Resubmissions
16/07/2024, 16:17
240716-trljes1akl 1016/07/2024, 16:15
240716-tqbb3azhpn 1017/05/2024, 19:31
240517-x8wmhafa6s 10Analysis
-
max time kernel
115s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
17/05/2024, 19:31
Static task
static1
Behavioral task
behavioral1
Sample
21353d65b457518570bffc8a03038ee0_NeikiAnalytics.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
21353d65b457518570bffc8a03038ee0_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
21353d65b457518570bffc8a03038ee0_NeikiAnalytics.exe
-
Size
6.0MB
-
MD5
21353d65b457518570bffc8a03038ee0
-
SHA1
b0c2e8ff737a4d3c331a5a581f7042eed4f69a9d
-
SHA256
98cc01dcd4c36c47fc13e4853777ca170c734613564a5a764e4d2541a6924d39
-
SHA512
a3a478a92fd5a1762e00f1adcac2d9f8ac8868b82c0e2e3cbddbc441333697d82e079fe3526ae4b67c5a674b4ff39229cb9c85f60f278525346c0f2d8804c282
-
SSDEEP
98304:xCl55swBqKJJLlcu2vwYyCfD8+tetZOVN+zhDH+dYaEoSu:qnBqxlxfD8+tetZYMzNH+dYaHS
Malware Config
Extracted
C:\ProgramData\HOW_TO_RECOVER_FILES.txt
http://embargobe3n5okxyzqphpmk3moinoap2snz5k6765mvtkk7hhi544jid.onion/
http://5ntlvn7lmkezscee2vhatjaigkcu2rzj3bwhqaz32snmqc4jha3gcjad.onion/#/37f1061d6f6281a4598f130979ad77c8
Signatures
-
Modifies boot configuration data using bcdedit 1 TTPs 1 IoCs
pid Process 4396 bcdedit.exe -
Renames multiple (7328) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Drops startup file 1 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\HOW_TO_RECOVER_FILES.txt 21353d65b457518570bffc8a03038ee0_NeikiAnalytics.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates connected drives 3 TTPs 2 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\F: 21353d65b457518570bffc8a03038ee0_NeikiAnalytics.exe File opened (read-only) \??\A: 21353d65b457518570bffc8a03038ee0_NeikiAnalytics.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\VideoLAN\VLC\lua\intf\cli.luac 21353d65b457518570bffc8a03038ee0_NeikiAnalytics.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft Analysis Services\AS OLEDB\140\Cartridges\trdtv2r41.xsl 21353d65b457518570bffc8a03038ee0_NeikiAnalytics.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\THEMES16\CONCRETE\CONCRETE.INF 21353d65b457518570bffc8a03038ee0_NeikiAnalytics.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sign-services-auth\js\nls\root\ui-strings.js 21353d65b457518570bffc8a03038ee0_NeikiAnalytics.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\plugins\tracked-send\js\nls\pt-br\ui-strings.js 21353d65b457518570bffc8a03038ee0_NeikiAnalytics.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\scan-files\images\themeless\Playstore\fi_get.svg 21353d65b457518570bffc8a03038ee0_NeikiAnalytics.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\http\css\ui-lightness\jquery-ui-1.8.13.custom.css 21353d65b457518570bffc8a03038ee0_NeikiAnalytics.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\PAGESIZE\PGLBL121.XML 21353d65b457518570bffc8a03038ee0_NeikiAnalytics.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\LogoImages\OneNoteLogoSmall.scale-140.png 21353d65b457518570bffc8a03038ee0_NeikiAnalytics.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\lib\security\policy\unlimited\local_policy.jar 21353d65b457518570bffc8a03038ee0_NeikiAnalytics.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-recent-files-select\HOW_TO_RECOVER_FILES.txt 21353d65b457518570bffc8a03038ee0_NeikiAnalytics.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\desktop-connector-files\js\nls\ca-es\ui-strings.js 21353d65b457518570bffc8a03038ee0_NeikiAnalytics.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.27\ja\HOW_TO_RECOVER_FILES.txt 21353d65b457518570bffc8a03038ee0_NeikiAnalytics.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\digsig\js\nls\it-it\HOW_TO_RECOVER_FILES.txt 21353d65b457518570bffc8a03038ee0_NeikiAnalytics.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\combinepdf\js\nls\ko-kr\HOW_TO_RECOVER_FILES.txt 21353d65b457518570bffc8a03038ee0_NeikiAnalytics.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\win-scrollbar\themes\dark\vscroll-thumb.png 21353d65b457518570bffc8a03038ee0_NeikiAnalytics.exe File opened for modification C:\Program Files\UpdateAdd.cfg 21353d65b457518570bffc8a03038ee0_NeikiAnalytics.exe File opened for modification C:\Program Files\7-Zip\Lang\cy.txt 21353d65b457518570bffc8a03038ee0_NeikiAnalytics.exe File opened for modification C:\Program Files\7-Zip\Lang\bn.txt 21353d65b457518570bffc8a03038ee0_NeikiAnalytics.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\reviews\js\nls\ar-ae\HOW_TO_RECOVER_FILES.txt 21353d65b457518570bffc8a03038ee0_NeikiAnalytics.