Analysis
-
max time kernel
150s -
max time network
103s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
22-05-2024 21:37
Static task
static1
Behavioral task
behavioral1
Sample
41f73e643999a9e84a114298377765e0_NeikiAnalytics.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
41f73e643999a9e84a114298377765e0_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
41f73e643999a9e84a114298377765e0_NeikiAnalytics.exe
-
Size
53KB
-
MD5
41f73e643999a9e84a114298377765e0
-
SHA1
c2f2b7a9b135dc73d3bd5c2dd2feb273c424dd98
-
SHA256
e1c509f68b0e8e9e4e1d1a607e1063f31ef83cb5c4cdc18e0f51d42db156fe4f
-
SHA512
2264931598ddd28e50d15ae80b9f8ce3ef59cc5ecf66adcd8415b909a2d4daa6a0f556876ac06f8e0d7a6f69e1f42a9ff470d27fd0731c9c13e7112c3b8cc310
-
SSDEEP
1536:vNkQg8r8QNcYaH6lFrmEc/MErtule7Kp3StjEMjmLM3ztDJWZsXy4JzxPME:awcYaH6lFrmEc/MErtuleJJjmLM3zRJr
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
Processes:
rdxeb.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" rdxeb.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
41f73e643999a9e84a114298377765e0_NeikiAnalytics.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation 41f73e643999a9e84a114298377765e0_NeikiAnalytics.exe -
Executes dropped EXE 1 IoCs
Processes:
rdxeb.exepid process 1936 rdxeb.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
rdxeb.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\rdxeb = "C:\\Users\\Admin\\rdxeb.exe" rdxeb.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
rdxeb.exepid process 1936 rdxeb.exe 1936 rdxeb.exe 1936 rdxeb.exe 1936 rdxeb.exe 1936 rdxeb.exe 1936 rdxeb.exe 1936 rdxeb.exe 1936 rdxeb.exe 1936 rdxeb.exe 1936 rdxeb.exe 1936 rdxeb.exe 1936 rdxeb.exe 1936 rdxeb.exe 1936 rdxeb.exe 1936 rdxeb.exe 1936 rdxeb.exe 1936 rdxeb.exe 1936 rdxeb.exe 1936 rdxeb.exe 1936 rdxeb.exe 1936 rdxeb.exe 1936 rdxeb.exe 1936 rdxeb.exe 1936 rdxeb.exe 1936 rdxeb.exe 1936 rdxeb.exe 1936 rdxeb.exe 1936 rdxeb.exe 1936 rdxeb.exe 1936 rdxeb.exe 1936 rdxeb.exe 1936 rdxeb.exe 1936 rdxeb.exe 1936 rdxeb.exe 1936 rdxeb.exe 1936 rdxeb.exe 1936 rdxeb.exe 1936 rdxeb.exe 1936 rdxeb.exe 1936 rdxeb.exe 1936 rdxeb.exe 1936 rdxeb.exe 1936 rdxeb.exe 1936 rdxeb.exe 1936 rdxeb.exe 1936 rdxeb.exe 1936 rdxeb.exe 1936 rdxeb.exe 1936 rdxeb.exe 1936 rdxeb.exe 1936 rdxeb.exe 1936 rdxeb.exe 1936 rdxeb.exe 1936 rdxeb.exe 1936 rdxeb.exe 1936 rdxeb.exe 1936 rdxeb.exe 1936 rdxeb.exe 1936 rdxeb.exe 1936 rdxeb.exe 1936 rdxeb.exe 1936 rdxeb.exe 1936 rdxeb.exe 1936 rdxeb.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
41f73e643999a9e84a114298377765e0_NeikiAnalytics.exerdxeb.exepid process 1124 41f73e643999a9e84a114298377765e0_NeikiAnalytics.exe 1936 rdxeb.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
41f73e643999a9e84a114298377765e0_NeikiAnalytics.exerdxeb.exedescription pid process target process PID 1124 wrote to memory of 1936 1124 41f73e643999a9e84a114298377765e0_NeikiAnalytics.exe rdxeb.exe PID 1124 wrote to memory of 1936 1124 41f73e643999a9e84a114298377765e0_NeikiAnalytics.exe rdxeb.exe PID 1124 wrote to memory of 1936 1124 41f73e643999a9e84a114298377765e0_NeikiAnalytics.exe rdxeb.exe PID 1936 wrote to memory of 1124 1936 rdxeb.exe 41f73e643999a9e84a114298377765e0_NeikiAnalytics.exe PID 1936 wrote to memory of 1124 1936 rdxeb.exe 41f73e643999a9e84a114298377765e0_NeikiAnalytics.exe PID 1936 wrote