Analysis
-
max time kernel
7s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
21-05-2024 20:51
Static task
static1
Behavioral task
behavioral1
Sample
0d19637d68c53f3cac3959a848473a60_NeikiAnalytics.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
0d19637d68c53f3cac3959a848473a60_NeikiAnalytics.exe
Resource
win10v2004-20240226-en
General
-
Target
0d19637d68c53f3cac3959a848473a60_NeikiAnalytics.exe
-
Size
128KB
-
MD5
0d19637d68c53f3cac3959a848473a60
-
SHA1
5f8dc94e8c019634c2a1a4b016cdf650dacb7a00
-
SHA256
9abe33680967b1a3321cf8610f2f93e16a423a5b9e5f587c77ac8819f2236f3b
-
SHA512
8897a2b619dfd240fa73d551e221027570cc2aedbc743b0be433b8adc0a64caed4f3d02c3a5f084d1e394e0ef3d053269f3f395578cfd822e5e210537b7ac3c8
-
SSDEEP
3072:VvgwhTm5amkqIJS20hD7Me+QpWT21/Blx77x19:jmhUKWyJBlx77/9
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3932 0d19637d68c53f3cac3959a848473a60_NeikiAnalytics.exe -
Loads dropped DLL 1 IoCs
pid Process 1772 0d19637d68c53f3cac3959a848473a60_NeikiAnalytics.exe -
resource yara_rule behavioral1/memory/3932-668-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/3932-1461-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/4056-1462-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/4056-1471-0x0000000000400000-0x000000000040B000-memory.dmp upx -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 1772 set thread context of 3804 1772 0d19637d68c53f3cac3959a848473a60_NeikiAnalytics.exe 28 PID 1772 set thread context of 3932 1772 0d19637d68c53f3cac3959a848473a60_NeikiAnalytics.exe 29 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3804 svchost.exe 3804 svchost.exe 3804 svchost.exe 3804 svchost.exe 3804 svchost.exe 3804 svchost.exe 3804 svchost.exe 3804 svchost.exe 3804 svchost.exe 3804 svchost.exe 3804 svchost.exe 3804 svchost.exe 3804 svchost.exe 3804 svchost.exe 3804 svchost.exe 3804 svchost.exe 3804 svchost.exe 3804 svchost.exe 3804 svchost.exe 3804 svchost.exe 3804 svchost.exe 3804 svchost.exe 3804 svchost.exe 3804 svchost.exe 3804 svchost.exe 3804 svchost.exe 3804 svchost.exe 3804 svchost.exe 3804 svchost.exe 3804 svchost.exe 3804 svchost.exe 3804 svchost.exe 3804 svchost.exe 3804 svchost.exe 3804 svchost.exe 3804 svchost.exe 3804 svchost.exe 3804 svchost.exe 3804 svchost.exe 3804 svchost.exe 3804 svchost.exe 3804 svchost.exe 3804 svchost.exe 3804 svchost.exe 3804 svchost.exe 3804 svchost.exe 3804 svchost.exe 3804 svchost.exe 3804 svchost.exe 3804 svchost.exe 3804 svchost.exe 3804 svchost.exe 3804 svchost.exe 3804 svchost.exe 3804 svchost.exe 3804 svchost.exe 3804 svchost.exe 3804 svchost.exe 3804 svchost.exe 3804 svchost.exe 3804 svchost.exe 3804 svchost.exe 3804 svchost.exe 3804 svchost.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 1772 0d19637d68c53f3cac3959a848473a60_NeikiAnalytics.exe 3804 svchost.exe 3932 0d19637d68c53f3cac3959a848473a60_NeikiAnalytics.exe -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 1772 wrote to memory of 3804 1772 0d19637d68c53f3cac3959a848473a60_NeikiAnalytics.exe 28 PID 1772 wrote to memory of 3804 1772 0d19637d68c53f3cac3959a848473a60_NeikiAnalytics.exe 28 PID 1772 wrote to memory of 3804 1772 0d19637d68c53f3cac3959a848473a60_NeikiAnalytics.exe 28 PID 1772 wrote to memory of 3804 1772 0d19637d68c53f3cac3959a848473a60_NeikiAnalytics.exe 28 PID 1772 wrote to memory of 3804 1772 0d19637d68c53f3cac3959a848473a60_NeikiAnalytics.exe 28 PID 1772 wrote to memory of 3804 1772 0d19637d68c53f3cac3959a848473a60_NeikiAnalytics.exe 28 PID 1772 wrote to memory of 3804 1772 