Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
22-05-2024 20:03
Static task
static1
Behavioral task
behavioral1
Sample
fd7ee0e04116c9995dc33463c9df9d90_NeikiAnalytics.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
fd7ee0e04116c9995dc33463c9df9d90_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
fd7ee0e04116c9995dc33463c9df9d90_NeikiAnalytics.exe
-
Size
206KB
-
MD5
fd7ee0e04116c9995dc33463c9df9d90
-
SHA1
09bf4e2def0a4410b8827a245050b477a357d369
-
SHA256
053d1c5ae767f9ea1c14b08c547ec8d665750e8c14993dc1491f12fddc14bcc7
-
SHA512
a33244576c53c977198884131735a958cb684136edecad0bd2c5d8951acacc3d146f95582f83d666f8823c456796f01a7a1a93207888e58128b7c06c0d328cc8
-
SSDEEP
6144:f+EqFQ9A9ty5bhJcrs0MurPw/c4hd/B/coyXT3nOGX6T+:f+U9qyFhJy56d/eoyXjn9W+
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 552 svchost.exe -
Modifies WinLogon 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\1f410910 = "C:\\Windows\\apppatch\\svchost.exe" fd7ee0e04116c9995dc33463c9df9d90_NeikiAnalytics.exe -
Drops file in Program Files directory 36 IoCs
description ioc Process File created C:\Program Files (x86)\Windows Defender\qexyhuv.com svchost.exe File created C:\Program Files (x86)\Windows Defender\lyxynyx.com svchost.exe File opened for modification C:\Program Files (x86)\Windows Defender\symbols\dll\wkernelbase.pdb svchost.exe File opened for modification C:\Program Files (x86)\Windows Defender\symbols\dll\winsta.pdb svchost.exe File created C:\Program Files (x86)\Windows Defender\gatyfus.com svchost.exe File created C:\Program Files (x86)\Windows Defender\qetyhyg.com svchost.exe File opened for modification C:\Program Files (x86)\Windows Defender\wkernelbase.pdb svchost.exe File opened for modification C:\Program Files (x86)\Windows Defender\symbols\dll\wrpcrt4.pdb svchost.exe File opened for modification C:\Program Files (x86)\Windows Defender\winsta.pdb svchost.exe File created C:\Program Files (x86)\Windows Defender\lymyxid.com svchost.exe File created C:\Program Files (x86)\Windows Defender\qetyfuv.com svchost.exe File created C:\Program Files (x86)\Windows Defender\vonypom.com svchost.exe File created C:\Program Files (x86)\Windows Defender\pupycag.com svchost.exe File created C:\Program Files (x86)\Windows Defender\galynuh.com svchost.exe File opened for modification C:\Program Files (x86)\Windows Defender\dll\wkernelbase.pdb svchost.exe File opened for modification C:\Program Files (x86)\Windows Defender\dll\wrpcrt4.pdb svchost.exe File opened for modification C:\Program Files (x86)\Windows Defender\dll\winsta.pdb svchost.exe File created C:\Program Files (x86)\Windows Defender\vocyzit.com svchost.exe File opened for modification C:\Program Files (x86)\Windows Defender\symbols\DLL\wkernel32.pdb svchost.exe File created C:\Program Files (x86)\Windows Defender\qegyval.com svchost.exe File opened for modification C:\Program Files (x86)\Windows Defender\wrpcrt4.pdb svchost.exe File opened for modification C:\Program Files (x86)\Windows Defender\wkernel32.pdb svchost.exe File created C:\Program Files (x86)\Windows Defender\galyqaz.com svchost.exe File opened for modification C:\Program Files (x86)\Windows Defender\WinSCard.pdb svchost.exe File opened for modification C:\Program Files (x86)\Windows Defender\dll\WinSCard.pdb svchost.exe File opened for modification C:\Program Files (x86)\Windows Defender\DLL\wkernel32.pdb svchost.exe File created C:\Program Files (x86)\Windows Defender\gadyciz.com svchost.exe File created C:\Program Files (x86)\Windows Defender\pupydeq.com svchost.exe File created C:\Program Files (x86)\Windows Defender\lygyvuj.com svchost.exe File created C:\Program Files (x86)\Windows Defender\gahyhiz.com svchost.exe File opened for modification C:\Program Files (x86)\Windows Defender\wntdll.pdb svchost.exe File opened for modification C:\Program Files (x86)\Windows Defender\dll\wntdll.pdb svchost.exe File created C:\Program Files (x86)\Windows Defender\vofycot.com svchost.exe File opened for modification C:\Program Files (x86)\Windows Defender\symbols\dll\WinSCard.pdb svchost.exe File opened for modification C:\Program Files (x86)\Windows Defender\symbols\dll\wntdll.pdb svchost.exe File created C:\Program Files (x86)\Windows Defender\gahyqah.com svchost.