Analysis
-
max time kernel
122s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
18-05-2024 22:09
Static task
static1
Behavioral task
behavioral1
Sample
0e8acf4f2931765ede72461518632120_NeikiAnalytics.exe
Resource
win7-20240221-en
General
-
Target
0e8acf4f2931765ede72461518632120_NeikiAnalytics.exe
-
Size
176KB
-
MD5
0e8acf4f2931765ede72461518632120
-
SHA1
f5d5c4b54584014c1c5d6c8b7f936e286b2d86b1
-
SHA256
5fbdf8ec2016bd1182896f1dda346d12af71fb3fbfdca4ae7f9d0266151dbd2e
-
SHA512
99e8819ae3ef4a27de5a1faab97407e90f4a2f67b9ab5228a3c79dd6e6fb2ab0bc0041e77134f3fe6820557d1c063378227bbc47d09433fa0bb5a28bf43ae8a3
-
SSDEEP
3072:kVJvcLqR7QAJJ+JwBVWWvMaRDr0td4LVXA:ZLq1nvRDr+d4JA
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
http://www.klkjwre9fqwieluoi.info/
http://kukutrustnet777888.info/
Signatures
-
Modifies firewall policy service 2 TTPs 3 IoCs
Processes:
0e8acf4f2931765ede72461518632120_NeikiAnalytics.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" 0e8acf4f2931765ede72461518632120_NeikiAnalytics.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" 0e8acf4f2931765ede72461518632120_NeikiAnalytics.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "1" 0e8acf4f2931765ede72461518632120_NeikiAnalytics.exe -
Processes:
0e8acf4f2931765ede72461518632120_NeikiAnalytics.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 0e8acf4f2931765ede72461518632120_NeikiAnalytics.exe -
Processes:
0e8acf4f2931765ede72461518632120_NeikiAnalytics.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" 0e8acf4f2931765ede72461518632120_NeikiAnalytics.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" 0e8acf4f2931765ede72461518632120_NeikiAnalytics.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" 0e8acf4f2931765ede72461518632120_NeikiAnalytics.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" 0e8acf4f2931765ede72461518632120_NeikiAnalytics.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" 0e8acf4f2931765ede72461518632120_NeikiAnalytics.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" 0e8acf4f2931765ede72461518632120_NeikiAnalytics.exe -
Executes dropped EXE 3 IoCs
Processes:
Fun.exeSVIQ.EXEdc.exepid process 2584 Fun.exe 2428 SVIQ.EXE 3044 dc.exe -
Loads dropped DLL 2 IoCs
Processes:
0e8acf4f2931765ede72461518632120_NeikiAnalytics.exepid process 1284 0e8acf4f2931765ede72461518632120_NeikiAnalytics.exe 1284 0e8acf4f2931765ede72461518632120_NeikiAnalytics.exe -
Processes:
resource yara_rule behavioral1/memory/1284-1-0x00000000027C0000-0x000000000384E000-memory.dmp upx behavioral1/memory/1284-4-0x00000000027C0000-0x000000000384E000-memory.dmp upx behavioral1/memory/1284-6-0x00000000027C0000-0x000000000384E000-memory.dmp upx behavioral1/memory/1284-10-0x00000000027C0000-0x000000000384E000-memory.dmp upx behavioral1/memory/1284-8-0x00000000027C0000-0x000000000384E000-memory.dmp upx behavioral1/memory/1284-31-0x00000000027C0000-0x000000000384E000-memory.dmp upx behavioral1/memory/1284-29-0x00000000027C0000-0x000000000384E000-memory.dmp upx behavioral1/memory/1284-7-0x00000000027C0000-0x000000000384E000-memory.dmp upx behavioral1/memory/1284-30-0x00000000027C0000-0x000000000384E000-memory.dmp upx behavioral1/memory/1284-9-0x00000000027C0000-0x000000000384E000-memory.dmp upx behavioral1/memory/1284-48-0x00000000027C0000-0x000000000384E000-memory.dmp upx