Analysis
-
max time kernel
145s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
22-05-2024 04:15
Static task
static1
Behavioral task
behavioral1
Sample
1b797600bd2e90cc098866df3b9d5290_NeikiAnalytics.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
1b797600bd2e90cc098866df3b9d5290_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
1b797600bd2e90cc098866df3b9d5290_NeikiAnalytics.exe
-
Size
1.3MB
-
MD5
1b797600bd2e90cc098866df3b9d5290
-
SHA1
ae33f1236d6011b114ba73c264ce6ea4fe7b6db4
-
SHA256
04c05da1d0c3780c83b7468acb63916086f75dd82f9fa6b597e2acb07a1021b8
-
SHA512
d6ad79c3bb164a7763291092bdee8e4534dd47b861888ced1bce3845ffe5e11c9429d012478f27e2948c4187631f3d8219346fdec7934fb171aa8216ef8211d0
-
SSDEEP
24576:0/ApeDWpzxyLt1Y1o5n4s0Ab7Ixb0wiqu86LIzfWZB0vxI0:04xat1moBHcOwimtZH
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 3060 285D9.exe 2440 285D9.exe -
Loads dropped DLL 2 IoCs
pid Process 2960 1b797600bd2e90cc098866df3b9d5290_NeikiAnalytics.exe 2960 1b797600bd2e90cc098866df3b9d5290_NeikiAnalytics.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Run\Windows Update = "C:\\Users\\Admin\\AppData\\Roaming\\285D9.exe" reg.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3060 set thread context of 2440 3060 285D9.exe 32 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry key 1 TTPs 1 IoCs
pid Process 2156 reg.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2640 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2640 AcroRd32.exe 2640 AcroRd32.exe 2640 AcroRd32.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 2960 wrote to memory of 2156 2960 1b797600bd2e90cc098866df3b9d5290_NeikiAnalytics.exe 28 PID 2960 wrote to memory of 2156 2960 1b797600bd2e90cc098866df3b9d5290_NeikiAnalytics.exe 28 PID 2960 wrote to memory of 2156 2960 1b797600bd2e90cc098866df3b9d5290_NeikiAnalytics.exe 28 PID 2960 wrote to memory of 2156 2960 1b797600bd2e90cc098866df3b9d5290_NeikiAnalytics.exe 28 PID 2960 wrote to memory of 3060 2960 1b797600bd2e90cc098866df3b9d5290_NeikiAnalytics.exe 30 PID 2960 wrote to memory of 3060 2960 1b797600bd2e90cc098866df3b9d5290_NeikiAnalytics.exe 30 PID 2960 wrote to memory of 3060 2960 1b797600bd2e90cc098866df3b9d5290_NeikiAnalytics.exe 30 PID 2960 wrote to memory of 3060 2960 1b797600bd2e90cc098866df3b9d5290_NeikiAnalytics.exe 30 PID 2960 wrote to memory of 2640 2960 1b797600bd2e90cc098866df3b9d5290_NeikiAnalytics.exe 31 PID 2960 wrote to memory of 2640 2960 1b797600bd2e90cc098866df3b9d5290_NeikiAnalytics.exe 31 PID 2960 wrote to memory of 2640 2960 1b797600bd2e90cc098866df3b9d5290_NeikiAnalytics.exe 31 PID 2960 wrote to memory of 2640 2960 1b797600bd2e90cc098866df3b9d5290_NeikiAnalytics.exe 31 PID 3060 wrote to memory of 2440 3060 285D9.exe 32 PID 3060 wrote to memory of 2440 3060 285D9.exe 32 PID 3060 wrote to memory of 2440 3060 285D9.exe 32 PID 3060 wrote to memory of 2440 3060 285D9.exe 32 PID 3060 wrote to memory of 2440 3060 285D9.exe 32 PID 3060 wrote to memory of 2440 3060 285D9.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\1b797600bd2e90cc098866df3b9d5290_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\1b797600bd2e90cc098866df3b9d5290_NeikiAnalytics.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2960 -
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /v "Windows Update" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\285D9.exe" /f2⤵
- Adds Run key to start application
- Modifies registry key
PID:2156
-
-
C:\Users\Admin\AppData\Roaming\285D9.exe"C:\Users\Admin\AppData\Roaming\285D9.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3060 -
C:\Users\Admin\AppData\Roaming\285D9.exe"C:\Users\Admin\AppData\Roaming\285D9.exe"3⤵
- Executes dropped EXE
PID:2440
-
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Roaming\fiore.pdf"2⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2640
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD53c9f505d1750cd7ac4ae7614256ed860
SHA1c8efe838560155b3c51b71fafc567979ba2ca902
SHA2565edfbddca5d5984b62c342151853295bb4455a6861777d0ae27b2533ec814943
SHA5120a5b077d92fd45edb78b624b0735336ab43358e04840235437eecb169fec92f641a4ab6a7e7d97c51596d03126b0176ec5c19e78fc8169bf4dce3e0898b827c6
-
Filesize
209KB
MD58a7db5362268dd64b9cec01fd99db7c5
SHA13c27053b7309527659ed0c07fa986516a14b2d3c
SHA2568bc7bbfc60dba3928611f77d80508bbf77762657d6be35106146830b5fe5edc5
SHA512c17d9b58e7246938e66d52d65bd6a54eaa22b932023b1dcd8a34c0b2ac82e8f91f4c5ade12f7a1857c5c36f30aeec2c650a1f9b087627725cfd3613a4f683036
-
Filesize
1.3MB
MD51af92457d8734c640196de6b3a59557e
SHA18c861d29c894f9baa84e20c3441cf74878ead7d7
SHA256b56dcd0330fcdea98d26d99adf697f01075740dbcc6598afa0d10403f0aa32a2
SHA512f9158b0eea4a97c43af2891d7911042fea7c8affb5a39db1a5cbdda575493a80be4b5749bfe5caa8401238a0a26cdea4e1e181a40778b6d5b70b7199dc3af6d1