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\app-api\dev\app-api.js 21353d65b457518570bffc8a03038ee0_NeikiAnalytics.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ky\LC_MESSAGES\vlc.mo 21353d65b457518570bffc8a03038ee0_NeikiAnalytics.exe File opened for modification C:\Program Files\Microsoft Office\root\Templates\1033\TimeCard.xltx 21353d65b457518570bffc8a03038ee0_NeikiAnalytics.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\PAGESIZE\PGLBL117.XML 21353d65b457518570bffc8a03038ee0_NeikiAnalytics.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\lib\ext\jaccess.jar 21353d65b457518570bffc8a03038ee0_NeikiAnalytics.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sample-files\js\nls\ko-kr\HOW_TO_RECOVER_FILES.txt 21353d65b457518570bffc8a03038ee0_NeikiAnalytics.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\images\themeless\check-mark-2x.png 21353d65b457518570bffc8a03038ee0_NeikiAnalytics.exe File opened for modification C:\Program Files\Google\Chrome\Application\110.0.5481.104\Locales\fil.pak 21353d65b457518570bffc8a03038ee0_NeikiAnalytics.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\O365ProPlusR_Subscription2-ul-oob.xrm-ms 21353d65b457518570bffc8a03038ee0_NeikiAnalytics.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\ob-preview\js\nls\eu-es\ui-strings.js 21353d65b457518570bffc8a03038ee0_NeikiAnalytics.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\fss\img\tools\line.cur 21353d65b457518570bffc8a03038ee0_NeikiAnalytics.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\file_types\aic_file_icons.png 21353d65b457518570bffc8a03038ee0_NeikiAnalytics.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\uk\HOW_TO_RECOVER_FILES.txt 21353d65b457518570bffc8a03038ee0_NeikiAnalytics.exe File opened for modification C:\Program Files\Microsoft Office\PackageManifests\AppXManifest.90160000-00A1-0000-1000-0000000FF1CE.xml 21353d65b457518570bffc8a03038ee0_NeikiAnalytics.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\legal\jdk\thaidict.md 21353d65b457518570bffc8a03038ee0_NeikiAnalytics.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\activity-badge\js\nls\nb-no\ui-strings.js 21353d65b457518570bffc8a03038ee0_NeikiAnalytics.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\exportpdfupsell-app\js\nls\pt-br\ui-strings.js 21353d65b457518570bffc8a03038ee0_NeikiAnalytics.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\MSIPC\HOW_TO_RECOVER_FILES.txt 21353d65b457518570bffc8a03038ee0_NeikiAnalytics.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\Personal2019R_Retail-pl.xrm-ms 21353d65b457518570bffc8a03038ee0_NeikiAnalytics.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX64\Microsoft Analysis Services\AS OLEDB\140\Cartridges\orcl7.xsl 21353d65b457518570bffc8a03038ee0_NeikiAnalytics.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX86\Microsoft Shared\Portal\HOW_TO_RECOVER_FILES.txt 21353d65b457518570bffc8a03038ee0_NeikiAnalytics.exe File opened for modification C:\Program Files\7-Zip\Lang\el.txt 21353d65b457518570bffc8a03038ee0_NeikiAnalytics.exe File opened for modification C:\Program Files\7-Zip\Lang\da.txt 21353d65b457518570bffc8a03038ee0_NeikiAnalytics.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\desktop-connector-files\js\nls\es-es\HOW_TO_RECOVER_FILES.txt 21353d65b457518570bffc8a03038ee0_NeikiAnalytics.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\createpdfupsell-app\js\nls\sl-sl\HOW_TO_RECOVER_FILES.txt 21353d65b457518570bffc8a03038ee0_NeikiAnalytics.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\add-account\js\nls\da-dk\ui-strings.js 21353d65b457518570bffc8a03038ee0_NeikiAnalytics.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\themes\dark\s_signed_out.svg 21353d65b457518570bffc8a03038ee0_NeikiAnalytics.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer-select\js\nls\root\ui-strings.js 21353d65b457518570bffc8a03038ee0_NeikiAnalytics.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\generic-rhp-app\images\themes\dark\example_icons.png 21353d65b457518570bffc8a03038ee0_NeikiAnalytics.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\fa\LC_MESSAGES\vlc.mo 21353d65b457518570bffc8a03038ee0_NeikiAnalytics.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\pkeyconfig-office.xrm-ms 21353d65b457518570bffc8a03038ee0_NeikiAnalytics.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\task-handler\js\nls\ui-strings.js 21353d65b457518570bffc8a03038ee0_NeikiAnalytics.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\createpdfupsell-app\js\nls\ui-strings.js 21353d65b457518570bffc8a03038ee0_NeikiAnalytics.