behavioral1/memory/1284-50-0x00000000027C0000-0x000000000384E000-memory.dmp upx behavioral1/memory/1284-75-0x00000000027C0000-0x000000000384E000-memory.dmp upx behavioral1/memory/1284-83-0x00000000027C0000-0x000000000384E000-memory.dmp upx behavioral1/memory/1284-82-0x00000000027C0000-0x000000000384E000-memory.dmp upx behavioral1/memory/1284-85-0x00000000027C0000-0x000000000384E000-memory.dmp upx behavioral1/memory/1284-86-0x00000000027C0000-0x000000000384E000-memory.dmp upx behavioral1/memory/1284-88-0x00000000027C0000-0x000000000384E000-memory.dmp upx behavioral1/memory/1284-89-0x00000000027C0000-0x000000000384E000-memory.dmp upx behavioral1/memory/1284-92-0x00000000027C0000-0x000000000384E000-memory.dmp upx behavioral1/memory/1284-119-0x00000000027C0000-0x000000000384E000-memory.dmp upx behavioral1/memory/1284-118-0x00000000027C0000-0x000000000384E000-memory.dmp upx behavioral1/memory/1284-122-0x00000000027C0000-0x000000000384E000-memory.dmp upx behavioral1/memory/1284-124-0x00000000027C0000-0x000000000384E000-memory.dmp upx -
Processes:
0e8acf4f2931765ede72461518632120_NeikiAnalytics.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" 0e8acf4f2931765ede72461518632120_NeikiAnalytics.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" 0e8acf4f2931765ede72461518632120_NeikiAnalytics.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" 0e8acf4f2931765ede72461518632120_NeikiAnalytics.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" 0e8acf4f2931765ede72461518632120_NeikiAnalytics.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" 0e8acf4f2931765ede72461518632120_NeikiAnalytics.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" 0e8acf4f2931765ede72461518632120_NeikiAnalytics.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\Svc 0e8acf4f2931765ede72461518632120_NeikiAnalytics.exe -
Adds Run key to start application 2 TTPs 12 IoCs
Processes:
dc.exe0e8acf4f2931765ede72461518632120_NeikiAnalytics.exeSVIQ.EXEFun.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\dc2k5 = "C:\\WINDOWS\\SVIQ.EXE" dc.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\dc = "C:\\WINDOWS\\dc.exe" 0e8acf4f2931765ede72461518632120_NeikiAnalytics.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\Fun = "C:\\WINDOWS\\system\\Fun.exe" SVIQ.EXE Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\dc2k5 = "C:\\WINDOWS\\SVIQ.EXE" Fun.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\dc2k5 = "C:\\WINDOWS\\SVIQ.EXE" SVIQ.EXE Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\Fun = "C:\\WINDOWS\\system\\Fun.exe" Fun.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\dc = "C:\\WINDOWS\\dc.exe" Fun.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\dc = "C:\\WINDOWS\\dc.exe" SVIQ.EXE Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\Fun = "C:\\WINDOWS\\system\\Fun.exe" dc.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\dc = "C:\\WINDOWS\\dc.exe" dc.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\dc2k5 = "C:\\WINDOWS\\SVIQ.EXE" 0e8acf4f2931765ede72461518632120_NeikiAnalytics.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\Fun = "C:\\WINDOWS\\system\\Fun.exe" 0e8acf4f2931765ede72461518632120_NeikiAnalytics.exe -
Processes:
0e8acf4f2931765ede72461518632120_NeikiAnalytics.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 0e8acf4f2931765ede72461518632120_NeikiAnalytics.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