to memory of 1124 1936 rdxeb.exe 41f73e643999a9e84a114298377765e0_NeikiAnalytics.exe PID 1936 wrote to memory of 1124 1936 rdxeb.exe 41f73e643999a9e84a114298377765e0_NeikiAnalytics.exe PID 1936 wrote to memory of 1124 1936 rdxeb.exe 41f73e643999a9e84a114298377765e0_NeikiAnalytics.exe PID 1936 wrote to memory of 1124 1936 rdxeb.exe 41f73e643999a9e84a114298377765e0_NeikiAnalytics.exe PID 1936 wrote to memory of 1124 1936 rdxeb.exe 41f73e643999a9e84a114298377765e0_NeikiAnalytics.exe PID 1936 wrote to memory of 1124 1936 rdxeb.exe 41f73e643999a9e84a114298377765e0_NeikiAnalytics.exe PID 1936 wrote to memory of 1124 1936 rdxeb.exe 41f73e643999a9e84a114298377765e0_NeikiAnalytics.exe PID 1936 wrote to memory of 1124 1936 rdxeb.exe 41f73e643999a9e84a114298377765e0_NeikiAnalytics.exe PID 1936 wrote to memory of 1124 1936 rdxeb.exe 41f73e643999a9e84a114298377765e0_NeikiAnalytics.exe PID 1936 wrote to memory of 1124 1936 rdxeb.exe 41f73e643999a9e84a114298377765e0_NeikiAnalytics.exe PID 1936 wrote to memory of 1124 1936 rdxeb.exe 41f73e643999a9e84a114298377765e0_NeikiAnalytics.exe PID 1936 wrote to memory of 1124 1936 rdxeb.exe 41f73e643999a9e84a114298377765e0_NeikiAnalytics.exe PID 1936 wrote to memory of 1124 1936 rdxeb.exe 41f73e643999a9e84a114298377765e0_NeikiAnalytics.exe PID 1936 wrote to memory of 1124 1936 rdxeb.exe 41f73e643999a9e84a114298377765e0_NeikiAnalytics.exe PID 1936 wrote to memory of 1124 1936 rdxeb.exe 41f73e643999a9e84a114298377765e0_NeikiAnalytics.exe PID 1936 wrote to memory of 1124 1936 rdxeb.exe 41f73e643999a9e84a114298377765e0_NeikiAnalytics.exe PID 1936 wrote to memory of 1124 1936 rdxeb.exe 41f73e643999a9e84a114298377765e0_NeikiAnalytics.exe PID 1936 wrote to memory of 1124 1936 rdxeb.exe 41f73e643999a9e84a114298377765e0_NeikiAnalytics.exe PID 1936 wrote to memory of 1124 1936 rdxeb.exe 41f73e643999a9e84a114298377765e0_NeikiAnalytics.exe PID 1936 wrote to memory of 1124 1936 rdxeb.exe 41f73e643999a9e84a114298377765e0_NeikiAnalytics.exe PID 1936 wrote to memory of 1124 1936 rdxeb.exe 41f73e643999a9e84a114298377765e0_NeikiAnalytics.exe PID 1936 wrote to memory of 1124 1936 rdxeb.exe 41f73e643999a9e84a114298377765e0_NeikiAnalytics.exe PID 1936 wrote to memory of 1124 1936 rdxeb.exe 41f73e643999a9e84a114298377765e0_NeikiAnalytics.exe PID 1936 wrote to memory of 1124 1936 rdxeb.exe 41f73e643999a9e84a114298377765e0_NeikiAnalytics.exe PID 1936 wrote to memory of 1124 1936 rdxeb.exe 41f73e643999a9e84a114298377765e0_NeikiAnalytics.exe PID 1936 wrote to memory of 1124 1936 rdxeb.exe 41f73e643999a9e84a114298377765e0_NeikiAnalytics.exe PID 1936 wrote to memory of 1124 1936 rdxeb.exe 41f73e643999a9e84a114298377765e0_NeikiAnalytics.exe PID 1936 wrote to memory of 1124 1936 rdxeb.exe 41f73e643999a9e84a114298377765e0_NeikiAnalytics.exe PID 1936 wrote to memory of 1124 1936 rdxeb.exe 41f73e643999a9e84a114298377765e0_NeikiAnalytics.exe PID 1936 wrote to memory of 1124 1936 rdxeb.exe 41f73e643999a9e84a114298377765e0_NeikiAnalytics.exe PID 1936 wrote to memory of 1124 1936 rdxeb.exe 41f73e643999a9e84a114298377765e0_NeikiAnalytics.exe PID 1936 wrote to memory of 1124 1936 rdxeb.exe 41f73e643999a9e84a114298377765e0_NeikiAnalytics.exe PID 1936 wrote to memory of 1124 1936 rdxeb.exe 41f73e643999a9e84a114298377765e0_NeikiAnalytics.exe PID 1936 wrote to memory