Analysis
-
max time kernel
149s -
max time network
124s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
22-05-2024 20:08
Static task
static1
Behavioral task
behavioral1
Sample
a4e3ec7d4ad20c6c1243f47327191a90_NeikiAnalytics.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
a4e3ec7d4ad20c6c1243f47327191a90_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
a4e3ec7d4ad20c6c1243f47327191a90_NeikiAnalytics.exe
-
Size
204KB
-
MD5
a4e3ec7d4ad20c6c1243f47327191a90
-
SHA1
64dc7e062c01f292d763f26392334ca9e6f55138
-
SHA256
f986d937f87680c9ea8ad6c2be1e1dfd7c56f0b754efe94ffacd513ea0a65311
-
SHA512
0e0177c0bfa155094f1e168a5ddd1c0abc4a21bae81fc568dabf345ce30b402e74d1cf4025bc7a360d2620bbedea2730eaaab79f75d32b3ed3a91a7376a90274
-
SSDEEP
1536:8oihraoHerY2D74g+oSkg8dBOhHvEPMtWf/son4NaPMktE5VsZGzNdka6fl1txmh:GQHA5VsZGzNdB6fl1txmO62WIYl
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
Processes:
kaiyem.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" kaiyem.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
a4e3ec7d4ad20c6c1243f47327191a90_NeikiAnalytics.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation a4e3ec7d4ad20c6c1243f47327191a90_NeikiAnalytics.exe -
Executes dropped EXE 1 IoCs
Processes:
kaiyem.exepid process 2932 kaiyem.exe -
Adds Run key to start application 2 TTPs 49 IoCs
Processes:
kaiyem.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\kaiyem = "C:\\Users\\Admin\\kaiyem.exe /z" kaiyem.exe Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\kaiyem = "C:\\Users\\Admin\\kaiyem.exe /O" kaiyem.exe Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\kaiyem = "C:\\Users\\Admin\\kaiyem.exe /k" kaiyem.exe Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\kaiyem = "C:\\Users\\Admin\\kaiyem.exe /h" kaiyem.exe Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\kaiyem = "C:\\Users\\Admin\\kaiyem.exe /F" kaiyem.exe Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\kaiyem = "C:\\Users\\Admin\\kaiyem.exe /i" kaiyem.exe Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\kaiyem = "C:\\Users\\Admin\\kaiyem.exe /r" kaiyem.exe Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\kaiyem = "C:\\Users\\Admin\\kaiyem.exe /u" kaiyem.exe Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\kaiyem = "C:\\Users\\Admin\\kaiyem.exe /X" kaiyem.exe Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\kaiyem = "C:\\Users\\Admin\\kaiyem.exe /K" kaiyem.exe Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\kaiyem = "C:\\Users\\Admin\\kaiyem.exe /I" kaiyem.exe Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\kaiyem = "C:\\Users\\Admin\\kaiyem.exe /B" kaiyem.exe Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\kaiyem = "C:\\Users\\Admin\\kaiyem.exe /o" kaiyem.exe Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\kaiyem = "C:\\Users\\Admin\\kaiyem.exe /g" kaiyem.exe Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\kaiyem = "C:\\Users\\Admin\\kaiyem.exe /n" kaiyem.exe Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\kaiyem = "C:\\Users\\Admin\\kaiyem.exe /Q" kaiyem.exe Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\kaiyem = "C:\\Users\\Admin\\kaiyem.exe /b" kaiyem.exe Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\kaiyem = "C:\\Users\\Admin\\kaiyem.exe /t" kaiyem.exe Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\kaiyem = "C:\\Users\\Admin\\kaiyem.exe /q" kaiyem.exe Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\kaiyem = "C:\\Users\\Admin\\kaiyem.exe /m" kaiyem.exe Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\kaiyem = "C:\\Users\\Admin\\kaiyem.exe /D" kaiyem.exe Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\kaiyem = "C:\\Users\\Admin\\kaiyem.exe /W" kaiyem.exe Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\kaiyem = "C:\\Users\\Admin\\kaiyem.exe /R" kaiyem.exe Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\kaiyem = "C:\\Users\\Admin\\kaiyem.exe /e" kaiyem.exe Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\kaiyem = "C:\\Users\\Admin\\kaiyem.exe /J" kaiyem.exe Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\kaiyem = "C:\\Users\\Admin\\kaiyem.exe /w" kaiyem.exe Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\kaiyem = "C:\\Users\\Admin\\kaiyem.exe /Y" kaiyem.exe Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\kaiyem = "C:\\Users\\Admin\\kaiyem.exe /a" kaiyem.exe Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\kaiyem = "C:\\Users\\Admin\\kaiyem.exe /d" kaiyem.exe Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\kaiyem = "C:\\Users\\Admin\\kaiyem.exe /y" kaiyem.exe Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\kaiyem = "C:\\Users\\Admin\\kaiyem.exe /L" kaiyem.exe Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\kaiyem = "C:\\Users\\Admin\\kaiyem.exe /S" kaiyem.exe Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\kaiyem = "C:\\Users\\Admin\\kaiyem.exe /T" kaiyem.exe Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\kaiyem = "C:\\Users\\Admin\\kaiyem.exe /l" kaiyem.exe Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\kaiyem = "C:\\Users\\Admin\\kaiyem.exe /G" kaiyem.exe Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\kaiyem = "C:\\Users\\Admin\\kaiyem.exe /x" kaiyem.exe Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\kaiyem = "C:\\Users\\Admin\\kaiyem.exe /c" kaiyem.exe Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\kaiyem = "C:\\Users\\Admin\\kaiyem.exe /M" kaiyem.exe Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\kaiyem = "C:\\Users\\Admin\\kaiyem.exe /N" kaiyem.exe Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\kaiyem = "C:\\Users\\Admin\\kaiyem.exe /p" kaiyem.exe Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\kaiyem = "C:\\Users\\Admin\\kaiyem.exe /A" kaiyem.exe Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\kaiyem = "C:\\Users\\Admin\\kaiyem.exe /P" kaiyem.exe Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\kaiyem = "C:\\Users\\Admin\\kaiyem.exe /C" kaiyem.exe Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\kaiyem = "C:\\Users\\Admin\\kaiyem.exe /s" kaiyem.exe Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\kaiyem = "C:\\Users\\Admin\\kaiyem.exe /v" kaiyem.exe Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\kaiyem = "C:\\Users\\Admin\\kaiyem.exe /Z" kaiyem.exe Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\kaiyem = "C:\\Users\\Admin\\kaiyem.exe /V" kaiyem.exe Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\kaiyem = "C:\\Users\\Admin\\kaiyem.exe /j" kaiyem.exe Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\kaiyem = "C:\\Users\\Admin\\kaiyem.exe /E" kaiyem.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