0e8acf4f2931765ede72461518632120_NeikiAnalytics.exedescription ioc process File opened (read-only) \??\I: 0e8acf4f2931765ede72461518632120_NeikiAnalytics.exe File opened (read-only) \??\W: 0e8acf4f2931765ede72461518632120_NeikiAnalytics.exe File opened (read-only) \??\G: 0e8acf4f2931765ede72461518632120_NeikiAnalytics.exe File opened (read-only) \??\N: 0e8acf4f2931765ede72461518632120_NeikiAnalytics.exe File opened (read-only) \??\U: 0e8acf4f2931765ede72461518632120_NeikiAnalytics.exe File opened (read-only) \??\Y: 0e8acf4f2931765ede72461518632120_NeikiAnalytics.exe File opened (read-only) \??\J: 0e8acf4f2931765ede72461518632120_NeikiAnalytics.exe File opened (read-only) \??\K: 0e8acf4f2931765ede72461518632120_NeikiAnalytics.exe File opened (read-only) \??\M: 0e8acf4f2931765ede72461518632120_NeikiAnalytics.exe File opened (read-only) \??\O: 0e8acf4f2931765ede72461518632120_NeikiAnalytics.exe File opened (read-only) \??\R: 0e8acf4f2931765ede72461518632120_NeikiAnalytics.exe File opened (read-only) \??\X: 0e8acf4f2931765ede72461518632120_NeikiAnalytics.exe File opened (read-only) \??\E: 0e8acf4f2931765ede72461518632120_NeikiAnalytics.exe File opened (read-only) \??\H: 0e8acf4f2931765ede72461518632120_NeikiAnalytics.exe File opened (read-only) \??\L: 0e8acf4f2931765ede72461518632120_NeikiAnalytics.exe File opened (read-only) \??\P: 0e8acf4f2931765ede72461518632120_NeikiAnalytics.exe File opened (read-only) \??\Q: 0e8acf4f2931765ede72461518632120_NeikiAnalytics.exe File opened (read-only) \??\S: 0e8acf4f2931765ede72461518632120_NeikiAnalytics.exe File opened (read-only) \??\T: 0e8acf4f2931765ede72461518632120_NeikiAnalytics.exe File opened (read-only) \??\V: 0e8acf4f2931765ede72461518632120_NeikiAnalytics.exe File opened (read-only) \??\Z: 0e8acf4f2931765ede72461518632120_NeikiAnalytics.exe -
Drops autorun.inf file 1 TTPs 2 IoCs
Malware can abuse Windows Autorun to spread further via attached volumes.
Processes:
0e8acf4f2931765ede72461518632120_NeikiAnalytics.exedescription ioc process File opened for modification C:\autorun.inf 0e8acf4f2931765ede72461518632120_NeikiAnalytics.exe File opened for modification F:\autorun.inf 0e8acf4f2931765ede72461518632120_NeikiAnalytics.exe -
Drops file in Program Files directory 5 IoCs
Processes:
0e8acf4f2931765ede72461518632120_NeikiAnalytics.exedescription ioc process File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\BCSSync.exe 0e8acf4f2931765ede72461518632120_NeikiAnalytics.exe File opened for modification C:\PROGRAM FILES\7-ZIP\7z.exe 0e8acf4f2931765ede72461518632120_NeikiAnalytics.exe File opened for modification C:\PROGRAM FILES\7-ZIP\7zFM.exe 0e8acf4f2931765ede72461518632120_NeikiAnalytics.exe File opened for modification C:\PROGRAM FILES\7-ZIP\7zG.exe 0e8acf4f2931765ede72461518632120_NeikiAnalytics.exe File opened for modification C:\PROGRAM FILES\7-ZIP\Uninstall.exe 0e8acf4f2931765ede72461518632120_NeikiAnalytics.exe -
Drops file in Windows directory 21 IoCs
Processes:
