Analysis Overview
SHA256
05d956a5aa2add3c869e8de4dbc1ca90486f2f3462518f768f0f03ec5332dda4
Threat Level: Shows suspicious behavior
The file 2024052065489c337359e4fc7f087522091c7296icedid_NeikiAnalytics was found to be: Shows suspicious behavior.
Malicious Activity Summary
UPX packed file
VMProtect packed file
Unsigned PE
Suspicious behavior: EnumeratesProcesses
Suspicious use of SetWindowsHookEx
MITRE ATT&CK
Analysis: static1
Detonation Overview
Reported
2024-05-21 08:09
Signatures
Unsigned PE
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Analysis: behavioral1
Detonation Overview
Submitted
2024-05-21 08:09
Reported
2024-05-21 08:48
Platform
win7-20231129-en
Max time kernel
118s
Max time network
123s
Command Line
Signatures
UPX packed file
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
VMProtect packed file
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
Suspicious behavior: EnumeratesProcesses
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\2024052065489c337359e4fc7f087522091c7296icedid_NeikiAnalytics.exe | N/A |
Suspicious use of SetWindowsHookEx
Processes
C:\Users\Admin\AppData\Local\Temp\2024052065489c337359e4fc7f087522091c7296icedid_NeikiAnalytics.exe
"C:\Users\Admin\AppData\Local\Temp\2024052065489c337359e4fc7f087522091c7296icedid_NeikiAnalytics.exe"
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | 7k7kfz.cn | udp |
| HK | 8.218.210.137:80 | 7k7kfz.cn | tcp |
Files
memory/1620-1-0x0000000010000000-0x000000001003E000-memory.dmp
memory/1620-0-0x0000000010000000-0x000000001003E000-memory.dmp
memory/1620-2-0x0000000010000000-0x000000001003E000-memory.dmp
memory/1620-9-0x0000000010000000-0x000000001003E000-memory.dmp
memory/1620-32-0x0000000010000000-0x000000001003E000-memory.dmp
memory/1620-4-0x0000000010000000-0x000000001003E000-memory.dmp
memory/1620-46-0x0000000010000000-0x000000001003E000-memory.dmp
memory/1620-51-0x0000000010000000-0x000000001003E000-memory.dmp
memory/1620-50-0x0000000010000000-0x000000001003E000-memory.dmp
memory/1620-49-0x0000000010000000-0x000000001003E000-memory.dmp
memory/1620-44-0x0000000010000000-0x000000001003E000-memory.dmp
memory/1620-52-0x0000000004F70000-0x000000000513D000-memory.dmp
memory/1620-41-0x0000000010000000-0x000000001003E000-memory.dmp
memory/1620-39-0x0000000010000000-0x000000001003E000-memory.dmp
memory/1620-36-0x0000000010000000-0x000000001003E000-memory.dmp
memory/1620-34-0x0000000010000000-0x000000001003E000-memory.dmp
memory/1620-29-0x0000000010000000-0x000000001003E000-memory.dmp
memory/1620-60-0x0000000005650000-0x000000000581D000-memory.dmp
memory/1620-62-0x0000000005650000-0x000000000581D000-memory.dmp
memory/1620-59-0x0000000004F70000-0x000000000513D000-memory.dmp
memory/1620-58-0x0000000004F70000-0x000000000513D000-memory.dmp
memory/1620-54-0x0000000004F70000-0x000000000513D000-memory.dmp
memory/1620-27-0x0000000010000000-0x000000001003E000-memory.dmp
memory/1620-25-0x0000000010000000-0x000000001003E000-memory.dmp
memory/1620-23-0x0000000010000000-0x000000001003E000-memory.dmp
memory/1620-63-0x0000000005650000-0x000000000581D000-memory.dmp
memory/1620-67-0x0000000005650000-0x000000000581D000-memory.dmp
memory/1620-21-0x0000000010000000-0x000000001003E000-memory.dmp
memory/1620-18-0x0000000010000000-0x000000001003E000-memory.dmp
memory/1620-16-0x0000000010000000-0x000000001003E000-memory.dmp
memory/1620-13-0x0000000010000000-0x000000001003E000-memory.dmp
memory/1620-111-0x00000000003C0000-0x00000000003FE000-memory.dmp
memory/1620-74-0x00000000003C0000-0x00000000003FE000-memory.dmp
memory/1620-72-0x00000000003C0000-0x00000000003FE000-memory.dmp
memory/1620-70-0x00000000003C0000-0x00000000003FE000-memory.dmp
memory/1620-69-0x00000000003C0000-0x00000000003FE000-memory.dmp
memory/1620-68-0x00000000003C0000-0x00000000003FE000-memory.dmp
memory/1620-11-0x0000000010000000-0x000000001003E000-memory.dmp
memory/1620-7-0x0000000010000000-0x000000001003E000-memory.dmp
memory/1620-114-0x0000000010000000-0x000000001003E000-memory.dmp
memory/1620-115-0x0000000005650000-0x000000000581D000-memory.dmp
Analysis: behavioral2
Detonation Overview
Submitted
2024-05-21 08:09
Reported
2024-05-21 08:50
Platform
win10v2004-20240226-en
Max time kernel
164s
Max time network
178s
Command Line
Signatures
UPX packed file
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
