Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
19-05-2024 21:40
Static task
static1
Behavioral task
behavioral1
Sample
412a9dd0f6c9989320e86e2e85d84520_NeikiAnalytics.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
412a9dd0f6c9989320e86e2e85d84520_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
412a9dd0f6c9989320e86e2e85d84520_NeikiAnalytics.exe
-
Size
135KB
-
MD5
412a9dd0f6c9989320e86e2e85d84520
-
SHA1
6684e00ceb5925c32a4592a95d2d2f7218dd47e1
-
SHA256
37859bac6043c36e43fcb9f81bdbcb8a811a30a820b1febd2f9bf0551989d9f9
-
SHA512
ce1cb04cecc27422aac00284de01db2049e0d414f4a54070a4863b0628c4db127dc041a24c15e689cc80daebe21eb0398a6799a911ede319585c3552b7768eca
-
SSDEEP
1536:UfsEqouTRcG/Mzvgf7xEuvnXNTRdUzwTekUOisZ1yDDajtXbVd/3:UVqoCl/YgjxEufVU0TbTyDDalv/3
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" svchost.exe -
Executes dropped EXE 4 IoCs
pid Process 2428 explorer.exe 432 spoolsv.exe 4508 svchost.exe 1560 spoolsv.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\resources\\svchost.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\resources\\themes\\explorer.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\resources\\svchost.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\resources\\themes\\explorer.exe RO" svchost.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\explorer.exe explorer.exe File opened for modification C:\Windows\SysWOW64\explorer.exe svchost.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification \??\c:\windows\resources\spoolsv.exe explorer.exe File opened for modification \??\c:\windows\resources\svchost.exe spoolsv.exe File opened for modification C:\Windows\Resources\tjud.exe explorer.exe File opened for modification \??\c:\windows\resources\themes\explorer.exe 412a9dd0f6c9989320e86e2e85d84520_NeikiAnalytics.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 388 412a9dd0f6c9989320e86e2e85d84520_NeikiAnalytics.exe 388 412a9dd0f6c9989320e86e2e85d84520_NeikiAnalytics.exe 388 412a9dd0f6c9989320e86e2e85d84520_NeikiAnalytics.exe 388 412a9dd0f6c9989320e86e2e85d84520_NeikiAnalytics.exe 388 412a9dd0f6c9989320e86e2e85d84520_NeikiAnalytics.exe 388 412a9dd0f6c9989320e86e2e85d84520_NeikiAnalytics.exe 388 412a9dd0f6c9989320e86e2e85d84520_NeikiAnalytics.exe 388 412a9dd0f6c9989320e86e2e85d84520_NeikiAnalytics.exe 388 412a9dd0f6c9989320e86e2e85d84520_NeikiAnalytics.exe 388 412a9dd0f6c9989320e86e2e85d84520_NeikiAnalytics.exe 388 412a9dd0f6c9989320e86e2e85d84520_NeikiAnalytics.exe 388 412a9dd0f6c9989320e86e2e85d84520_NeikiAnalytics.exe 388 412a9dd0f6c9989320e86e2e85d84520_NeikiAnalytics.exe 388 412a9dd0f6c9989320e86e2e85d84520_NeikiAnalytics.exe 388 412a9dd0f6c9989320e86e2e85d84520_NeikiAnalytics.exe 388 412a9dd0f6c9989320e86e2e85d84520_NeikiAnalytics.exe 388 412a9dd0f6c9989320e86e2e85d84520_NeikiAnalytics.exe 388 412a9dd0f6c9989320e86e2e85d84520_NeikiAnalytics.exe 388 412a9dd0f6c9989320e86e2e85d84520_NeikiAnalytics.exe 388 412a9dd0f6c9989320e86e2e85d84520_NeikiAnalytics.exe 388 412a9dd0f6c9989320e86e2e85d84520_NeikiAnalytics.exe 388 412a9dd0f6c9989320e86e2e85d84520_NeikiAnalytics.exe 388 412a9dd0f6c9989320e86e2e85d84520_NeikiAnalytics.exe 388 412a9dd0f6c9989320e86e2e85d84520_NeikiAnalytics.exe 388 412a9dd0f6c9989320e86e2e85d84520_NeikiAnalytics.exe 388 412a9dd0f6c9989320e86e2e85d84520_NeikiAnalytics.exe 388 412a9dd0f6c9989320e86e2e85d84520_NeikiAnalytics.exe 388 412a9dd0f6c9989320e86e2e85d84520_NeikiAnalytics.exe 388 412a9dd0f6c9989320e86e2e85d84520_NeikiAnalytics.exe 388 412a9dd0f6c9989320e86e2e85d84520_NeikiAnalytics.exe 388 412a9dd0f6c9989320e86e2e85d84520_NeikiAnalytics.exe 388 