Analysis
-
max time kernel
150s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
22-05-2024 21:37
Static task
static1
Behavioral task
behavioral1
Sample
41f73e643999a9e84a114298377765e0_NeikiAnalytics.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
41f73e643999a9e84a114298377765e0_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
41f73e643999a9e84a114298377765e0_NeikiAnalytics.exe
-
Size
53KB
-
MD5
41f73e643999a9e84a114298377765e0
-
SHA1
c2f2b7a9b135dc73d3bd5c2dd2feb273c424dd98
-
SHA256
e1c509f68b0e8e9e4e1d1a607e1063f31ef83cb5c4cdc18e0f51d42db156fe4f
-
SHA512
2264931598ddd28e50d15ae80b9f8ce3ef59cc5ecf66adcd8415b909a2d4daa6a0f556876ac06f8e0d7a6f69e1f42a9ff470d27fd0731c9c13e7112c3b8cc310
-
SSDEEP
1536:vNkQg8r8QNcYaH6lFrmEc/MErtule7Kp3StjEMjmLM3ztDJWZsXy4JzxPME:awcYaH6lFrmEc/MErtuleJJjmLM3zRJr
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
Processes:
wiuanog.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" wiuanog.exe -
Executes dropped EXE 1 IoCs
Processes:
wiuanog.exepid process 1768 wiuanog.exe -
Loads dropped DLL 2 IoCs
Processes:
41f73e643999a9e84a114298377765e0_NeikiAnalytics.exepid process 2756 41f73e643999a9e84a114298377765e0_NeikiAnalytics.exe 2756 41f73e643999a9e84a114298377765e0_NeikiAnalytics.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
wiuanog.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Run\wiuanog = "C:\\Users\\Admin\\wiuanog.exe" wiuanog.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
wiuanog.exepid process 1768 wiuanog.exe 1768 wiuanog.exe 1768 wiuanog.exe 1768 wiuanog.exe 1768 wiuanog.exe 1768 wiuanog.exe 1768 wiuanog.exe 1768 wiuanog.exe 1768 wiuanog.exe 1768 wiuanog.exe 1768 wiuanog.exe 1768 wiuanog.exe 1768 wiuanog.exe 1768 wiuanog.exe 1768 wiuanog.exe 1768 wiuanog.exe 1768 wiuanog.exe 1768 wiuanog.exe 1768 wiuanog.exe 1768 wiuanog.exe 1768 wiuanog.exe 1768 wiuanog.exe 1768 wiuanog.exe 1768 wiuanog.exe 1768 wiuanog.exe 1768 wiuanog.exe 1768 wiuanog.exe 1768 wiuanog.exe 1768 wiuanog.exe 1768 wiuanog.exe 1768 wiuanog.exe 1768 wiuanog.exe 1768 wiuanog.exe 1768 wiuanog.exe 1768 wiuanog.exe 1768 wiuanog.exe 1768 wiuanog.exe 1768 wiuanog.exe 1768 wiuanog.exe 1768 wiuanog.exe 1768 wiuanog.exe 1768 wiuanog.exe 1768 wiuanog.exe 1768 wiuanog.exe 1768 wiuanog.exe 1768 wiuanog.exe 1768 wiuanog.exe 1768 wiuanog.exe 1768 wiuanog.exe 1768 wiuanog.exe 1768 wiuanog.exe 1768 wiuanog.exe 1768 wiuanog.exe 1768 wiuanog.exe 1768 wiuanog.exe 1768 wiuanog.exe 1768 wiuanog.exe 1768 wiuanog.exe 1768 wiuanog.exe 1768 wiuanog.exe 1768 wiuanog.exe 1768 wiuanog.exe 1768 wiuanog.exe 1768 wiuanog.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
41f73e643999a9e84a114298377765e0_NeikiAnalytics.exewiuanog.exepid process 2756 41f73e643999a9e84a114298377765e0_NeikiAnalytics.exe 1768 wiuanog.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
41f73e643999a9e84a114298377765e0_NeikiAnalytics.exewiuanog.exedescription pid process target process PID 2756 wrote to memory of 1768 2756 41f73e643999a9e84a114298377765e0_NeikiAnalytics.exe wiuanog.exe PID 2756 wrote to memory of 1768 2756 41f73e643999a9e84a114298377765e0_NeikiAnalytics.exe wiuanog.exe PID 2756 wrote to memory of 1768 2756 41f73e643999a9e84a114298377765e0_NeikiAnalytics.exe wiuanog.exe PID 2756 wrote to memory of 1768 2756 41f73e643999a9e84a114298377765e0_NeikiAnalytics.exe wiuanog.exe PID 1768 wrote to memory of 2756 1768 wiuanog.exe 