VMProtect packed file
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
Suspicious behavior: EnumeratesProcesses
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\2024052065489c337359e4fc7f087522091c7296icedid_NeikiAnalytics.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\2024052065489c337359e4fc7f087522091c7296icedid_NeikiAnalytics.exe | N/A |
Suspicious use of SetWindowsHookEx
Processes
C:\Users\Admin\AppData\Local\Temp\2024052065489c337359e4fc7f087522091c7296icedid_NeikiAnalytics.exe
"C:\Users\Admin\AppData\Local\Temp\2024052065489c337359e4fc7f087522091c7296icedid_NeikiAnalytics.exe"
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=1044 --field-trial-handle=2264,i,15001568551143786084,90255922961447677,262144 --variations-seed-version /prefetch:8
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | 104.219.191.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 79.190.18.2.in-addr.arpa | udp |
| US | 13.107.246.64:443 | tcp | |
| US | 8.8.8.8:53 | 157.123.68.40.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 206.23.85.13.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 7k7kfz.cn | udp |
| HK | 8.218.210.137:80 | 7k7kfz.cn | tcp |
| US | 8.8.8.8:53 | 137.210.218.8.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 64.159.190.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 95.221.229.192.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 58.55.71.13.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 28.118.140.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 11.227.111.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 77.190.18.2.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 2.17.178.52.in-addr.arpa | udp |
Files
memory/3112-0-0x0000000010000000-0x000000001003E000-memory.dmp
memory/3112-1-0x0000000010000000-0x000000001003E000-memory.dmp
memory/3112-25-0x0000000010000000-0x000000001003E000-memory.dmp
memory/3112-33-0x0000000010000000-0x000000001003E000-memory.dmp
memory/3112-36-0x0000000010000000-0x000000001003E000-memory.dmp
memory/3112-45-0x0000000010000000-0x000000001003E000-memory.dmp
memory/3112-42-0x0000000010000000-0x000000001003E000-memory.dmp
memory/3112-40-0x0000000010000000-0x000000001003E000-memory.dmp
memory/3112-38-0x0000000010000000-0x000000001003E000-memory.dmp
memory/3112-31-0x0000000010000000-0x000000001003E000-memory.dmp
memory/3112-29-0x0000000010000000-0x000000001003E000-memory.dmp
memory/3112-27-0x0000000010000000-0x000000001003E000-memory.dmp
memory/3112-23-0x0000000010000000-0x000000001003E000-memory.dmp
memory/3112-21-0x0000000010000000-0x000000001003E000-memory.dmp
memory/3112-19-0x0000000010000000-0x000000001003E000-memory.dmp
memory/3112-17-0x0000000010000000-0x000000001003E000-memory.dmp
memory/3112-15-0x0000000010000000-0x000000001003E000-memory.dmp
memory/3112-13-0x0000000010000000-0x000000001003E000-memory.dmp
memory/3112-11-0x0000000010000000-0x000000001003E000-memory.dmp
memory/3112-7-0x0000000010000000-0x000000001003E000-memory.dmp
memory/3112-5-0x0000000010000000-0x000000001003E000-memory.dmp
memory/3112-3-0x0000000010000000-0x000000001003E000-memory.dmp
memory/3112-9-0x0000000010000000-0x000000001003E000-memory.dmp
memory/3112-46-0x00000000053F0000-0x00000000055BD000-memory.dmp
memory/3112-2-0x0000000010000000-0x000000001003E000-memory.dmp
memory/3112-48-0x00000000053F0000-0x00000000055BD000-memory.dmp
memory/3112-50-0x00000000053F0000-0x00000000055BD000-memory.dmp
memory/3112-53-0x00000000053F0000-0x00000000055BD000-memory.dmp
memory/3112-54-0x0000000005700000-0x00000000058CD000-memory.dmp
memory/3112-56-0x0000000005700000-0x00000000058CD000-memory.dmp
memory/3112-57-0x0000000005700000-0x00000000058CD000-memory.dmp
memory/3112-62-0x0000000005230000-0x000000000526E000-memory.dmp
memory/3112-64-0x0000000005230000-0x000000000526E000-memory.dmp
memory/3112-67-0x0000000005230000-0x000000000526E000-memory.dmp
memory/3112-106-0x0000000005230000-0x000000000526E000-memory.dmp
memory/3112-69-0x0000000005230000-0x000000000526E000-memory.dmp
memory/3112-65-0x0000000005230000-0x000000000526E000-memory.dmp
memory/3112-61-0x0000000005700000-0x00000000058CD000-memory.dmp
memory/3112-63-0x0000000005230000-0x000000000526E000-memory.dmp
memory/3112-109-0x0000000010000000-0x000000001003E000-memory.dmp
memory/3112-110-0x0000000005700000-0x00000000058CD000-memory.dmp