0e8acf4f2931765ede72461518632120_NeikiAnalytics.exeFun.exeSVIQ.EXEdc.exedescription ioc process File opened for modification C:\Windows\SYSTEM.INI 0e8acf4f2931765ede72461518632120_NeikiAnalytics.exe File created C:\WINDOWS\SVIQ.EXE 0e8acf4f2931765ede72461518632120_NeikiAnalytics.exe File opened for modification C:\WINDOWS\dc.exe Fun.exe File created C:\WINDOWS\system\Fun.exe SVIQ.EXE File created C:\WINDOWS\SVIQ.EXE SVIQ.EXE File opened for modification C:\WINDOWS\dc.exe dc.exe File created C:\WINDOWS\dc.exe 0e8acf4f2931765ede72461518632120_NeikiAnalytics.exe File opened for modification C:\WINDOWS\SVIQ.EXE 0e8acf4f2931765ede72461518632120_NeikiAnalytics.exe File opened for modification C:\WINDOWS\SVIQ.EXE Fun.exe File created C:\WINDOWS\dc.exe dc.exe File created C:\WINDOWS\SVIQ.EXE dc.exe File created C:\WINDOWS\system\Fun.exe 0e8acf4f2931765ede72461518632120_NeikiAnalytics.exe File opened for modification C:\WINDOWS\system\Fun.exe 0e8acf4f2931765ede72461518632120_NeikiAnalytics.exe File opened for modification C:\WINDOWS\dc.exe 0e8acf4f2931765ede72461518632120_NeikiAnalytics.exe File created C:\WINDOWS\system\Fun.exe Fun.exe File opened for modification C:\WINDOWS\dc.exe SVIQ.EXE File opened for modification C:\WINDOWS\system\Fun.exe Fun.exe File opened for modification C:\WINDOWS\system\Fun.exe SVIQ.EXE File opened for modification C:\WINDOWS\SVIQ.exe SVIQ.EXE File opened for modification C:\WINDOWS\system\Fun.exe dc.exe File created C:\WINDOWS\system\Fun.exe dc.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
0e8acf4f2931765ede72461518632120_NeikiAnalytics.exeFun.exeSVIQ.EXEdc.exepid process 1284 0e8acf4f2931765ede72461518632120_NeikiAnalytics.exe 1284 0e8acf4f2931765ede72461518632120_NeikiAnalytics.exe 2584 Fun.exe 2428 SVIQ.EXE 3044 dc.exe 1284 0e8acf4f2931765ede72461518632120_NeikiAnalytics.exe 2584 Fun.exe 2428 SVIQ.EXE 3044 dc.exe 1284 0e8acf4f2931765ede72461518632120_NeikiAnalytics.exe 2584 Fun.exe 2428 SVIQ.EXE 3044 dc.exe 1284 0e8acf4f2931765ede72461518632120_NeikiAnalytics.exe 2584 Fun.exe 2428 SVIQ.EXE 3044 dc.exe 1284 0e8acf4f2931765ede72461518632120_NeikiAnalytics.exe 2584 Fun.exe 1284 0e8acf4f2931765ede72461518632120_NeikiAnalytics.exe 2428 SVIQ.EXE 3044 dc.exe 2584 Fun.exe 1284 0e8acf4f2931765ede72461518632120_NeikiAnalytics.exe 2428 SVIQ.EXE 3044 dc.exe 1284 0e8acf4f2931765ede72461518632120_NeikiAnalytics.exe 2584 Fun.exe 2428 SVIQ.EXE 3044 dc.exe 1284 0e8acf4f2931765ede72461518632120_NeikiAnalytics.exe 2584 Fun.exe 2428 SVIQ.EXE 3044 dc.exe 2584 Fun.exe 1284 0e8acf4f2931765ede72461518632120_NeikiAnalytics.exe 2428 SVIQ.EXE 3044 dc.exe 1284 0e8acf4f2931765ede72461518632120_NeikiAnalytics.exe 2584 Fun.exe 1284 0e8acf4f2931765ede72461518632120_NeikiAnalytics.exe 2428 SVIQ.EXE 3044 dc.exe 2584 Fun.exe 1284 0e8acf4f2931765ede72461518632120_NeikiAnalytics.exe 2428 SVIQ.EXE 3044 dc.exe 2584 Fun.exe 1284 0e8acf4f2931765ede72461518632120_NeikiAnalytics.exe 2428 SVIQ.EXE 3044 dc.exe 2584 Fun.exe 1284 0e8acf4f2931765ede72461518632120_NeikiAnalytics.exe 2428 SVIQ.EXE 3044 dc.exe 2584 Fun.exe 1284 0e8acf4f2931765ede72461518632120_NeikiAnalytics.exe 2428 SVIQ.EXE 3044 dc.exe 1284 0e8acf4f2931765ede72461518632120_NeikiAnalytics.exe 2584 Fun.exe 1284 0e8acf4f2931765ede72461518632120_NeikiAnalytics.exe 2428 SVIQ.EXE 3044 dc.exe -
Suspicious use of AdjustPrivilegeToken 30 IoCs
Processes:
