Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
19/05/2024, 19:35
Static task
static1
Behavioral task
behavioral1
Sample
2569b917a3d444726b9f2966a7fffe60_NeikiAnalytics.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
2569b917a3d444726b9f2966a7fffe60_NeikiAnalytics.exe
Resource
win10v2004-20240426-en
General
-
Target
2569b917a3d444726b9f2966a7fffe60_NeikiAnalytics.exe
-
Size
120KB
-
MD5
2569b917a3d444726b9f2966a7fffe60
-
SHA1
10637d0766ca167f4d98f4b1d715c5661b3dc804
-
SHA256
29debe063942d570b4089eb30325c045287bfb6b10302a304c4ddbcc1405bec4
-
SHA512
e274eb855d32b9f72ae027e5e1a859921c470496940ffc85cff48bdd6beed81491c52e3c9b382bcc3d78295e2f1814d876f19d2995dd1076c388ca562a449e21
-
SSDEEP
3072:HnLTFBl93f2AcukXZXVfT9wm5y/pMi/mjRrz3C:rT/L3f2AcJfj5KMi/GC
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 12 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Nigdcc32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nndlkj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Nndlkj32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nbnlfimp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" 2569b917a3d444726b9f2966a7fffe60_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Nbnlfimp.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nigdcc32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Noalpmli.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Noalpmli.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Oendhdjq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Oendhdjq.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad 2569b917a3d444726b9f2966a7fffe60_NeikiAnalytics.exe -
Executes dropped EXE 6 IoCs
pid Process 1512 Nbnlfimp.exe 4256 Nigdcc32.exe 1892 Noalpmli.exe 3624 Nndlkj32.exe 1648 Oendhdjq.exe 4960 Ogmado32.exe -
Drops file in System32 directory 18 IoCs
description ioc Process File created C:\Windows\SysWOW64\Ogmado32.exe Oendhdjq.exe File opened for modification C:\Windows\SysWOW64\Ogmado32.exe Oendhdjq.exe File opened for modification C:\Windows\SysWOW64\Nigdcc32.exe Nbnlfimp.exe File created C:\Windows\SysWOW64\Hqmbcjhk.dll Nbnlfimp.exe File opened for modification C:\Windows\SysWOW64\Noalpmli.exe Nigdcc32.exe File created C:\Windows\SysWOW64\Lfbpem32.dll Noalpmli.exe File created C:\Windows\SysWOW64\Pmkcjf32.dll Nndlkj32.exe File opened for modification C:\Windows\SysWOW64\Nbnlfimp.exe 2569b917a3d444726b9f2966a7fffe60_NeikiAnalytics.exe File created C:\Windows\SysWOW64\Nigdcc32.exe Nbnlfimp.exe File created C:\Windows\SysWOW64\Noalpmli.exe Nigdcc32.exe File created C:\Windows\SysWOW64\Jmfijb32.dll Nigdcc32.exe File opened for modification C:\Windows\SysWOW64\Nndlkj32.exe Noalpmli.exe File created C:\Windows\SysWOW64\Nndlkj32.exe Noalpmli.exe File opened for modification C:\Windows\SysWOW64\Oendhdjq.exe Nndlkj32.exe File created C:\Windows\SysWOW64\Daifcmfa.dll Oendhdjq.exe File created C:\Windows\SysWOW64\Nbnlfimp.exe 2569b917a3d444726b9f2966a7fffe60_NeikiAnalytics.exe File created C:\Windows\SysWOW64\Hbfqcq32.dll 2569b917a3d444726b9f2966a7fffe60_NeikiAnalytics.exe File created C:\Windows\SysWOW64\Oendhdjq.exe Nndlkj32.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 1240 4960 WerFault.exe 87 -
Modifies registry class 21 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Nigdcc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Lfbpem32.dll" Noalpmli.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID 2569b917a3d444726b9f2966a7fffe60_NeikiAnalytics.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Nbnlfimp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jmfijb32.dll" Nigdcc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Oendhdjq.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 2569b917a3d444726b9f2966a7fffe60_NeikiAnalytics.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Nndlkj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Pmkcjf32.dll" Nndlkj32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Nigdcc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Noalpmli.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Noalpmli.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Nndlkj32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Oendhdjq.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717} 2569b917a3d444726b9f2966a7fffe60_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hbfqcq32.dll" 2569b917a3d444726b9f2966a7fffe60_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Nbnlfimp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Daifcmfa.dll" Oendhdjq.