Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
21-05-2024 10:49
Static task
static1
Behavioral task
behavioral1
Sample
39bee9f9c8955c18845557c32883745a61ca95a64c01a1876f711f02d6101baa_NeikiAnalytics.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
39bee9f9c8955c18845557c32883745a61ca95a64c01a1876f711f02d6101baa_NeikiAnalytics.exe
Resource
win10v2004-20240226-en
General
-
Target
39bee9f9c8955c18845557c32883745a61ca95a64c01a1876f711f02d6101baa_NeikiAnalytics.exe
-
Size
284KB
-
MD5
b0b328d93eb4006ef6a025f6933c99e0
-
SHA1
22630767616437241403c51e94888c0c163c8c2e
-
SHA256
39bee9f9c8955c18845557c32883745a61ca95a64c01a1876f711f02d6101baa
-
SHA512
8d5735ad490f71d2766e6cd8aea73765c14c38ab3bdfbdc040df2867c5bc19622ce2333d1ebb333f94d3d56d0f001638329b32389de2ff5d3608d382f3d7af05
-
SSDEEP
3072:KSQ0EWVwZhKxC5Rt+k60Zh+qw6PYSsszfHZTZJ2lu:KPA6wxmuJspr2l
Malware Config
Signatures
-
Adds policy Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\64107 = "C:\\PROGRA~3\\LOCALS~1\\Temp\\msuaxo.cmd" svchost.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation 39bee9f9c8955c18845557c32883745a61ca95a64c01a1876f711f02d6101baa_NeikiAnalytics.exe -
Executes dropped EXE 3 IoCs
pid Process 4464 skyrpe.exe 3292 skyrpe.exe 4016 skyrpe.exe -
resource yara_rule behavioral2/memory/3752-9-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/memory/3752-11-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/memory/3752-13-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/memory/3752-12-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/memory/3752-41-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/memory/3752-59-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/memory/3292-69-0x0000000000400000-0x000000000040B000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Skype = "C:\\Users\\Admin\\AppData\\Roaming\\skype\\skyrpe.exe" reg.exe -
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 skyrpe.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\disk\enum skyrpe.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 3168 set thread context of 3752 3168 39bee9f9c8955c18845557c32883745a61ca95a64c01a1876f711f02d6101baa_NeikiAnalytics.exe 100 PID 4464 set thread context of 3292 4464 skyrpe.exe 107 PID 4464 set thread context of 4016 4464 skyrpe.exe 108 -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\PROGRA~3\LOCALS~1\Temp\msuaxo.cmd svchost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4016 skyrpe.exe 4016 skyrpe.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 4016 skyrpe.exe -
Suspicious use of AdjustPrivilegeToken 51 IoCs
description pid Process Token: SeDebugPrivilege 3292 skyrpe.exe Token: SeDebugPrivilege 3292 skyrpe.exe Token: SeDebugPrivilege 3292 skyrpe.exe Token: SeDebugPrivilege 3292 skyrpe.exe Token: SeDebugPrivilege 3292 skyrpe.exe Token: SeDebugPrivilege 3292 skyrpe.exe Token: SeDebugPrivilege 3292 skyrpe.exe Token: SeDebugPrivilege 3292 skyrpe.exe Token: SeDebugPrivilege 3292 skyrpe.exe Token: SeDebugPrivilege 3292 skyrpe.exe Token: SeDebugPrivilege 3292 skyrpe.exe Token: SeDebugPrivilege 3292 skyrpe.exe Token: SeDebugPrivilege 3292 skyrpe.exe Token: SeDebugPrivilege 3292 skyrpe.exe Token: SeDebugPrivilege 3292 skyrpe.exe Token: SeDebugPrivilege 3292 skyrpe.exe Token: SeDebugPrivilege 3292 skyrpe.exe Token: SeDebugPrivilege 3292 skyrpe.exe Token: SeDebugPrivilege 3292 skyrpe.exe Token: SeDebugPrivilege 3292 skyrpe.exe