Analysis
-
max time kernel
149s -
max time network
113s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
22-05-2024 20:17
Static task
static1
Behavioral task
behavioral1
Sample
696b32619485cd29639eec31e7223540_NeikiAnalytics.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
696b32619485cd29639eec31e7223540_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
696b32619485cd29639eec31e7223540_NeikiAnalytics.exe
-
Size
410KB
-
MD5
696b32619485cd29639eec31e7223540
-
SHA1
ee00c37cbcab78c556f65e97c07d8c6c1031574e
-
SHA256
11e5e06df2e6fbf29947e9157436b5fb933b5ca8897d040f905020b271e79fbd
-
SHA512
d5d126a01ab78a37de5ea1c26029d67de03e79073264b190095285148003c3c55dc7b0547aea79cb3c12b4613012d7db4bdeb03507225fc8e80bf1ac5f6de6f1
-
SSDEEP
12288:CxIK9V14ImyHYog7YYbt/uzyZguOTx76BDNlhDJN6yRvLX:CJEyYt7YJb7676yRvz
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
iklwq.exepid process 4972 iklwq.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
iklwq.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Microsoft® Windows® Operating System = "C:\\ProgramData\\iklwq.exe" iklwq.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
696b32619485cd29639eec31e7223540_NeikiAnalytics.exedescription pid process target process PID 3652 wrote to memory of 4972 3652 696b32619485cd29639eec31e7223540_NeikiAnalytics.exe iklwq.exe PID 3652 wrote to memory of 4972 3652 696b32619485cd29639eec31e7223540_NeikiAnalytics.exe iklwq.exe PID 3652 wrote to memory of 4972 3652 696b32619485cd29639eec31e7223540_NeikiAnalytics.exe iklwq.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\696b32619485cd29639eec31e7223540_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\696b32619485cd29639eec31e7223540_NeikiAnalytics.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3652 -
C:\ProgramData\iklwq.exe"C:\ProgramData\iklwq.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:4972
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
410KB
MD525faf87e70ab89c3d2d749722bbdb06d
SHA1fd7d0d4bdd060d8566c8b3552406e3a92c778ae1
SHA25693a37bad2a93005cd556c761ac7d707386ad1bc219a5ed1853f569ff00af06df
SHA51214eac99e6216b9b48f24d0db092b70236fa4eccde22fa157b34906d63769cd9e600ad6f4bc9f8ecb3b71dfd35b8526a4629c04b0bface9eaa1bbec04d7686eab
-
Filesize
150KB
MD5aef10b9ba25f907727558514f2dfbab0
SHA1d67383ef1b23d4da72339d66de9541c2e1efaf53
SHA256f5e77ddc706f6dffe056dc2f8a88adece36e0e4552bc70a85f36b1e01fe547ad
SHA5125e607a70ca3fa489897f8df0c96570709839364cd8cabd5f76386dfff01ca2986d50c120cf82926dff950c7d7b6ec833ea7558b64ec8f0dfe2e5070abf1da103
-
Filesize
259KB
MD5e34821240404a8b9b07f3406653a8ac9
SHA1d04a2b60f95d06e0dfefcd9472bf604e19925438
SHA256c36568373cb7b7c79f441078458a299aaad196bd9174ff35c1af1947d5914c69
SHA512e24b83a03065d561cb681e787fda20cb9509c79181c545710ab77d9cbb15d3488411df1ea7662dbeb46e9445589b1ba69a2a15bc8ad7dd36dfdd8b7e6ffec42c