Analysis
-
max time kernel
150s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
22-05-2024 22:54
Static task
static1
Behavioral task
behavioral1
Sample
51a9d876524dc7c884a5b3d0e6123b90_NeikiAnalytics.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
51a9d876524dc7c884a5b3d0e6123b90_NeikiAnalytics.exe
Resource
win10v2004-20240226-en
General
-
Target
51a9d876524dc7c884a5b3d0e6123b90_NeikiAnalytics.exe
-
Size
53KB
-
MD5
51a9d876524dc7c884a5b3d0e6123b90
-
SHA1
f406dfe33b715a9a2744a5f00478ba9b9ad4ee17
-
SHA256
93fa9cc7ec78e0c198e680677dbd35e1493bbc5860c262e29f3ba66e24d7c1ae
-
SHA512
6b9724f351a2792aa275403f15e36497a2b67df5e068ee4eafff765ba75936dc6015a0aa34bfd7b43982d8ce2d6c0439ccad8e06c70259ffb884890399d36f0e
-
SSDEEP
1536:vNLg8r8QCml3nP7Kp3StjEMjmLM3ztDJWZsXy4JzxPM0:UmlXPJJjmLM3zRJWZsXy4J9
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
Processes:
poveb.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" poveb.exe -
Executes dropped EXE 1 IoCs
Processes:
poveb.exepid process 1964 poveb.exe -
Loads dropped DLL 2 IoCs
Processes:
51a9d876524dc7c884a5b3d0e6123b90_NeikiAnalytics.exepid process 1608 51a9d876524dc7c884a5b3d0e6123b90_NeikiAnalytics.exe 1608 51a9d876524dc7c884a5b3d0e6123b90_NeikiAnalytics.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
poveb.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Run\poveb = "C:\\Users\\Admin\\poveb.exe" poveb.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
poveb.exepid process 1964 poveb.exe 1964 poveb.exe 1964 poveb.exe 1964 poveb.exe 1964 poveb.exe 1964 poveb.exe 1964 poveb.exe 1964 poveb.exe 1964 poveb.exe 1964 poveb.exe 1964 poveb.exe 1964 poveb.exe 1964 poveb.exe 1964 poveb.exe 1964 poveb.exe 1964 poveb.exe 1964 poveb.exe 1964 poveb.exe 1964 poveb.exe 1964 poveb.exe 1964 poveb.exe 1964 poveb.exe 1964 poveb.exe 1964 poveb.exe 1964 poveb.exe 1964 poveb.exe 1964 poveb.exe 1964 poveb.exe 1964 poveb.exe 1964 poveb.exe 1964 poveb.exe 1964 poveb.exe 1964 poveb.exe 1964 poveb.exe 1964 poveb.exe 1964 poveb.exe 1964 poveb.exe 1964 poveb.exe 1964 poveb.exe 1964 poveb.exe 1964 poveb.exe 1964 poveb.exe 1964 poveb.exe 1964 poveb.exe 1964 poveb.exe 1964 poveb.exe 1964 poveb.exe 1964 poveb.exe 1964 poveb.exe 1964 poveb.exe 1964 poveb.exe 1964 poveb.exe 1964 poveb.exe 1964 poveb.exe 1964 poveb.exe 1964 poveb.exe 1964 poveb.exe 1964 poveb.exe 1964 poveb.exe 1964 poveb.exe 1964 poveb.exe 1964 poveb.exe 1964 poveb.exe 1964 poveb.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
51a9d876524dc7c884a5b3d0e6123b90_NeikiAnalytics.exepoveb.exepid process 1608 51a9d876524dc7c884a5b3d0e6123b90_NeikiAnalytics.exe 1964 poveb.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
51a9d876524dc7c884a5b3d0e6123b90_NeikiAnalytics.exepoveb.exedescription pid process target process PID 1608 wrote to memory of 1964 1608 51a9d876524dc7c884a5b3d0e6123b90_NeikiAnalytics.exe poveb.exe PID 1608 wrote to memory of 1964 1608 51a9d876524dc7c884a5b3d0e6123b90_NeikiAnalytics.exe poveb.exe PID 1608 wrote to memory of 1964 1608 51a9d876524dc7c884a5b3d0e6123b90_NeikiAnalytics.exe poveb.exe PID 1608 wrote to memory of 1964 1608 51a9d876524dc7c884a5b3d0e6123b90_NeikiAnalytics.exe poveb.exe PID 1964 wrote to memory of 1608 1964 poveb.exe 51a9d876524dc7c884a5b3d0e6123b90_NeikiAnalytics.exe PID 1964 wrote to