0e8acf4f2931765ede72461518632120_NeikiAnalytics.exedescription pid process Token: SeDebugPrivilege 1284 0e8acf4f2931765ede72461518632120_NeikiAnalytics.exe Token: SeDebugPrivilege 1284 0e8acf4f2931765ede72461518632120_NeikiAnalytics.exe Token: SeDebugPrivilege 1284 0e8acf4f2931765ede72461518632120_NeikiAnalytics.exe Token: SeDebugPrivilege 1284 0e8acf4f2931765ede72461518632120_NeikiAnalytics.exe Token: SeDebugPrivilege 1284 0e8acf4f2931765ede72461518632120_NeikiAnalytics.exe Token: SeDebugPrivilege 1284 0e8acf4f2931765ede72461518632120_NeikiAnalytics.exe Token: SeDebugPrivilege 1284 0e8acf4f2931765ede72461518632120_NeikiAnalytics.exe Token: SeDebugPrivilege 1284 0e8acf4f2931765ede72461518632120_NeikiAnalytics.exe Token: SeDebugPrivilege 1284 0e8acf4f2931765ede72461518632120_NeikiAnalytics.exe Token: SeDebugPrivilege 1284 0e8acf4f2931765ede72461518632120_NeikiAnalytics.exe Token: SeDebugPrivilege 1284 0e8acf4f2931765ede72461518632120_NeikiAnalytics.exe Token: SeDebugPrivilege 1284 0e8acf4f2931765ede72461518632120_NeikiAnalytics.exe Token: SeDebugPrivilege 1284 0e8acf4f2931765ede72461518632120_NeikiAnalytics.exe Token: SeDebugPrivilege 1284 0e8acf4f2931765ede72461518632120_NeikiAnalytics.exe Token: SeDebugPrivilege 1284 0e8acf4f2931765ede72461518632120_NeikiAnalytics.exe Token: SeDebugPrivilege 1284 0e8acf4f2931765ede72461518632120_NeikiAnalytics.exe Token: SeDebugPrivilege 1284 0e8acf4f2931765ede72461518632120_NeikiAnalytics.exe Token: SeDebugPrivilege 1284 0e8acf4f2931765ede72461518632120_NeikiAnalytics.exe Token: SeDebugPrivilege 1284 0e8acf4f2931765ede72461518632120_NeikiAnalytics.exe Token: SeDebugPrivilege 1284 0e8acf4f2931765ede72461518632120_NeikiAnalytics.exe Token: SeDebugPrivilege 1284 0e8acf4f2931765ede72461518632120_NeikiAnalytics.exe Token: SeDebugPrivilege 1284 0e8acf4f2931765ede72461518632120_NeikiAnalytics.exe Token: SeDebugPrivilege 1284 0e8acf4f2931765ede72461518632120_NeikiAnalytics.exe Token: SeDebugPrivilege 1284 0e8acf4f2931765ede72461518632120_NeikiAnalytics.exe Token: SeDebugPrivilege 1284 0e8acf4f2931765ede72461518632120_NeikiAnalytics.exe Token: SeDebugPrivilege 1284 0e8acf4f2931765ede72461518632120_NeikiAnalytics.exe Token: SeDebugPrivilege 1284 0e8acf4f2931765ede72461518632120_NeikiAnalytics.exe Token: SeDebugPrivilege 1284 0e8acf4f2931765ede72461518632120_NeikiAnalytics.exe Token: SeDebugPrivilege 1284 0e8acf4f2931765ede72461518632120_NeikiAnalytics.exe Token: SeDebugPrivilege 1284 0e8acf4f2931765ede72461518632120_NeikiAnalytics.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
Processes:
0e8acf4f2931765ede72461518632120_NeikiAnalytics.exeFun.exeSVIQ.EXEdc.exepid process 1284 0e8acf4f2931765ede72461518632120_NeikiAnalytics.exe 1284 0e8acf4f2931765ede72461518632120_NeikiAnalytics.exe 2584 Fun.exe 2584 Fun.exe 2428 SVIQ.EXE 2428 SVIQ.EXE 3044 dc.exe 3044 dc.exe -
Suspicious use of WriteProcessMemory 55 IoCs
Processes:
0e8acf4f2931765ede72461518632120_NeikiAnalytics.exeFun.exedescription pid process target process PID 1284 wrote to memory of 1088 1284 0e8acf4f2931765ede72461518632120_NeikiAnalytics.exe taskhost.exe PID 1284 wrote to memory of 1168 1284 0e8acf4f2931765ede72461518632120_NeikiAnalytics.exe Dwm.exe PID 1284 wrote to memory of 1200 1284 0e8acf4f2931765ede72461518632120_NeikiAnalytics.exe Explorer.EXE PID 1284 wrote to memory of 792 1284 0e8acf4f2931765ede72461518632120_NeikiAnalytics.exe DllHost.exe PID 1284 wrote to memory of 2584 1284 0e8acf4f2931765ede72461518632120_NeikiAnalytics.exe Fun.exe PID 1284 wrote to memory of 2584 1284 0e8acf4f2931765ede72461518632120_NeikiAnalytics.exe Fun.exe PID 1284 wrote to memory of 2584 