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\apppatch\svchost.exe fd7ee0e04116c9995dc33463c9df9d90_NeikiAnalytics.exe File opened for modification C:\Windows\apppatch\svchost.exe fd7ee0e04116c9995dc33463c9df9d90_NeikiAnalytics.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000_Classes\Local Settings\MuiCache svchost.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 552 svchost.exe 552 svchost.exe 552 svchost.exe 552 svchost.exe 552 svchost.exe 552 svchost.exe 552 svchost.exe 552 svchost.exe 552 svchost.exe 552 svchost.exe 552 svchost.exe 552 svchost.exe 552 svchost.exe 552 svchost.exe 552 svchost.exe 552 svchost.exe 552 svchost.exe 552 svchost.exe 552 svchost.exe 552 svchost.exe 552 svchost.exe 552 svchost.exe 552 svchost.exe 552 svchost.exe 552 svchost.exe 552 svchost.exe 552 svchost.exe 552 svchost.exe 552 svchost.exe 552 svchost.exe 552 svchost.exe 552 svchost.exe 552 svchost.exe 552 svchost.exe 552 svchost.exe 552 svchost.exe 552 svchost.exe 552 svchost.exe 552 svchost.exe 552 svchost.exe 552 svchost.exe 552 svchost.exe 552 svchost.exe 552 svchost.exe 552 svchost.exe 552 svchost.exe 552 svchost.exe 552 svchost.exe 552 svchost.exe 552 svchost.exe 552 svchost.exe 552 svchost.exe 552 svchost.exe 552 svchost.exe 552 svchost.exe 552 svchost.exe 552 svchost.exe 552 svchost.exe 552 svchost.exe 552 svchost.exe 552 svchost.exe 552 svchost.exe 552 svchost.exe 552 svchost.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 5076 fd7ee0e04116c9995dc33463c9df9d90_NeikiAnalytics.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeSecurityPrivilege 5076 fd7ee0e04116c9995dc33463c9df9d90_NeikiAnalytics.exe Token: SeSecurityPrivilege 5076 fd7ee0e04116c9995dc33463c9df9d90_NeikiAnalytics.exe Token: SeSecurityPrivilege 552 svchost.exe Token: SeSecurityPrivilege 552 svchost.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 5076 wrote to memory of 552 5076 fd7ee0e04116c9995dc33463c9df9d90_NeikiAnalytics.exe 92 PID 5076 wrote to memory of 552 5076 fd7ee0e04116c9995dc33463c9df9d90_NeikiAnalytics.exe 92 PID 5076 wrote to memory of 552 5076 fd7ee0e04116c9995dc33463c9df9d90_NeikiAnalytics.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\fd7ee0e04116c9995dc33463c9df9d90_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\fd7ee0e04116c9995dc33463c9df9d90_NeikiAnalytics.exe"1⤵
- Modifies WinLogon
- Drops file in Windows directory
- Suspicious behavior: RenamesItself
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5076 -
C:\Windows\apppatch\svchost.exe"C:\Windows\apppatch\svchost.exe"2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:552
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --field-trial-handle=4104,i,10373433614523925616,13586256558317053467,262144 --variations-seed-version --mojo-platform-channel-handle=4268 /prefetch:81⤵PID:1524
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
168B
MD5d57e3a550060f85d44a175139ea23021
SHA12c5cb3428a322c9709a34d04dd86fe7628f8f0a6
SHA25643edf068d34276e8ade4113d4d7207de19fc98a2ae1c07298e593edae2a8774c
SHA5120364fe6a010fce7a3f4a6344c84468c64b20fd131f3160fc649db78f1075ba52d8a1c4496e50dbe27c357e01ee52e94cdcda8f7927cba28d5f2f45b9da690063
-
Filesize
206KB
MD53943f495c6701706e7ad87b7ad1ba5b1
SHA110485d2ffeb446c633e157bc0009a94745ec7ddb
SHA2567cda90e722ebdfa95f1888fad421d532771a8a8fbb9fa53581333441311efd4c
SHA5120713444eaafa479a5474904a2d79ee0b0b1f0e060a546c82e2b838ca1d86c488cbec7d81a1e38d8887fa337dc35f437ba199a2c12b1e8da0777efa123c70dc92