memory of 1608 1964 poveb.exe 51a9d876524dc7c884a5b3d0e6123b90_NeikiAnalytics.exe PID 1964 wrote to memory of 1608 1964 poveb.exe 51a9d876524dc7c884a5b3d0e6123b90_NeikiAnalytics.exe PID 1964 wrote to memory of 1608 1964 poveb.exe 51a9d876524dc7c884a5b3d0e6123b90_NeikiAnalytics.exe PID 1964 wrote to memory of 1608 1964 poveb.exe 51a9d876524dc7c884a5b3d0e6123b90_NeikiAnalytics.exe PID 1964 wrote to memory of 1608 1964 poveb.exe 51a9d876524dc7c884a5b3d0e6123b90_NeikiAnalytics.exe PID 1964 wrote to memory of 1608 1964 poveb.exe 51a9d876524dc7c884a5b3d0e6123b90_NeikiAnalytics.exe PID 1964 wrote to memory of 1608 1964 poveb.exe 51a9d876524dc7c884a5b3d0e6123b90_NeikiAnalytics.exe PID 1964 wrote to memory of 1608 1964 poveb.exe 51a9d876524dc7c884a5b3d0e6123b90_NeikiAnalytics.exe PID 1964 wrote to memory of 1608 1964 poveb.exe 51a9d876524dc7c884a5b3d0e6123b90_NeikiAnalytics.exe PID 1964 wrote to memory of 1608 1964 poveb.exe 51a9d876524dc7c884a5b3d0e6123b90_NeikiAnalytics.exe PID 1964 wrote to memory of 1608 1964 poveb.exe 51a9d876524dc7c884a5b3d0e6123b90_NeikiAnalytics.exe PID 1964 wrote to memory of 1608 1964 poveb.exe 51a9d876524dc7c884a5b3d0e6123b90_NeikiAnalytics.exe PID 1964 wrote to memory of 1608 1964 poveb.exe 51a9d876524dc7c884a5b3d0e6123b90_NeikiAnalytics.exe PID 1964 wrote to memory of 1608 1964 poveb.exe 51a9d876524dc7c884a5b3d0e6123b90_NeikiAnalytics.exe PID 1964 wrote to memory of 1608 1964 poveb.exe 51a9d876524dc7c884a5b3d0e6123b90_NeikiAnalytics.exe PID 1964 wrote to memory of 1608 1964 poveb.exe 51a9d876524dc7c884a5b3d0e6123b90_NeikiAnalytics.exe PID 1964 wrote to memory of 1608 1964 poveb.exe 51a9d876524dc7c884a5b3d0e6123b90_NeikiAnalytics.exe PID 1964 wrote to memory of 1608 1964 poveb.exe 51a9d876524dc7c884a5b3d0e6123b90_NeikiAnalytics.exe PID 1964 wrote to memory of 1608 1964 poveb.exe 51a9d876524dc7c884a5b3d0e6123b90_NeikiAnalytics.exe PID 1964 wrote to memory of 1608 1964 poveb.exe 51a9d876524dc7c884a5b3d0e6123b90_NeikiAnalytics.exe PID 1964 wrote to memory of 1608 1964 poveb.exe 51a9d876524dc7c884a5b3d0e6123b90_NeikiAnalytics.exe PID 1964 wrote to memory of 1608 1964 poveb.exe 51a9d876524dc7c884a5b3d0e6123b90_NeikiAnalytics.exe PID 1964 wrote to memory of 1608 1964 poveb.exe 51a9d876524dc7c884a5b3d0e6123b90_NeikiAnalytics.exe PID 1964 wrote to memory of 1608 1964 poveb.exe 51a9d876524dc7c884a5b3d0e6123b90_NeikiAnalytics.exe PID 1964 wrote to memory of 1608 1964 poveb.exe 51a9d876524dc7c884a5b3d0e6123b90_NeikiAnalytics.exe PID 1964 wrote to memory of 1608 1964 poveb.exe 51a9d876524dc7c884a5b3d0e6123b90_NeikiAnalytics.exe PID 1964 wrote to memory of 1608 1964 poveb.exe 51a9d876524dc7c884a5b3d0e6123b90_NeikiAnalytics.exe PID 1964 wrote to memory of 1608 1964 poveb.exe 51a9d876524dc7c884a5b3d0e6123b90_NeikiAnalytics.exe PID 1964 wrote to memory of 1608 1964 poveb.exe 51a9d876524dc7c884a5b3d0e6123b90_NeikiAnalytics.exe PID 1964 wrote to memory of 1608 1964 poveb.exe 51a9d876524dc7c884a5b3d0e6123b90_NeikiAnalytics.exe PID 1964 wrote to memory of 1608 1964 poveb.exe 51a9d876524dc7c884a5b3d0e6123b90_NeikiAnalytics.exe PID 1964 wrote to memory of 1608 1964 poveb.exe 51a9d876524dc7c884a5b3d0e6123b90_NeikiAnalytics.exe PID 1964 wrote to memory of 1608 1964 poveb.exe 51a9d876524dc7c884a5b3d0e6123b90_NeikiAnalytics.exe PID 