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node 2569b917a3d444726b9f2966a7fffe60_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" 2569b917a3d444726b9f2966a7fffe60_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hqmbcjhk.dll" Nbnlfimp.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 1624 wrote to memory of 1512 1624 2569b917a3d444726b9f2966a7fffe60_NeikiAnalytics.exe 82 PID 1624 wrote to memory of 1512 1624 2569b917a3d444726b9f2966a7fffe60_NeikiAnalytics.exe 82 PID 1624 wrote to memory of 1512 1624 2569b917a3d444726b9f2966a7fffe60_NeikiAnalytics.exe 82 PID 1512 wrote to memory of 4256 1512 Nbnlfimp.exe 83 PID 1512 wrote to memory of 4256 1512 Nbnlfimp.exe 83 PID 1512 wrote to memory of 4256 1512 Nbnlfimp.exe 83 PID 4256 wrote to memory of 1892 4256 Nigdcc32.exe 84 PID 4256 wrote to memory of 1892 4256 Nigdcc32.exe 84 PID 4256 wrote to memory of 1892 4256 Nigdcc32.exe 84 PID 1892 wrote to memory of 3624 1892 Noalpmli.exe 85 PID 1892 wrote to memory of 3624 1892 Noalpmli.exe 85 PID 1892 wrote to memory of 3624 1892 Noalpmli.exe 85 PID 3624 wrote to memory of 1648 3624 Nndlkj32.exe 86 PID 3624 wrote to memory of 1648 3624 Nndlkj32.exe 86 PID 3624 wrote to memory of 1648 3624 Nndlkj32.exe 86 PID 1648 wrote to memory of 4960 1648 Oendhdjq.exe 87 PID 1648 wrote to memory of 4960 1648 Oendhdjq.exe 87 PID 1648 wrote to memory of 4960 1648 Oendhdjq.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\2569b917a3d444726b9f2966a7fffe60_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\2569b917a3d444726b9f2966a7fffe60_NeikiAnalytics.exe"1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1624 -
C:\Windows\SysWOW64\Nbnlfimp.exeC:\Windows\system32\Nbnlfimp.exe2⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1512 -
C:\Windows\SysWOW64\Nigdcc32.exeC:\Windows\system32\Nigdcc32.exe3⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4256 -
C:\Windows\SysWOW64\Noalpmli.exeC:\Windows\system32\Noalpmli.exe4⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1892 -
C:\Windows\SysWOW64\Nndlkj32.exeC:\Windows\system32\Nndlkj32.exe5⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3624 -
C:\Windows\SysWOW64\Oendhdjq.exeC:\Windows\system32\Oendhdjq.exe6⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1648 -
C:\Windows\SysWOW64\Ogmado32.exeC:\Windows\system32\Ogmado32.exe7⤵
- Executes dropped EXE
PID:4960 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4960 -s 4128⤵
- Program crash
PID:1240
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4960 -ip 49601⤵PID:1508
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
120KB
MD5f5c6e4b03403357d4416f5213eb1f7d9
SHA13571b2032b550d5346d4491ca9c830e06f9c0cc7
SHA256157711e46c1a7cd59fb072e9c75f2b193b1d07ba29078dfbb3ba93b7d63900d8
SHA51255097c91d29e0b829d5e678b6aadd4c3385354bb1434154b2f44afc4c9584e025ae1fb34d8d7fe79d4fe720b19d0479bce5b289fc3a79a42db66a2011c76f823
-
Filesize
120KB
MD5b309e6d3830a9cd41b3985bbcbea6e90
SHA1a64957bc43de4a3dfcabe006319b997899d420cb
SHA256721354e74a7e3559027ae1f55430efad226585800db1cfeabf2c1f2a1755825a
SHA5122760b3ac0dc209c257a784f17ed72dc65d36c46e9707fedec930835f66748a132d355a32fca839b694d3e035e4ece7bc3d967cd0aceb98eba6019d1eb1a2cbb5
-
Filesize
120KB
MD54affd1b71347e73cdc28b8f592db8f17
SHA19914c350ba986e622b3bf37ac31db9e9f95bdea5
SHA256a5ed9c0045c737b5a6106691f927f024edc41d156a5c6d784fd7562ca9f90c61
SHA512c7846eb5198e06321ae05c395e0ad24d6a47a92e3c664c7b3b196f355dd4cf3c03c93b010fbb06ed2d1731ea61f4b20ce55fc85101416118facb9c28f08f5ddc
-
Filesize
120KB
MD57a5282e6b7a6b821953e8e7e185d8031
SHA13d4e6cdcb1ba1e2a3bc53f505bdb477032156154
SHA2564aae232e2079251799f76f394357c92224128b7d8e21d60143d18dd6906c3813
SHA512aed22daba90c62da7031b4737597bf3602d8817f5587ba50b7331c76f191c6f2bda560c636325c64d99cc9ba6b51606649adecb0e63ce893d97f4b92773084d0
-
Filesize
120KB
MD5a204af9cc6139f1f224446d1ccacdbbd
SHA101a9d9ca3c4c64cf88abd0201d612ebe0baeb97f
SHA25690018077badc114fdb2d52170015879383b0c13f7b59ed0404e9111384662dd8
SHA512a763a662882c3824941c2f11ac9ff57c199bed3e4fd801613e0b5f44d32e2fdb2658b23cdfda69164c200421b50be09097ab697844e717c0201593ff8491aba6
-
Filesize
120KB
MD5a63e3c45ae9af83f2e85c508f8ff5319
SHA1add1b7f146b7c889c22b048868db7d1d7aba04e0
SHA2564720decb443935fddd16d5c3bc0833a0c8dcc03904e47ac3fbde7ba61b2d719c
SHA512a9e394a7dd1a0044c20e3170392be8adf0671caa45d6813ce39ba34810e6961d30c2d1ccf0f86f0b8868b69d27530173f1cf14cc045d235c0439284920b93896
-
Filesize
7KB
MD5c626f6a0ba18ba8c078dd96a18c46d12
SHA1d542c175c45ce96f95e6fc48aee4c50ca137469a
SHA256891939babef4428ef6a92ce9845792462ccd76a6663eed728a3da3f1628c6d6c
SHA51224426dc7493e8f5649c3c37d37e2f2855a1417725e4b0ff76f9ffbb392ad3f14a5499bc621a041ff5af672980b6d36d71a2315fb550f0dff80f1575d6ee54020