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\hr\LC_MESSAGES\HOW_TO_RECOVER_FILES.txt 21353d65b457518570bffc8a03038ee0_NeikiAnalytics.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\Standard2019VL_MAK_AE-ul-oob.xrm-ms 21353d65b457518570bffc8a03038ee0_NeikiAnalytics.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer-select\js\nls\es-es\ui-strings.js 21353d65b457518570bffc8a03038ee0_NeikiAnalytics.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\app\dev\nls\fr-fr\HOW_TO_RECOVER_FILES.txt 21353d65b457518570bffc8a03038ee0_NeikiAnalytics.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\themes\dark\svgCheckboxUnselected.svg 21353d65b457518570bffc8a03038ee0_NeikiAnalytics.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\hi_contrast\core_icons__retina_hiContrast_bow.png 21353d65b457518570bffc8a03038ee0_NeikiAnalytics.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\sw\LC_MESSAGES\vlc.mo 21353d65b457518570bffc8a03038ee0_NeikiAnalytics.exe File opened for modification C:\Program Files\Microsoft Office\PackageManifests\AppXManifest.90160000-0018-0000-1000-0000000FF1CE.xml 21353d65b457518570bffc8a03038ee0_NeikiAnalytics.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\signatures\js\nls\zh-cn\HOW_TO_RECOVER_FILES.txt 21353d65b457518570bffc8a03038ee0_NeikiAnalytics.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\images\themeless\zh-cn_get.svg 21353d65b457518570bffc8a03038ee0_NeikiAnalytics.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\desktop-connector-files\js\nls\cs-cz\ui-strings.js 21353d65b457518570bffc8a03038ee0_NeikiAnalytics.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Runs ping.exe 1 TTPs 1 IoCs
pid Process 8416 PING.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1280 21353d65b457518570bffc8a03038ee0_NeikiAnalytics.exe 1280 21353d65b457518570bffc8a03038ee0_NeikiAnalytics.exe -
Suspicious use of AdjustPrivilegeToken 7 IoCs
description pid Process Token: SeTakeOwnershipPrivilege 1280 21353d65b457518570bffc8a03038ee0_NeikiAnalytics.exe Token: SeTakeOwnershipPrivilege 1280 21353d65b457518570bffc8a03038ee0_NeikiAnalytics.exe Token: SeTakeOwnershipPrivilege 1280 21353d65b457518570bffc8a03038ee0_NeikiAnalytics.exe Token: SeTakeOwnershipPrivilege 1280 21353d65b457518570bffc8a03038ee0_NeikiAnalytics.exe Token: SeTakeOwnershipPrivilege 1280 21353d65b457518570bffc8a03038ee0_NeikiAnalytics.exe Token: SeTakeOwnershipPrivilege 1280 21353d65b457518570bffc8a03038ee0_NeikiAnalytics.exe Token: SeTakeOwnershipPrivilege 1280 21353d65b457518570bffc8a03038ee0_NeikiAnalytics.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 1280 wrote to memory of 1372 1280 21353d65b457518570bffc8a03038ee0_NeikiAnalytics.exe 82 PID 1280 wrote to memory of 1372 1280 21353d65b457518570bffc8a03038ee0_NeikiAnalytics.exe 82 PID 1372 wrote to memory of 4396 1372 cmd.exe 84 PID 1372 wrote to memory of 4396 1372 cmd.exe 84 PID 1280 wrote to memory of 8740 1280 21353d65b457518570bffc8a03038ee0_NeikiAnalytics.exe 88 PID 1280 wrote to memory of 8740 1280 21353d65b457518570bffc8a03038ee0_NeikiAnalytics.exe 88 PID 1280 wrote to memory of 8740 1280 21353d65b457518570bffc8a03038ee0_NeikiAnalytics.exe 88 PID 8740 wrote to memory of 8416 8740 cmd.exe 90 PID 8740 wrote to memory of 8416 8740 cmd.exe 90 PID 8740 wrote to memory of 8416 8740 cmd.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\21353d65b457518570bffc8a03038ee0_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\21353d65b457518570bffc8a03038ee0_NeikiAnalytics.exe"1⤵
- Drops startup file
- Enumerates connected drives
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1280 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /q /c bcdedit /set {default} recoveryenabled no2⤵
- Suspicious use of WriteProcessMemory
PID:1372 -
C:\Windows\system32\bcdedit.exebcdedit /set {default} recoveryenabled no3⤵
- Modifies boot configuration data using bcdedit
PID:4396
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /q /c ping localhost -n 5 > nul & del C:\Users\Admin\AppData\Local\Temp\21353d65b457518570bffc8a03038ee0_NeikiAnalytics.exe2⤵
- Suspicious use of WriteProcessMemory
PID:8740 -
C:\Windows\SysWOW64\PING.EXEping localhost -n 53⤵
- Runs ping.exe
PID:8416
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5760746c6bc18a85e7503567571fa6d8a
SHA10dfdce0bbc0c3aa4fa0507c40d4c14968fb28834
SHA256a9db836bdbf007aa6b13cfb9ad280be457138db4464990356d682128c3d2a0be
SHA512ff3f665660147120ba66bdbe472841a7f96daa81ca760c36c79cafa8216d5e8eb097f202ebfde5e0dc9ab761fb2ce72b3fb09aa854c872f9961e8f388f097ee7