41f73e643999a9e84a114298377765e0_NeikiAnalytics.exe PID 1768 wrote to memory of 2756 1768 wiuanog.exe 41f73e643999a9e84a114298377765e0_NeikiAnalytics.exe PID 1768 wrote to memory of 2756 1768 wiuanog.exe 41f73e643999a9e84a114298377765e0_NeikiAnalytics.exe PID 1768 wrote to memory of 2756 1768 wiuanog.exe 41f73e643999a9e84a114298377765e0_NeikiAnalytics.exe PID 1768 wrote to memory of 2756 1768 wiuanog.exe 41f73e643999a9e84a114298377765e0_NeikiAnalytics.exe PID 1768 wrote to memory of 2756 1768 wiuanog.exe 41f73e643999a9e84a114298377765e0_NeikiAnalytics.exe PID 1768 wrote to memory of 2756 1768 wiuanog.exe 41f73e643999a9e84a114298377765e0_NeikiAnalytics.exe PID 1768 wrote to memory of 2756 1768 wiuanog.exe 41f73e643999a9e84a114298377765e0_NeikiAnalytics.exe PID 1768 wrote to memory of 2756 1768 wiuanog.exe 41f73e643999a9e84a114298377765e0_NeikiAnalytics.exe PID 1768 wrote to memory of 2756 1768 wiuanog.exe 41f73e643999a9e84a114298377765e0_NeikiAnalytics.exe PID 1768 wrote to memory of 2756 1768 wiuanog.exe 41f73e643999a9e84a114298377765e0_NeikiAnalytics.exe PID 1768 wrote to memory of 2756 1768 wiuanog.exe 41f73e643999a9e84a114298377765e0_NeikiAnalytics.exe PID 1768 wrote to memory of 2756 1768 wiuanog.exe 41f73e643999a9e84a114298377765e0_NeikiAnalytics.exe PID 1768 wrote to memory of 2756 1768 wiuanog.exe 41f73e643999a9e84a114298377765e0_NeikiAnalytics.exe PID 1768 wrote to memory of 2756 1768 wiuanog.exe 41f73e643999a9e84a114298377765e0_NeikiAnalytics.exe PID 1768 wrote to memory of 2756 1768 wiuanog.exe 41f73e643999a9e84a114298377765e0_NeikiAnalytics.exe PID 1768 wrote to memory of 2756 1768 wiuanog.exe 41f73e643999a9e84a114298377765e0_NeikiAnalytics.exe PID 1768 wrote to memory of 2756 1768 wiuanog.exe 41f73e643999a9e84a114298377765e0_NeikiAnalytics.exe PID 1768 wrote to memory of 2756 1768 wiuanog.exe 41f73e643999a9e84a114298377765e0_NeikiAnalytics.exe PID 1768 wrote to memory of 2756 1768 wiuanog.exe 41f73e643999a9e84a114298377765e0_NeikiAnalytics.exe PID 1768 wrote to memory of 2756 1768 wiuanog.exe 41f73e643999a9e84a114298377765e0_NeikiAnalytics.exe PID 1768 wrote to memory of 2756 1768 wiuanog.exe 41f73e643999a9e84a114298377765e0_NeikiAnalytics.exe PID 1768 wrote to memory of 2756 1768 wiuanog.exe 41f73e643999a9e84a114298377765e0_NeikiAnalytics.exe PID 1768 wrote to memory of 2756 1768 wiuanog.exe 41f73e643999a9e84a114298377765e0_NeikiAnalytics.exe PID 1768 wrote to memory of 2756 1768 wiuanog.exe 41f73e643999a9e84a114298377765e0_NeikiAnalytics.exe PID 1768 wrote to memory of 2756 1768 wiuanog.exe 41f73e643999a9e84a114298377765e0_NeikiAnalytics.exe PID 1768 wrote to memory of 2756 1768 wiuanog.exe 41f73e643999a9e84a114298377765e0_NeikiAnalytics.exe PID 1768 wrote to memory of 2756 1768 wiuanog.exe 41f73e643999a9e84a114298377765e0_NeikiAnalytics.exe PID 1768 wrote to memory of 2756 1768 wiuanog.exe 41f73e643999a9e84a114298377765e0_NeikiAnalytics.exe PID 1768 wrote to memory of 2756 1768 wiuanog.exe 41f73e643999a9e84a114298377765e0_NeikiAnalytics.exe PID 1768 wrote to memory of 2756 1768 wiuanog.exe 41f73e643999a9e84a114298377765e0_NeikiAnalytics.exe PID 1768 wrote to memory of 2756 1768 wiuanog.exe 41f73e643999a9e84a114298377765e0_NeikiAnalytics.exe PID 1768 wrote to memory of 2756 1768 wiuanog.exe 41f73e643999a9e84a114298377765e0_NeikiAnalytics.exe PID 1768 wrote to memory of 2756 1768 wiuanog.exe 