Analysis
-
max time kernel
121s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
22-05-2024 23:48
Static task
static1
Behavioral task
behavioral1
Sample
5b6ac7506801860708ded99e9e853e90_NeikiAnalytics.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
5b6ac7506801860708ded99e9e853e90_NeikiAnalytics.exe
Resource
win10v2004-20240426-en
General
-
Target
5b6ac7506801860708ded99e9e853e90_NeikiAnalytics.exe
-
Size
2.2MB
-
MD5
5b6ac7506801860708ded99e9e853e90
-
SHA1
a0fb60df467f30e363f50415aca4d3bdb1bc1279
-
SHA256
c5763ac37f7e6584d7c77112bb21e5fc4f54c67240e8ab53ea3728fba7907d39
-
SHA512
42bb8bb51fbfc326b846e6a835adcd4c5ab390b2b2f0f5c0371e910dc56506cd54fec0c20a36941580aa8368eb450c52fedeaa63022907279b7f2de6d050232e
-
SSDEEP
49152:mW94v+AWYCIl1lwdQ/etn5HfH1hLQ/NE25OqCWViCAB:bJAWYll1lwd/npPLm+PRW
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
Processes:
MsiExec.exepid process 2656 MsiExec.exe -
Enumerates connected drives 3 TTPs 46 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
msiexec.exemsiexec.exedescription ioc process File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\K: msiexec.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
msiexec.exepid process 2344 msiexec.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
msiexec.exemsiexec.exedescription pid process Token: SeShutdownPrivilege 2344 msiexec.exe Token: SeIncreaseQuotaPrivilege 2344 msiexec.exe Token: SeRestorePrivilege 2540 msiexec.exe Token: SeTakeOwnershipPrivilege 2540 msiexec.exe Token: SeSecurityPrivilege 2540 msiexec.exe Token: SeCreateTokenPrivilege 2344 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 2344 msiexec.exe Token: SeLockMemoryPrivilege 2344 msiexec.exe Token: SeIncreaseQuotaPrivilege 2344 msiexec.exe Token: SeMachineAccountPrivilege 2344 msiexec.exe Token: SeTcbPrivilege 2344 msiexec.exe Token: SeSecurityPrivilege 2344 msiexec.exe Token: SeTakeOwnershipPrivilege 2344 msiexec.exe Token: SeLoadDriverPrivilege 2344 msiexec.exe Token: SeSystemProfilePrivilege 2344 msiexec.exe Token: SeSystemtimePrivilege 2344 msiexec.exe Token: SeProfSingleProcessPrivilege 2344 msiexec.exe Token: SeIncBasePriorityPrivilege 2344 msiexec.exe Token: SeCreatePagefilePrivilege 2344 msiexec.exe Token: SeCreatePermanentPrivilege 2344 msiexec.exe Token: SeBackupPrivilege 2344 msiexec.exe Token: SeRestorePrivilege 2344 msiexec.exe Token: SeShutdownPrivilege 2344 msiexec.exe Token: SeDebugPrivilege 2344 msiexec.exe Token: SeAuditPrivilege 2344 msiexec.exe Token: SeSystemEnvironmentPrivilege 2344 msiexec.exe Token: SeChangeNotifyPrivilege 2344 msiexec.exe Token: SeRemoteShutdownPrivilege 2344 msiexec.exe Token: SeUndockPrivilege 2344 msiexec.exe Token: SeSyncAgentPrivilege 2344 msiexec.exe Token: SeEnableDelegationPrivilege 2344 msiexec.exe Token: SeManageVolumePrivilege 2344 msiexec.exe Token: SeImpersonatePrivilege 2344 msiexec.exe Token: SeCreateGlobalPrivilege 2344 msiexec.exe Token: SeCreateTokenPrivilege 2344 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 2344 msiexec.exe Token: SeLockMemoryPrivilege 2344 msiexec.exe Token: SeIncreaseQuotaPrivilege 2344 msiexec.exe Token: SeMachineAccountPrivilege 2344 msiexec.exe Token: SeTcbPrivilege 2344 msiexec.exe Token: SeSecurityPrivilege 2344 msiexec.exe Token: SeTakeOwnershipPrivilege 2344 msiexec.exe Token: SeLoadDriverPrivilege 2344 msiexec.exe Token: SeSystemProfilePrivilege 2344 msiexec.exe Token: SeSystemtimePrivilege 2344 msiexec.exe Token: SeProfSingleProcessPrivilege 2344 msiexec.exe Token: SeIncBasePriorityPrivilege 2344 msiexec.exe Token: SeCreatePagefilePrivilege 2344 msiexec.exe Token: SeCreatePermanentPrivilege 2344 msiexec.exe Token: SeBackupPrivilege 2344 msiexec.exe Token: SeRestorePrivilege 2344 msiexec.exe Token: SeShutdownPrivilege 2344 msiexec.exe Token: SeDebugPrivilege 2344 msiexec.exe Token: SeAuditPrivilege 2344 msiexec.exe Token: SeSystemEnvironmentPrivilege 2344 msiexec.exe Token: SeChangeNotifyPrivilege 2344 msiexec.exe Token: SeRemoteShutdownPrivilege 2344 msiexec.exe Token: SeUndockPrivilege 2344 msiexec.exe Token: SeSyncAgentPrivilege 2344 msiexec.exe Token: SeEnableDelegationPrivilege 2344 msiexec.exe Token: SeManageVolumePrivilege 2344 msiexec.exe Token: SeImpersonatePrivilege 2344 msiexec.exe Token: SeCreateGlobalPrivilege 2344 msiexec.exe Token: SeCreateTokenPrivilege 2344 msiexec.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
msiexec.exepid process 2344 msiexec.exe -
Suspicious use of WriteProcessMemory 14 IoCs
Processes:
5b6ac7506801860708ded99e9e853e90_NeikiAnalytics.exemsiexec.exedescription pid process target process PID 2696 wrote to memory of 2344 2696 5b6ac7506801860708ded99e9e853e90_NeikiAnalytics.exe msiexec.exe PID 2696 wrote to memory of 2344 2696 5b6ac7506801860708ded99e9e853e90_NeikiAnalytics.exe msiexec.exe PID 2696 wrote to memory of 2344 2696 5b6ac7506801860708ded99e9e853e90_NeikiAnalytics.exe msiexec.exe PID 2696 wrote to memory of 2344 2696 5b6ac7506801860708ded99e9e853e90_NeikiAnalytics.exe msiexec.exe PID 2696 wrote to memory of 2344 2696 5b6ac7506801860708ded99e9e853e90_NeikiAnalytics.exe msiexec.exe PID 2696 wrote to memory of 2344 2696 5b6ac7506801860708ded99e9e853e90_NeikiAnalytics.exe msiexec.exe PID 2696 wrote to memory of 2344 2696 5b6ac7506801860708ded99e9e853e90_NeikiAnalytics.exe msiexec.exe PID 2540 wrote to memory of 2656 2540 msiexec.exe MsiExec.exe PID 2540 wrote to memory of 2656 2540 msiexec.exe MsiExec.exe PID 2540 wrote to memory of 2656 2540 msiexec.exe MsiExec.exe PID 2540 wrote to memory of 2656 2540 msiexec.exe MsiExec.exe PID 2540 wrote to memory of 2656 2540 msiexec.exe MsiExec.exe PID 2540 wrote to memory of 2656 2540 msiexec.exe MsiExec.exe PID 2540 wrote to memory of 2656 2540 msiexec.exe MsiExec.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\5b6ac7506801860708ded99e9e853e90_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\5b6ac7506801860708ded99e9e853e90_NeikiAnalytics.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2696 -
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\System32\msiexec.exe" /i "C:\Users\Admin\AppData\Local\Temp\setup.msi"2⤵
- Enumerates connected drives
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:2344
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Enumerates connected drives
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2540 -
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 5C9F479946240B1443A31CCF33A452BA C2⤵
- Loads dropped DLL
PID:2656
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6KB
MD5078f637d0fe4ed0375ce4ed3a067b814
SHA100e9f95a60145ccc04095601dd49b663e987c588
SHA2565e7e010023cd0373fcb4fa0fb2d7ff328a53295f6b2fdb9ff805854e6410fbcc
SHA51220b531d3dcbafe9d815633b6cc20cd53ca2b8854183ff72e2f7c1fbf3ac23a3cf70a3271e55b30156de341af785a1b2411c0d76aaf08e4e2c426b8e4a551ecc5
-
Filesize
167KB
MD5b400ceb855c02706a0aab7fe04d88874
SHA17d94b32c3872509ab48d323f1dc6970fbb4a6ced
SHA2560d0cbe96167970f698586269325e8321f91a3d2d5f2afd149f34eebbed2a36ae
SHA512736295deef177f9b67826cd76eaa7ddd1e0bf403d22cff2dddcda4a0968e4889057a1500a373759c27f06456072f66f8eb4fd1e76d3c26660b4ac320b440d054