admin.exe 2520 Admin.exe 2520 Admin.exe 2520 Admin.exe 2520 Admin.exe 2520 Admin.exe 2520 Admin.exe 2520 Admin.exe 2520 Admin.exe 2520 Admin.exe 2520 Admin.exe 2520 Admin.exe 2520 Admin.exe 2520 Admin.exe 2520 Admin.exe 2520 Admin.exe 2520 Admin.exe 2520 Admin.exe 2520 Admin.exe 2520 Admin.exe 2520 Admin.exe 2520 Admin.exe 2520 Admin.exe 2520 Admin.exe 2520 Admin.exe 2520 Admin.exe 2520 Admin.exe 1680 128eef13c62f907057675374a28c5ca0_NeikiAnalytics.exe 2520 Admin.exe 1680 128eef13c62f907057675374a28c5ca0_NeikiAnalytics.exe 2520 Admin.exe 1680 128eef13c62f907057675374a28c5ca0_NeikiAnalytics.exe 2520 Admin.exe 1680 128eef13c62f907057675374a28c5ca0_NeikiAnalytics.exe 2520 Admin.exe 1680 128eef13c62f907057675374a28c5ca0_NeikiAnalytics.exe 2520 Admin.exe 1680 128eef13c62f907057675374a28c5ca0_NeikiAnalytics.exe 2520 Admin.exe 1680 128eef13c62f907057675374a28c5ca0_NeikiAnalytics.exe 2520 Admin.exe 1680 128eef13c62f907057675374a28c5ca0_NeikiAnalytics.exe 2520 Admin.exe 1680 128eef13c62f907057675374a28c5ca0_NeikiAnalytics.exe 2520 Admin.exe 1680 128eef13c62f907057675374a28c5ca0_NeikiAnalytics.exe 2520 Admin.exe 1680 128eef13c62f907057675374a28c5ca0_NeikiAnalytics.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1680 128eef13c62f907057675374a28c5ca0_NeikiAnalytics.exe 2520 Admin.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1680 wrote to memory of 2520 1680 128eef13c62f907057675374a28c5ca0_NeikiAnalytics.exe 28 PID 1680 wrote to memory of 2520 1680 128eef13c62f907057675374a28c5ca0_NeikiAnalytics.exe 28 PID 1680 wrote to memory of 2520 1680 128eef13c62f907057675374a28c5ca0_NeikiAnalytics.exe 28 PID 1680 wrote to memory of 2520 1680 128eef13c62f907057675374a28c5ca0_NeikiAnalytics.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\128eef13c62f907057675374a28c5ca0_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\128eef13c62f907057675374a28c5ca0_NeikiAnalytics.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1680 -
C:\Users\Admin\Admin.exe"C:\Users\Admin\Admin.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2520
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
40KB
MD585488d4c9b82d949e993892cf5648dd9
SHA19ffeb8f2e0f4b5a992c1552a0d1f4614a2601371
SHA2566e788c3680c9e631eddd68074b3492a2ca3fdbb186d0f70f6757ae35030b4ad7
SHA5120e1dcb2e38e032ac8e46747749324b96c59f3d02947fec14c345f38960248ed85d53c9d25a180b49cb1539376b0a6f16a6a79513156991dd885573eb5867465d