41f73e643999a9e84a114298377765e0_NeikiAnalytics.exe PID 1768 wrote to memory of 2756 1768 wiuanog.exe 41f73e643999a9e84a114298377765e0_NeikiAnalytics.exe PID 1768 wrote to memory of 2756 1768 wiuanog.exe 41f73e643999a9e84a114298377765e0_NeikiAnalytics.exe PID 1768 wrote to memory of 2756 1768 wiuanog.exe 41f73e643999a9e84a114298377765e0_NeikiAnalytics.exe PID 1768 wrote to memory of 2756 1768 wiuanog.exe 41f73e643999a9e84a114298377765e0_NeikiAnalytics.exe PID 1768 wrote to memory of 2756 1768 wiuanog.exe 41f73e643999a9e84a114298377765e0_NeikiAnalytics.exe PID 1768 wrote to memory of 2756 1768 wiuanog.exe 41f73e643999a9e84a114298377765e0_NeikiAnalytics.exe PID 1768 wrote to memory of 2756 1768 wiuanog.exe 41f73e643999a9e84a114298377765e0_NeikiAnalytics.exe PID 1768 wrote to memory of 2756 1768 wiuanog.exe 41f73e643999a9e84a114298377765e0_NeikiAnalytics.exe PID 1768 wrote to memory of 2756 1768 wiuanog.exe 41f73e643999a9e84a114298377765e0_NeikiAnalytics.exe PID 1768 wrote to memory of 2756 1768 wiuanog.exe 41f73e643999a9e84a114298377765e0_NeikiAnalytics.exe PID 1768 wrote to memory of 2756 1768 wiuanog.exe 41f73e643999a9e84a114298377765e0_NeikiAnalytics.exe PID 1768 wrote to memory of 2756 1768 wiuanog.exe 41f73e643999a9e84a114298377765e0_NeikiAnalytics.exe PID 1768 wrote to memory of 2756 1768 wiuanog.exe 41f73e643999a9e84a114298377765e0_NeikiAnalytics.exe PID 1768 wrote to memory of 2756 1768 wiuanog.exe 41f73e643999a9e84a114298377765e0_NeikiAnalytics.exe PID 1768 wrote to memory of 2756 1768 wiuanog.exe 41f73e643999a9e84a114298377765e0_NeikiAnalytics.exe PID 1768 wrote to memory of 2756 1768 wiuanog.exe 41f73e643999a9e84a114298377765e0_NeikiAnalytics.exe PID 1768 wrote to memory of 2756 1768 wiuanog.exe 41f73e643999a9e84a114298377765e0_NeikiAnalytics.exe PID 1768 wrote to memory of 2756 1768 wiuanog.exe 41f73e643999a9e84a114298377765e0_NeikiAnalytics.exe PID 1768 wrote to memory of 2756 1768 wiuanog.exe 41f73e643999a9e84a114298377765e0_NeikiAnalytics.exe PID 1768 wrote to memory of 2756 1768 wiuanog.exe 41f73e643999a9e84a114298377765e0_NeikiAnalytics.exe PID 1768 wrote to memory of 2756 1768 wiuanog.exe 41f73e643999a9e84a114298377765e0_NeikiAnalytics.exe PID 1768 wrote to memory of 2756 1768 wiuanog.exe 41f73e643999a9e84a114298377765e0_NeikiAnalytics.exe PID 1768 wrote to memory of 2756 1768 wiuanog.exe 41f73e643999a9e84a114298377765e0_NeikiAnalytics.exe PID 1768 wrote to memory of 2756 1768 wiuanog.exe 41f73e643999a9e84a114298377765e0_NeikiAnalytics.exe PID 1768 wrote to memory of 2756 1768 wiuanog.exe 41f73e643999a9e84a114298377765e0_NeikiAnalytics.exe PID 1768 wrote to memory of 2756 1768 wiuanog.exe 41f73e643999a9e84a114298377765e0_NeikiAnalytics.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\41f73e643999a9e84a114298377765e0_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\41f73e643999a9e84a114298377765e0_NeikiAnalytics.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2756 -
C:\Users\Admin\wiuanog.exe"C:\Users\Admin\wiuanog.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1768
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
53KB
MD5244ea23fcfa30e1479abf9bd96928fe7
SHA198375924b9ac70085c3b556034590ed7a2adb10f
SHA25674dcd0c3a48892f83871d2d72bb91a8e7cad47f35441fe263c76e407799ede78
SHA51240073e5bfd09781333bf506f9848e69c694bb13915066a43ebcd0211d59a9d2e10c8307be5c492be88a026994c70194d35cbf1d63ffcb874582405e5fefd02d6