412a9dd0f6c9989320e86e2e85d84520_NeikiAnalytics.exe 388 412a9dd0f6c9989320e86e2e85d84520_NeikiAnalytics.exe 388 412a9dd0f6c9989320e86e2e85d84520_NeikiAnalytics.exe 2428 explorer.exe 2428 explorer.exe 2428 explorer.exe 2428 explorer.exe 2428 explorer.exe 2428 explorer.exe 2428 explorer.exe 2428 explorer.exe 2428 explorer.exe 2428 explorer.exe 2428 explorer.exe 2428 explorer.exe 2428 explorer.exe 2428 explorer.exe 2428 explorer.exe 2428 explorer.exe 2428 explorer.exe 2428 explorer.exe 2428 explorer.exe 2428 explorer.exe 2428 explorer.exe 2428 explorer.exe 2428 explorer.exe 2428 explorer.exe 2428 explorer.exe 2428 explorer.exe 2428 explorer.exe 2428 explorer.exe 2428 explorer.exe 2428 explorer.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 2428 explorer.exe 4508 svchost.exe -
Suspicious use of SetWindowsHookEx 10 IoCs
pid Process 388 412a9dd0f6c9989320e86e2e85d84520_NeikiAnalytics.exe 388 412a9dd0f6c9989320e86e2e85d84520_NeikiAnalytics.exe 2428 explorer.exe 2428 explorer.exe 432 spoolsv.exe 432 spoolsv.exe 4508 svchost.exe 4508 svchost.exe 1560 spoolsv.exe 1560 spoolsv.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 388 wrote to memory of 2428 388 412a9dd0f6c9989320e86e2e85d84520_NeikiAnalytics.exe 83 PID 388 wrote to memory of 2428 388 412a9dd0f6c9989320e86e2e85d84520_NeikiAnalytics.exe 83 PID 388 wrote to memory of 2428 388 412a9dd0f6c9989320e86e2e85d84520_NeikiAnalytics.exe 83 PID 2428 wrote to memory of 432 2428 explorer.exe 84 PID 2428 wrote to memory of 432 2428 explorer.exe 84 PID 2428 wrote to memory of 432 2428 explorer.exe 84 PID 432 wrote to memory of 4508 432 spoolsv.exe 85 PID 432 wrote to memory of 4508 432 spoolsv.exe 85 PID 432 wrote to memory of 4508 432 spoolsv.exe 85 PID 4508 wrote to memory of 1560 4508 svchost.exe 86 PID 4508 wrote to memory of 1560 4508 svchost.exe 86 PID 4508 wrote to memory of 1560 4508 svchost.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\412a9dd0f6c9989320e86e2e85d84520_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\412a9dd0f6c9989320e86e2e85d84520_NeikiAnalytics.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:388 -
\??\c:\windows\resources\themes\explorer.exec:\windows\resources\themes\explorer.exe2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2428 -
\??\c:\windows\resources\spoolsv.exec:\windows\resources\spoolsv.exe SE3⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:432 -
\??\c:\windows\resources\svchost.exec:\windows\resources\svchost.exe4⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4508 -
\??\c:\windows\resources\spoolsv.exec:\windows\resources\spoolsv.exe PR5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1560
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
135KB
MD555aa16e7b0ca92e4334fc3f6613426e9
SHA1b4b558eb4342f1505c55712e2b2ecdd794e810e9
SHA256c82a37c3e2c145100aa24e8d4b17be050ba218b7d7a03692fb157bc8eac92757
SHA51224796e4a0b0dcbd67ad536d49237fbb1dc37fab5181cca37656dd4f61cbebb7cf8f86d5aa908b18cf3943c556bef3267fead961464d782694acb0a18bf5a07eb
-
Filesize
135KB
MD5292517a9484b9e8739e99173f4933ff6
SHA1111ccc005f2c790d439fe897d7e4ef6725cc4e77
SHA2569133926c310ab28e345367d347f6b61e8bc65a4b2f4642d5e72b7c5e127960c2
SHA5123ac837b02432d762d5d552e9e74a1babe776309f91029a2c24de2e7b8850e532ee7fca2d40271cbd579da68ac4d58218e6df249ce18072580b6c522644c33975
-
Filesize
135KB
MD5f7eace2898cc536a3c22c399d811807b
SHA1a89da94724fd6d6b7d9c60b96108af576acfed7e
SHA25686b45370a8daf663aac987d3d4d6b0b7ea24502a086ed0701b2ec5fb2ecd8519
SHA512ed424acf73271e3ac08ffde5d98fc5de804173ca06bede9975d7ef234004bf698dbdb3d0b881796da497266568471f93022c0d6dd92ad45dff2bc601fdb851ad