Analysis
-
max time kernel
150s -
max time network
102s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
20-05-2024 10:48
Static task
static1
Behavioral task
behavioral1
Sample
ec8be5cdde4517148643db5db9e369e0_NeikiAnalytics.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
ec8be5cdde4517148643db5db9e369e0_NeikiAnalytics.exe
Resource
win10v2004-20240426-en
General
-
Target
ec8be5cdde4517148643db5db9e369e0_NeikiAnalytics.exe
-
Size
1.2MB
-
MD5
ec8be5cdde4517148643db5db9e369e0
-
SHA1
be7ac26962777255857076071c2ccbf08fdebaac
-
SHA256
089466f082e5ee62814b7c80ff414da0d1f4aa45ed2e95f9c5890c084097dc69
-
SHA512
c2cb465697e217fce62f38862f4ead2a3ac190109e5cece194bb8c7ca12f5e95d8e6a0ee24d9c37981c2ab485692f756119b92dbd33a56ab49e827cfc9872932
-
SSDEEP
24576:9j+cktriK2PVboYTicnT1SBb//wDKULTrhSFkOTu+FMu:0SPVboYTVABjRGtSFruNu
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" svchost.exe -
Executes dropped EXE 4 IoCs
pid Process 2840 explorer.exe 4704 spoolsv.exe 2564 svchost.exe 5052 spoolsv.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\resources\\themes\\explorer.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\resources\\svchost.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\resources\\themes\\explorer.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\resources\\svchost.exe RO" svchost.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\explorer.exe svchost.exe File opened for modification C:\Windows\SysWOW64\explorer.exe explorer.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 35 IoCs
pid Process 4520 ec8be5cdde4517148643db5db9e369e0_NeikiAnalytics.exe 2840 explorer.exe 4704 spoolsv.exe 2564 svchost.exe 5052 spoolsv.exe 2564 svchost.exe 2840 explorer.exe 2564 svchost.exe 2840 explorer.exe 2564 svchost.exe 2840 explorer.exe 2564 svchost.exe 2840 explorer.exe 2564 svchost.exe 2840 explorer.exe 2564 svchost.exe 2840 explorer.exe 2564 svchost.exe 2840 explorer.exe 2564 svchost.exe 2840 explorer.exe 2564 svchost.exe 2840 explorer.exe 2564 svchost.exe 2840 explorer.exe 2564 svchost.exe 2840 explorer.exe 2564 svchost.exe 2840 explorer.exe 2564 svchost.exe 2840 explorer.exe 2564 svchost.exe 2840 explorer.exe 2564 svchost.exe 2840 explorer.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification \??\c:\windows\resources\themes\explorer.exe ec8be5cdde4517148643db5db9e369e0_NeikiAnalytics.exe File opened for modification \??\c:\windows\resources\spoolsv.exe explorer.exe File opened for modification \??\c:\windows\resources\svchost.exe spoolsv.exe File opened for modification C:\Windows\Resources\tjud.exe explorer.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4520 ec8be5cdde4517148643db5db9e369e0_NeikiAnalytics.exe 4520 ec8be5cdde4517148643db5db9e369e0_NeikiAnalytics.exe 4520 ec8be5cdde4517148643db5db9e369e0_NeikiAnalytics.exe 4520 ec8be5cdde4517148643db5db9e369e0_NeikiAnalytics.exe 4520 ec8be5cdde4517148643db5db9e369e0_NeikiAnalytics.exe 4520 ec8be5cdde4517148643db5db9e369e0_NeikiAnalytics.exe 4520 ec8be5cdde4517148643db5db9e369e0_NeikiAnalytics.exe 4520 ec8be5cdde4517148643db5db9e369e0_NeikiAnalytics.exe 4520 ec8be5cdde4517148643db5db9e369e0_NeikiAnalytics.exe 4520 ec8be5cdde4517148643db5db9e369e0_NeikiAnalytics.exe 4520 ec8be5cdde4517148643db5db9e369e0_NeikiAnalytics.exe 4520 ec8be5cdde4517148643db5db9e369e0_NeikiAnalytics.exe 4520 ec8be5cdde4517148643db5db9e369e0_NeikiAnalytics.exe 4520 ec8be5cdde4517148643db5db9e369e0_NeikiAnalytics.exe 4520 ec8be5cdde4517148643db5db9e369e0_NeikiAnalytics.exe 4520 ec8be5cdde4517148643db5db9e369e0_NeikiAnalytics.exe 4520 ec8be5cdde4517148643db5db9e369e0_NeikiAnalytics.exe 4520 ec8be5cdde4517148643db5db9e369e0_NeikiAnalytics.exe 4520 ec8be5cdde4517148643db5db9e369e0_NeikiAnalytics.exe 4520 ec8be5cdde4517148643db5db9e369e0_NeikiAnalytics.exe 4520 ec8be5cdde4517148643db5db9e369e0_NeikiAnalytics.exe 4520 ec8be5cdde4517148643db5db9e369e0_NeikiAnalytics.exe 4520 ec8be5cdde4517148643db5db9e369e0_NeikiAnalytics.exe 4520 ec8be5cdde4517148643db5db9e369e0_NeikiAnalytics.exe 4520 ec8be5cdde4517148643db5db9e369e0_NeikiAnalytics.exe 4520 ec8be5cdde4517148643db5db9e369e0_NeikiAnalytics.exe 