of 1124 1936 rdxeb.exe 41f73e643999a9e84a114298377765e0_NeikiAnalytics.exe PID 1936 wrote to memory of 1124 1936 rdxeb.exe 41f73e643999a9e84a114298377765e0_NeikiAnalytics.exe PID 1936 wrote to memory of 1124 1936 rdxeb.exe 41f73e643999a9e84a114298377765e0_NeikiAnalytics.exe PID 1936 wrote to memory of 1124 1936 rdxeb.exe 41f73e643999a9e84a114298377765e0_NeikiAnalytics.exe PID 1936 wrote to memory of 1124 1936 rdxeb.exe 41f73e643999a9e84a114298377765e0_NeikiAnalytics.exe PID 1936 wrote to memory of 1124 1936 rdxeb.exe 41f73e643999a9e84a114298377765e0_NeikiAnalytics.exe PID 1936 wrote to memory of 1124 1936 rdxeb.exe 41f73e643999a9e84a114298377765e0_NeikiAnalytics.exe PID 1936 wrote to memory of 1124 1936 rdxeb.exe 41f73e643999a9e84a114298377765e0_NeikiAnalytics.exe PID 1936 wrote to memory of 1124 1936 rdxeb.exe 41f73e643999a9e84a114298377765e0_NeikiAnalytics.exe PID 1936 wrote to memory of 1124 1936 rdxeb.exe 41f73e643999a9e84a114298377765e0_NeikiAnalytics.exe PID 1936 wrote to memory of 1124 1936 rdxeb.exe 41f73e643999a9e84a114298377765e0_NeikiAnalytics.exe PID 1936 wrote to memory of 1124 1936 rdxeb.exe 41f73e643999a9e84a114298377765e0_NeikiAnalytics.exe PID 1936 wrote to memory of 1124 1936 rdxeb.exe 41f73e643999a9e84a114298377765e0_NeikiAnalytics.exe PID 1936 wrote to memory of 1124 1936 rdxeb.exe 41f73e643999a9e84a114298377765e0_NeikiAnalytics.exe PID 1936 wrote to memory of 1124 1936 rdxeb.exe 41f73e643999a9e84a114298377765e0_NeikiAnalytics.exe PID 1936 wrote to memory of 1124 1936 rdxeb.exe 41f73e643999a9e84a114298377765e0_NeikiAnalytics.exe PID 1936 wrote to memory of 1124 1936 rdxeb.exe 41f73e643999a9e84a114298377765e0_NeikiAnalytics.exe PID 1936 wrote to memory of 1124 1936 rdxeb.exe 41f73e643999a9e84a114298377765e0_NeikiAnalytics.exe PID 1936 wrote to memory of 1124 1936 rdxeb.exe 41f73e643999a9e84a114298377765e0_NeikiAnalytics.exe PID 1936 wrote to memory of 1124 1936 rdxeb.exe 41f73e643999a9e84a114298377765e0_NeikiAnalytics.exe PID 1936 wrote to memory of 1124 1936 rdxeb.exe 41f73e643999a9e84a114298377765e0_NeikiAnalytics.exe PID 1936 wrote to memory of 1124 1936 rdxeb.exe 41f73e643999a9e84a114298377765e0_NeikiAnalytics.exe PID 1936 wrote to memory of 1124 1936 rdxeb.exe 41f73e643999a9e84a114298377765e0_NeikiAnalytics.exe PID 1936 wrote to memory of 1124 1936 rdxeb.exe 41f73e643999a9e84a114298377765e0_NeikiAnalytics.exe PID 1936 wrote to memory of 1124 1936 rdxeb.exe 41f73e643999a9e84a114298377765e0_NeikiAnalytics.exe PID 1936 wrote to memory of 1124 1936 rdxeb.exe 41f73e643999a9e84a114298377765e0_NeikiAnalytics.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\41f73e643999a9e84a114298377765e0_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\41f73e643999a9e84a114298377765e0_NeikiAnalytics.exe"1⤵
- Checks computer location settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1124 -
C:\Users\Admin\rdxeb.exe"C:\Users\Admin\rdxeb.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1936
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
53KB
MD52bea471dd58494d14059de1bf46a1bbc
SHA1e16c4b69bb0876bc175fd92bf9c641c26f6099a7
SHA2566dfe40415ea92b5b310d0417de8b011dc45d5fbeb08ce7bad0a10ef4434fd596
SHA5125c6a184b838b38b9f780bc547237886df74fd441338609fdb4b5d344864f19550facdbf42ddc15ddce718663f77bcb85aadc82ab15bd51bda7ebab535301d76c