1964 wrote to memory of 1608 1964 poveb.exe 51a9d876524dc7c884a5b3d0e6123b90_NeikiAnalytics.exe PID 1964 wrote to memory of 1608 1964 poveb.exe 51a9d876524dc7c884a5b3d0e6123b90_NeikiAnalytics.exe PID 1964 wrote to memory of 1608 1964 poveb.exe 51a9d876524dc7c884a5b3d0e6123b90_NeikiAnalytics.exe PID 1964 wrote to memory of 1608 1964 poveb.exe 51a9d876524dc7c884a5b3d0e6123b90_NeikiAnalytics.exe PID 1964 wrote to memory of 1608 1964 poveb.exe 51a9d876524dc7c884a5b3d0e6123b90_NeikiAnalytics.exe PID 1964 wrote to memory of 1608 1964 poveb.exe 51a9d876524dc7c884a5b3d0e6123b90_NeikiAnalytics.exe PID 1964 wrote to memory of 1608 1964 poveb.exe 51a9d876524dc7c884a5b3d0e6123b90_NeikiAnalytics.exe PID 1964 wrote to memory of 1608 1964 poveb.exe 51a9d876524dc7c884a5b3d0e6123b90_NeikiAnalytics.exe PID 1964 wrote to memory of 1608 1964 poveb.exe 51a9d876524dc7c884a5b3d0e6123b90_NeikiAnalytics.exe PID 1964 wrote to memory of 1608 1964 poveb.exe 51a9d876524dc7c884a5b3d0e6123b90_NeikiAnalytics.exe PID 1964 wrote to memory of 1608 1964 poveb.exe 51a9d876524dc7c884a5b3d0e6123b90_NeikiAnalytics.exe PID 1964 wrote to memory of 1608 1964 poveb.exe 51a9d876524dc7c884a5b3d0e6123b90_NeikiAnalytics.exe PID 1964 wrote to memory of 1608 1964 poveb.exe 51a9d876524dc7c884a5b3d0e6123b90_NeikiAnalytics.exe PID 1964 wrote to memory of 1608 1964 poveb.exe 51a9d876524dc7c884a5b3d0e6123b90_NeikiAnalytics.exe PID 1964 wrote to memory of 1608 1964 poveb.exe 51a9d876524dc7c884a5b3d0e6123b90_NeikiAnalytics.exe PID 1964 wrote to memory of 1608 1964 poveb.exe 51a9d876524dc7c884a5b3d0e6123b90_NeikiAnalytics.exe PID 1964 wrote to memory of 1608 1964 poveb.exe 51a9d876524dc7c884a5b3d0e6123b90_NeikiAnalytics.exe PID 1964 wrote to memory of 1608 1964 poveb.exe 51a9d876524dc7c884a5b3d0e6123b90_NeikiAnalytics.exe PID 1964 wrote to memory of 1608 1964 poveb.exe 51a9d876524dc7c884a5b3d0e6123b90_NeikiAnalytics.exe PID 1964 wrote to memory of 1608 1964 poveb.exe 51a9d876524dc7c884a5b3d0e6123b90_NeikiAnalytics.exe PID 1964 wrote to memory of 1608 1964 poveb.exe 51a9d876524dc7c884a5b3d0e6123b90_NeikiAnalytics.exe PID 1964 wrote to memory of 1608 1964 poveb.exe 51a9d876524dc7c884a5b3d0e6123b90_NeikiAnalytics.exe PID 1964 wrote to memory of 1608 1964 poveb.exe 51a9d876524dc7c884a5b3d0e6123b90_NeikiAnalytics.exe PID 1964 wrote to memory of 1608 1964 poveb.exe 51a9d876524dc7c884a5b3d0e6123b90_NeikiAnalytics.exe PID 1964 wrote to memory of 1608 1964 poveb.exe 51a9d876524dc7c884a5b3d0e6123b90_NeikiAnalytics.exe PID 1964 wrote to memory of 1608 1964 poveb.exe 51a9d876524dc7c884a5b3d0e6123b90_NeikiAnalytics.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\51a9d876524dc7c884a5b3d0e6123b90_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\51a9d876524dc7c884a5b3d0e6123b90_NeikiAnalytics.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1608 -
C:\Users\Admin\poveb.exe"C:\Users\Admin\poveb.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1964
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
53KB
MD5761fd9d60b36c3540f6f2505622cffd1
SHA108338b5977c389a71a9a400873983e166df85284
SHA25658e345172146a24769dc060d48011e8d991db4592e76225bfdf3c9cee2de48a8
SHA51295460bb3b0ba896c8a231300a6985db94b3cf2c0bed695cfbc96d8b3e5c0ff3e39189c238957b8f0287b5be1056b594a05e8ab908e0e1c798c641dec178e3d08