4520 ec8be5cdde4517148643db5db9e369e0_NeikiAnalytics.exe 4520 ec8be5cdde4517148643db5db9e369e0_NeikiAnalytics.exe 4520 ec8be5cdde4517148643db5db9e369e0_NeikiAnalytics.exe 4520 ec8be5cdde4517148643db5db9e369e0_NeikiAnalytics.exe 4520 ec8be5cdde4517148643db5db9e369e0_NeikiAnalytics.exe 4520 ec8be5cdde4517148643db5db9e369e0_NeikiAnalytics.exe 4520 ec8be5cdde4517148643db5db9e369e0_NeikiAnalytics.exe 4520 ec8be5cdde4517148643db5db9e369e0_NeikiAnalytics.exe 2840 explorer.exe 2840 explorer.exe 2840 explorer.exe 2840 explorer.exe 2840 explorer.exe 2840 explorer.exe 2840 explorer.exe 2840 explorer.exe 2840 explorer.exe 2840 explorer.exe 2840 explorer.exe 2840 explorer.exe 2840 explorer.exe 2840 explorer.exe 2840 explorer.exe 2840 explorer.exe 2840 explorer.exe 2840 explorer.exe 2840 explorer.exe 2840 explorer.exe 2840 explorer.exe 2840 explorer.exe 2840 explorer.exe 2840 explorer.exe 2840 explorer.exe 2840 explorer.exe 2840 explorer.exe 2840 explorer.exe 2840 explorer.exe 2840 explorer.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 2564 svchost.exe 2840 explorer.exe -
Suspicious use of SetWindowsHookEx 15 IoCs
pid Process 4520 ec8be5cdde4517148643db5db9e369e0_NeikiAnalytics.exe 4520 ec8be5cdde4517148643db5db9e369e0_NeikiAnalytics.exe 4520 ec8be5cdde4517148643db5db9e369e0_NeikiAnalytics.exe 2840 explorer.exe 2840 explorer.exe 2840 explorer.exe 4704 spoolsv.exe 4704 spoolsv.exe 4704 spoolsv.exe 2564 svchost.exe 2564 svchost.exe 2564 svchost.exe 5052 spoolsv.exe 5052 spoolsv.exe 5052 spoolsv.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4520 wrote to memory of 2840 4520 ec8be5cdde4517148643db5db9e369e0_NeikiAnalytics.exe 83 PID 4520 wrote to memory of 2840 4520 ec8be5cdde4517148643db5db9e369e0_NeikiAnalytics.exe 83 PID 4520 wrote to memory of 2840 4520 ec8be5cdde4517148643db5db9e369e0_NeikiAnalytics.exe 83 PID 2840 wrote to memory of 4704 2840 explorer.exe 85 PID 2840 wrote to memory of 4704 2840 explorer.exe 85 PID 2840 wrote to memory of 4704 2840 explorer.exe 85 PID 4704 wrote to memory of 2564 4704 spoolsv.exe 87 PID 4704 wrote to memory of 2564 4704 spoolsv.exe 87 PID 4704 wrote to memory of 2564 4704 spoolsv.exe 87 PID 2564 wrote to memory of 5052 2564 svchost.exe 88 PID 2564 wrote to memory of 5052 2564 svchost.exe 88 PID 2564 wrote to memory of 5052 2564 svchost.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\ec8be5cdde4517148643db5db9e369e0_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\ec8be5cdde4517148643db5db9e369e0_NeikiAnalytics.exe"1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4520 -
\??\c:\windows\resources\themes\explorer.exec:\windows\resources\themes\explorer.exe2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2840 -
\??\c:\windows\resources\spoolsv.exec:\windows\resources\spoolsv.exe SE3⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4704 -
\??\c:\windows\resources\svchost.exec:\windows\resources\svchost.exe4⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2564 -
\??\c:\windows\resources\spoolsv.exec:\windows\resources\spoolsv.exe PR5⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetWindowsHookEx
PID:5052
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.2MB
MD562818994b42689b675a246f0b36fe39b
SHA1ad4cca036bd225306b58b202abcddc6158061df0
SHA2561b971dac3eed4c8d6a77ea847ab30000bbf8a88e43b8f5525c7214406c58a27d
SHA5128c5de12958f640f8a0570c479128b664d6c968f72444c95272fc4e309605c98f3638d89a204f567f85a594be87b56b1cccd962ca4270ea67083ce55fd1ad482a
-
Filesize
1.2MB
MD566dae5e412513d1b11bb19815b303c56
SHA1e4516f2a0c2d7460ed5a369d1da28c5783f27b9c
SHA25639cddc906be1081bbabaf20e0cec8c14bca0802a692153894f95f51ab97a9261
SHA512209d403d381331797b9718ca4de3c27798b5cbcec11b26472221b631bcb18e340eafa443535b6b8c4fc113b8d51cdaf177f263ff086aa58bd81eb3f100aa19f2
-
Filesize
1.2MB
MD53ea828c74308b07595863d2a4a5a3d30
SHA1062b36d4d9589cad73b4f7a44a1b98a88e6444dc
SHA2568d93c2c635fcc05db944560ee423ba34d9a3c2020a5318279fd0e6627bb93b33
SHA51214d1f2bbddb9a2e5863e1a1180dedd9594d33b27adea4df4f7759b5ad34fc5934b957ce1afa8af8dae52be779aa8bd42112d21dce27984eb96057f938d2b9afd