0d19637d68c53f3cac3959a848473a60_NeikiAnalytics.exe 28 PID 1772 wrote to memory of 3804 1772 0d19637d68c53f3cac3959a848473a60_NeikiAnalytics.exe 28 PID 1772 wrote to memory of 3804 1772 0d19637d68c53f3cac3959a848473a60_NeikiAnalytics.exe 28 PID 1772 wrote to memory of 3804 1772 0d19637d68c53f3cac3959a848473a60_NeikiAnalytics.exe 28 PID 1772 wrote to memory of 3932 1772 0d19637d68c53f3cac3959a848473a60_NeikiAnalytics.exe 29 PID 1772 wrote to memory of 3932 1772 0d19637d68c53f3cac3959a848473a60_NeikiAnalytics.exe 29 PID 1772 wrote to memory of 3932 1772 0d19637d68c53f3cac3959a848473a60_NeikiAnalytics.exe 29 PID 1772 wrote to memory of 3932 1772 0d19637d68c53f3cac3959a848473a60_NeikiAnalytics.exe 29 PID 1772 wrote to memory of 3932 1772 0d19637d68c53f3cac3959a848473a60_NeikiAnalytics.exe 29 PID 1772 wrote to memory of 3932 1772 0d19637d68c53f3cac3959a848473a60_NeikiAnalytics.exe 29 PID 1772 wrote to memory of 3932 1772 0d19637d68c53f3cac3959a848473a60_NeikiAnalytics.exe 29 PID 1772 wrote to memory of 3932 1772 0d19637d68c53f3cac3959a848473a60_NeikiAnalytics.exe 29 PID 3932 wrote to memory of 2580 3932 0d19637d68c53f3cac3959a848473a60_NeikiAnalytics.exe 30 PID 3932 wrote to memory of 2580 3932 0d19637d68c53f3cac3959a848473a60_NeikiAnalytics.exe 30 PID 3932 wrote to memory of 2580 3932 0d19637d68c53f3cac3959a848473a60_NeikiAnalytics.exe 30 PID 3932 wrote to memory of 2580 3932 0d19637d68c53f3cac3959a848473a60_NeikiAnalytics.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\0d19637d68c53f3cac3959a848473a60_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\0d19637d68c53f3cac3959a848473a60_NeikiAnalytics.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1772 -
C:\Windows\SysWOW64\svchost.exe"C:\Windows\system32\svchost.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3804
-
-
C:\Users\Admin\AppData\Local\Temp\0d19637d68c53f3cac3959a848473a60_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\0d19637d68c53f3cac3959a848473a60_NeikiAnalytics.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3932 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\NKKVS.bat" "3⤵PID:2580
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "Key Name" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\FolderName\datafli.exe" /f4⤵PID:2776
-
-
-
C:\Users\Admin\AppData\Roaming\FolderName\datafli.exe"C:\Users\Admin\AppData\Roaming\FolderName\datafli.exe"3⤵PID:2620
-
C:\Windows\SysWOW64\svchost.exe"C:\Windows\system32\svchost.exe"4⤵PID:4036
-
-
C:\Users\Admin\AppData\Roaming\FolderName\datafli.exe"C:\Users\Admin\AppData\Roaming\FolderName\datafli.exe"4⤵PID:4056
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
128KB
MD50d19637d68c53f3cac3959a848473a60
SHA15f8dc94e8c019634c2a1a4b016cdf650dacb7a00
SHA2569abe33680967b1a3321cf8610f2f93e16a423a5b9e5f587c77ac8819f2236f3b
SHA5128897a2b619dfd240fa73d551e221027570cc2aedbc743b0be433b8adc0a64caed4f3d02c3a5f084d1e394e0ef3d053269f3f395578cfd822e5e210537b7ac3c8
-
Filesize
148B
MD5cad4294c9f78a2359f70ea09f0f56325
SHA11d02ee76821a5b6fe45aa4f12bac8f86b0043691
SHA25648eb38071c5a2a5c40b3110fcbcb52f6ad0849c3ec20b1cf1be5fa223ac0aaf4
SHA512cd62dd9423a3224d2c4d27853554e0574212cf48a824d562ab3e17231bb839f1dadb12067a7ca39c0cf8ddd5b0e3e8c1dbf601f9822567957e7c29e51fe1693d
-
Filesize
128KB
MD5118aab88dcf4b291b968a7ebc8a273cd
SHA10a101f51062c6924cc265731df9b48e4a7601f4c
SHA256df6976b824797e0613575a4241be026230170cf43e56c8b662d695431d5c7606
SHA5122ceb3c69bffbc0c9e4d8a55bb4435a68b3a64bc696197ff7f893478842dce89f1501524004095f993c8a4776f9ff95b53cadf1b06f1b79967f3f9078846c5a76