Token: SeDebugPrivilege 3292 skyrpe.exe Token: SeDebugPrivilege 3292 skyrpe.exe Token: SeDebugPrivilege 3292 skyrpe.exe Token: SeDebugPrivilege 3292 skyrpe.exe Token: SeDebugPrivilege 3292 skyrpe.exe Token: SeDebugPrivilege 3292 skyrpe.exe Token: SeDebugPrivilege 3292 skyrpe.exe Token: SeDebugPrivilege 3292 skyrpe.exe Token: SeDebugPrivilege 3292 skyrpe.exe Token: SeDebugPrivilege 3292 skyrpe.exe Token: SeDebugPrivilege 3292 skyrpe.exe Token: SeDebugPrivilege 3292 skyrpe.exe Token: SeDebugPrivilege 3292 skyrpe.exe Token: SeDebugPrivilege 3292 skyrpe.exe Token: SeDebugPrivilege 3292 skyrpe.exe Token: SeDebugPrivilege 3292 skyrpe.exe Token: SeDebugPrivilege 3292 skyrpe.exe Token: SeDebugPrivilege 3292 skyrpe.exe Token: SeDebugPrivilege 3292 skyrpe.exe Token: SeDebugPrivilege 3292 skyrpe.exe Token: SeDebugPrivilege 3292 skyrpe.exe Token: SeDebugPrivilege 3292 skyrpe.exe Token: SeDebugPrivilege 3292 skyrpe.exe Token: SeDebugPrivilege 3292 skyrpe.exe Token: SeDebugPrivilege 3292 skyrpe.exe Token: SeDebugPrivilege 3292 skyrpe.exe Token: SeDebugPrivilege 3292 skyrpe.exe Token: SeDebugPrivilege 3292 skyrpe.exe Token: SeDebugPrivilege 3292 skyrpe.exe Token: SeDebugPrivilege 3292 skyrpe.exe Token: SeDebugPrivilege 3292 skyrpe.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 3168 39bee9f9c8955c18845557c32883745a61ca95a64c01a1876f711f02d6101baa_NeikiAnalytics.exe 3752 39bee9f9c8955c18845557c32883745a61ca95a64c01a1876f711f02d6101baa_NeikiAnalytics.exe 4464 skyrpe.exe 3292 skyrpe.exe -
Suspicious use of WriteProcessMemory 34 IoCs
description pid Process procid_target PID 3168 wrote to memory of 3752 3168 39bee9f9c8955c18845557c32883745a61ca95a64c01a1876f711f02d6101baa_NeikiAnalytics.exe 100 PID 3168 wrote to memory of 3752 3168 39bee9f9c8955c18845557c32883745a61ca95a64c01a1876f711f02d6101baa_NeikiAnalytics.exe 100 PID 3168 wrote to memory of 3752 3168 39bee9f9c8955c18845557c32883745a61ca95a64c01a1876f711f02d6101baa_NeikiAnalytics.exe 100 PID 3168 wrote to memory of 3752 3168 39bee9f9c8955c18845557c32883745a61ca95a64c01a1876f711f02d6101baa_NeikiAnalytics.exe 100 PID 3168 wrote to memory of 3752 3168 39bee9f9c8955c18845557c32883745a61ca95a64c01a1876f711f02d6101baa_NeikiAnalytics.exe 100 PID 3168 wrote to memory of 3752 3168 39bee9f9c8955c18845557c32883745a61ca95a64c01a1876f711f02d6101baa_NeikiAnalytics.exe 100 PID 3168 wrote to memory of 3752 3168 39bee9f9c8955c18845557c32883745a61ca95a64c01a1876f711f02d6101baa_NeikiAnalytics.exe 100 PID 3168 wrote to memory of 3752 3168 39bee9f9c8955c18845557c32883745a61ca95a64c01a1876f711f02d6101baa_NeikiAnalytics.exe 100 PID 3752 wrote to memory of 5004 3752 39bee9f9c8955c18845557c32883745a61ca95a64c01a1876f711f02d6101baa_NeikiAnalytics.exe 101 PID 3752 wrote to memory of 5004 3752 39bee9f9c8955c18845557c32883745a61ca95a64c01a1876f711f02d6101baa_NeikiAnalytics.exe 101 PID 3752 wrote to memory of 5004 3752 39bee9f9c8955c18845557c32883745a61ca95a64c01a1876f711f02d6101baa_NeikiAnalytics.exe 101 PID 5004 wrote to memory of 4640 5004 cmd.exe 104 PID 5004 wrote to memory of 4640 5004 cmd.exe 104 PID 5004 wrote to memory of 4640 5004 cmd.exe 104 PID 3752 wrote to memory of 4464 3752 39bee9f9c8955c18845557c32883745a61ca95a64c01a1876f711f02d6101baa_NeikiAnalytics.exe 105 PID 3752 wrote to memory of 4464 3752 39bee9f9c8955c18845557c32883745a61ca95a64c01a1876f711f02d6101baa_NeikiAnalytics.exe 105 PID 3752 wrote to memory of 4464 3752 