1284 0e8acf4f2931765ede72461518632120_NeikiAnalytics.exe Fun.exe PID 1284 wrote to memory of 2584 1284 0e8acf4f2931765ede72461518632120_NeikiAnalytics.exe Fun.exe PID 2584 wrote to memory of 2428 2584 Fun.exe SVIQ.EXE PID 2584 wrote to memory of 2428 2584 Fun.exe SVIQ.EXE PID 2584 wrote to memory of 2428 2584 Fun.exe SVIQ.EXE PID 2584 wrote to memory of 2428 2584 Fun.exe SVIQ.EXE PID 1284 wrote to memory of 3044 1284 0e8acf4f2931765ede72461518632120_NeikiAnalytics.exe dc.exe PID 1284 wrote to memory of 3044 1284 0e8acf4f2931765ede72461518632120_NeikiAnalytics.exe dc.exe PID 1284 wrote to memory of 3044 1284 0e8acf4f2931765ede72461518632120_NeikiAnalytics.exe dc.exe PID 1284 wrote to memory of 3044 1284 0e8acf4f2931765ede72461518632120_NeikiAnalytics.exe dc.exe PID 1284 wrote to memory of 1088 1284 0e8acf4f2931765ede72461518632120_NeikiAnalytics.exe taskhost.exe PID 1284 wrote to memory of 1168 1284 0e8acf4f2931765ede72461518632120_NeikiAnalytics.exe Dwm.exe PID 1284 wrote to memory of 1200 1284 0e8acf4f2931765ede72461518632120_NeikiAnalytics.exe Explorer.EXE PID 1284 wrote to memory of 2584 1284 0e8acf4f2931765ede72461518632120_NeikiAnalytics.exe Fun.exe PID 1284 wrote to memory of 2584 1284 0e8acf4f2931765ede72461518632120_NeikiAnalytics.exe Fun.exe PID 1284 wrote to memory of 2428 1284 0e8acf4f2931765ede72461518632120_NeikiAnalytics.exe SVIQ.EXE PID 1284 wrote to memory of 2428 1284 0e8acf4f2931765ede72461518632120_NeikiAnalytics.exe SVIQ.EXE PID 1284 wrote to memory of 3044 1284 0e8acf4f2931765ede72461518632120_NeikiAnalytics.exe dc.exe PID 1284 wrote to memory of 3044 1284 0e8acf4f2931765ede72461518632120_NeikiAnalytics.exe dc.exe PID 1284 wrote to memory of 1088 1284 0e8acf4f2931765ede72461518632120_NeikiAnalytics.exe taskhost.exe PID 1284 wrote to memory of 1168 1284 0e8acf4f2931765ede72461518632120_NeikiAnalytics.exe Dwm.exe PID 1284 wrote to memory of 1200 1284 0e8acf4f2931765ede72461518632120_NeikiAnalytics.exe Explorer.EXE PID 1284 wrote to memory of 1088 1284 0e8acf4f2931765ede72461518632120_NeikiAnalytics.exe taskhost.exe PID 1284 wrote to memory of 1168 1284 0e8acf4f2931765ede72461518632120_NeikiAnalytics.exe Dwm.exe PID 1284 wrote to memory of 1200 1284 0e8acf4f2931765ede72461518632120_NeikiAnalytics.exe Explorer.EXE PID 1284 wrote to memory of 1088 1284 0e8acf4f2931765ede72461518632120_NeikiAnalytics.exe taskhost.exe PID 1284 wrote to memory of 1168 1284 0e8acf4f2931765ede72461518632120_NeikiAnalytics.exe Dwm.exe PID 1284 wrote to memory of 1200 1284 0e8acf4f2931765ede72461518632120_NeikiAnalytics.exe Explorer.EXE PID 1284 wrote to memory of 1088 1284 0e8acf4f2931765ede72461518632120_NeikiAnalytics.exe taskhost.exe PID 1284 wrote to memory of 1168 1284 0e8acf4f2931765ede72461518632120_NeikiAnalytics.exe Dwm.exe PID 1284 wrote to memory of 1200 1284 0e8acf4f2931765ede72461518632120_NeikiAnalytics.exe Explorer.EXE PID 1284 wrote to memory of 1088 1284 0e8acf4f2931765ede72461518632120_NeikiAnalytics.exe taskhost.exe PID 1284 wrote to memory of 1168 1284 0e8acf4f2931765ede72461518632120_NeikiAnalytics.exe Dwm.exe PID 1284 wrote to memory of 1200 1284 0e8acf4f2931765ede72461518632120_NeikiAnalytics.exe Explorer.EXE PID 1284 wrote to memory of 1088 1284 0e8acf4f2931765ede72461518632120_NeikiAnalytics.exe taskhost.exe PID 1284 wrote to memory of 1168 1284 