39bee9f9c8955c18845557c32883745a61ca95a64c01a1876f711f02d6101baa_NeikiAnalytics.exe 105 PID 4464 wrote to memory of 3292 4464 skyrpe.exe 107 PID 4464 wrote to memory of 3292 4464 skyrpe.exe 107 PID 4464 wrote to memory of 3292 4464 skyrpe.exe 107 PID 4464 wrote to memory of 3292 4464 skyrpe.exe 107 PID 4464 wrote to memory of 3292 4464 skyrpe.exe 107 PID 4464 wrote to memory of 3292 4464 skyrpe.exe 107 PID 4464 wrote to memory of 3292 4464 skyrpe.exe 107 PID 4464 wrote to memory of 3292 4464 skyrpe.exe 107 PID 4464 wrote to memory of 4016 4464 skyrpe.exe 108 PID 4464 wrote to memory of 4016 4464 skyrpe.exe 108 PID 4464 wrote to memory of 4016 4464 skyrpe.exe 108 PID 4464 wrote to memory of 4016 4464 skyrpe.exe 108 PID 4464 wrote to memory of 4016 4464 skyrpe.exe 108 PID 4464 wrote to memory of 4016 4464 skyrpe.exe 108 PID 4016 wrote to memory of 4356 4016 skyrpe.exe 109 PID 4016 wrote to memory of 4356 4016 skyrpe.exe 109 PID 4016 wrote to memory of 4356 4016 skyrpe.exe 109
Processes
-
C:\Users\Admin\AppData\Local\Temp\39bee9f9c8955c18845557c32883745a61ca95a64c01a1876f711f02d6101baa_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\39bee9f9c8955c18845557c32883745a61ca95a64c01a1876f711f02d6101baa_NeikiAnalytics.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3168 -
C:\Users\Admin\AppData\Local\Temp\39bee9f9c8955c18845557c32883745a61ca95a64c01a1876f711f02d6101baa_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\39bee9f9c8955c18845557c32883745a61ca95a64c01a1876f711f02d6101baa_NeikiAnalytics.exe"2⤵
- Checks computer location settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3752 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\XDECK.bat" "3⤵
- Suspicious use of WriteProcessMemory
PID:5004 -
C:\Windows\SysWOW64\reg.exeREG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "Skype" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\skype\skyrpe.exe" /f4⤵
- Adds Run key to start application
PID:4640
-
-
-
C:\Users\Admin\AppData\Roaming\skype\skyrpe.exe"C:\Users\Admin\AppData\Roaming\skype\skyrpe.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4464 -
C:\Users\Admin\AppData\Roaming\skype\skyrpe.exe"C:\Users\Admin\AppData\Roaming\skype\skyrpe.exe"4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:3292
-
-
C:\Users\Admin\AppData\Roaming\skype\skyrpe.exe"C:\Users\Admin\AppData\Roaming\skype\skyrpe.exe"4⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:4016 -
C:\Windows\SysWOW64\svchost.exeC:\Windows\syswow64\svchost.exe5⤵
- Adds policy Run key to start application
- Drops file in Program Files directory
PID:4356
-
-
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4136 --field-trial-handle=3192,i,2785050981002401924,4037047756083432660,262144 --variations-seed-version /prefetch:81⤵PID:4352
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
139B
MD50654f004b2e314bad7f75867e91da37d
SHA14232c22e7340b12108d86e3cb35ed288a3dbc7f1
SHA256ead325a060300a9606a3f0f14694be39a3e4006a60c6c3eb0bea5d6f98192249
SHA512dda135cdfca90a742d42b4c7a5e7f5df6580ec428302a8f0c311f5b92eb08dda75774e0c7497110faffbe2dfa02b30d2dfe35ec2848a275f53be8d930c7aa553
-
Filesize
284KB
MD5044bf275c66729d1a141a78d49ef8a89
SHA14d97265de597ad0df264636cf9699a4ff0c6c72f
SHA256275a0a81f3d69a663bb13f0348f5dfc8c48e05aca5f73056104f35e836afc45d
SHA512e7972203ee563aeecccc84c7a85aeed424930cd515610a2842fb9d7a89ccbe8eb033f0231a26bab46b08efe08d462ff3800d6928bd9a861af1acb29b1312d658