0e8acf4f2931765ede72461518632120_NeikiAnalytics.exe Dwm.exe PID 1284 wrote to memory of 1200 1284 0e8acf4f2931765ede72461518632120_NeikiAnalytics.exe Explorer.EXE PID 1284 wrote to memory of 1088 1284 0e8acf4f2931765ede72461518632120_NeikiAnalytics.exe taskhost.exe PID 1284 wrote to memory of 1168 1284 0e8acf4f2931765ede72461518632120_NeikiAnalytics.exe Dwm.exe PID 1284 wrote to memory of 1200 1284 0e8acf4f2931765ede72461518632120_NeikiAnalytics.exe Explorer.EXE PID 1284 wrote to memory of 1088 1284 0e8acf4f2931765ede72461518632120_NeikiAnalytics.exe taskhost.exe PID 1284 wrote to memory of 1168 1284 0e8acf4f2931765ede72461518632120_NeikiAnalytics.exe Dwm.exe PID 1284 wrote to memory of 1200 1284 0e8acf4f2931765ede72461518632120_NeikiAnalytics.exe Explorer.EXE PID 1284 wrote to memory of 1088 1284 0e8acf4f2931765ede72461518632120_NeikiAnalytics.exe taskhost.exe PID 1284 wrote to memory of 1168 1284 0e8acf4f2931765ede72461518632120_NeikiAnalytics.exe Dwm.exe PID 1284 wrote to memory of 1200 1284 0e8acf4f2931765ede72461518632120_NeikiAnalytics.exe Explorer.EXE PID 1284 wrote to memory of 1088 1284 0e8acf4f2931765ede72461518632120_NeikiAnalytics.exe taskhost.exe PID 1284 wrote to memory of 1168 1284 0e8acf4f2931765ede72461518632120_NeikiAnalytics.exe Dwm.exe PID 1284 wrote to memory of 1200 1284 0e8acf4f2931765ede72461518632120_NeikiAnalytics.exe Explorer.EXE -
System policy modification 1 TTPs 1 IoCs
Processes:
0e8acf4f2931765ede72461518632120_NeikiAnalytics.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 0e8acf4f2931765ede72461518632120_NeikiAnalytics.exe
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1088
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1168
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1200
-
C:\Users\Admin\AppData\Local\Temp\0e8acf4f2931765ede72461518632120_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\0e8acf4f2931765ede72461518632120_NeikiAnalytics.exe"2⤵
- Modifies firewall policy service
- UAC bypass
- Windows security bypass
- Loads dropped DLL
- Windows security modification
- Adds Run key to start application
- Checks whether UAC is enabled
- Enumerates connected drives
- Drops autorun.inf file
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1284 -
C:\WINDOWS\system\Fun.exeC:\WINDOWS\system\Fun.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2584 -
C:\WINDOWS\SVIQ.EXEC:\WINDOWS\SVIQ.EXE4⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2428 -
C:\WINDOWS\dc.exeC:\WINDOWS\dc.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3044
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:792
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
3Disable or Modify Tools
3Modify Registry
6Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
176KB
MD50e8acf4f2931765ede72461518632120
SHA1f5d5c4b54584014c1c5d6c8b7f936e286b2d86b1
SHA2565fbdf8ec2016bd1182896f1dda346d12af71fb3fbfdca4ae7f9d0266151dbd2e
SHA51299e8819ae3ef4a27de5a1faab97407e90f4a2f67b9ab5228a3c79dd6e6fb2ab0bc0041e77134f3fe6820557d1c063378227bbc47d09433fa0bb5a28bf43ae8a3
-
Filesize
100KB
MD5e5ceef84fbf5d0c1b5d5259701bc0a52
SHA1b78cdedc9c3b3a599cc94aa2ba64eb4b8cf0106f
SHA2563a8e5adefc330e0eac349bc8a6711040e7e68b15367180ae02792bd9ec9bfa00
SHA5129fd4566cab638f3be88c00a0ed3d186c3fc4dd3239b605d6ef9edabd1c54a3e14caad22da147102906fcbf47c77b54461310d82dbba3be6e5e7b06c2338685c3