kaiyem.exepid process 2932 kaiyem.exe 2932 kaiyem.exe 2932 kaiyem.exe 2932 kaiyem.exe 2932 kaiyem.exe 2932 kaiyem.exe 2932 kaiyem.exe 2932 kaiyem.exe 2932 kaiyem.exe 2932 kaiyem.exe 2932 kaiyem.exe 2932 kaiyem.exe 2932 kaiyem.exe 2932 kaiyem.exe 2932 kaiyem.exe 2932 kaiyem.exe 2932 kaiyem.exe 2932 kaiyem.exe 2932 kaiyem.exe 2932 kaiyem.exe 2932 kaiyem.exe 2932 kaiyem.exe 2932 kaiyem.exe 2932 kaiyem.exe 2932 kaiyem.exe 2932 kaiyem.exe 2932 kaiyem.exe 2932 kaiyem.exe 2932 kaiyem.exe 2932 kaiyem.exe 2932 kaiyem.exe 2932 kaiyem.exe 2932 kaiyem.exe 2932 kaiyem.exe 2932 kaiyem.exe 2932 kaiyem.exe 2932 kaiyem.exe 2932 kaiyem.exe 2932 kaiyem.exe 2932 kaiyem.exe 2932 kaiyem.exe 2932 kaiyem.exe 2932 kaiyem.exe 2932 kaiyem.exe 2932 kaiyem.exe 2932 kaiyem.exe 2932 kaiyem.exe 2932 kaiyem.exe 2932 kaiyem.exe 2932 kaiyem.exe 2932 kaiyem.exe 2932 kaiyem.exe 2932 kaiyem.exe 2932 kaiyem.exe 2932 kaiyem.exe 2932 kaiyem.exe 2932 kaiyem.exe 2932 kaiyem.exe 2932 kaiyem.exe 2932 kaiyem.exe 2932 kaiyem.exe 2932 kaiyem.exe 2932 kaiyem.exe 2932 kaiyem.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
a4e3ec7d4ad20c6c1243f47327191a90_NeikiAnalytics.exekaiyem.exepid process 5064 a4e3ec7d4ad20c6c1243f47327191a90_NeikiAnalytics.exe 2932 kaiyem.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
a4e3ec7d4ad20c6c1243f47327191a90_NeikiAnalytics.exekaiyem.exedescription pid process target process PID 5064 wrote to memory of 2932 5064 a4e3ec7d4ad20c6c1243f47327191a90_NeikiAnalytics.exe kaiyem.exe PID 5064 wrote to memory of 2932 5064 a4e3ec7d4ad20c6c1243f47327191a90_NeikiAnalytics.exe kaiyem.exe PID 5064 wrote to memory of 2932 5064 a4e3ec7d4ad20c6c1243f47327191a90_NeikiAnalytics.exe kaiyem.exe PID 2932 wrote to memory of 5064 2932 kaiyem.exe a4e3ec7d4ad20c6c1243f47327191a90_NeikiAnalytics.exe PID 2932 wrote to memory of 5064 2932 kaiyem.exe a4e3ec7d4ad20c6c1243f47327191a90_NeikiAnalytics.exe PID 2932 wrote to memory of 5064 2932 kaiyem.exe a4e3ec7d4ad20c6c1243f47327191a90_NeikiAnalytics.exe PID 2932 wrote to memory of 5064 2932 kaiyem.exe a4e3ec7d4ad20c6c1243f47327191a90_NeikiAnalytics.exe PID 2932 wrote to memory of 5064 2932 kaiyem.exe a4e3ec7d4ad20c6c1243f47327191a90_NeikiAnalytics.exe PID 2932 wrote to memory of 5064 2932 kaiyem.exe a4e3ec7d4ad20c6c1243f47327191a90_NeikiAnalytics.exe PID 2932 wrote to memory of 5064 2932 kaiyem.exe a4e3ec7d4ad20c6c1243f47327191a90_NeikiAnalytics.exe PID 2932 wrote to memory of 5064 2932 kaiyem.exe a4e3ec7d4ad20c6c1243f47327191a90_NeikiAnalytics.exe PID 2932 wrote to memory of 5064 2932 kaiyem.exe a4e3ec7d4ad20c6c1243f47327191a90_NeikiAnalytics.exe PID 2932 wrote to memory of 5064 2932 kaiyem.exe a4e3ec7d4ad20c6c1243f47327191a90_NeikiAnalytics.exe PID 2932 wrote to memory of 5064 2932 kaiyem.exe a4e3ec7d4ad20c6c1243f47327191a90_NeikiAnalytics.exe PID 2932 wrote to memory of 5064 2932 kaiyem.exe a4e3ec7d4ad20c6c1243f47327191a90_NeikiAnalytics.exe PID 2932 wrote to memory of 5064 2932 kaiyem.exe a4e3ec7d4ad20c6c1243f47327191a90_NeikiAnalytics.exe PID 2932 wrote to memory of 5064 2932 kaiyem.exe a4e3ec7d4ad20c6c1243f47327191a90_NeikiAnalytics.exe PID 2932 wrote to memory of 5064 2932 kaiyem.exe a4e3ec7d4ad20c6c1243f47327191a90_NeikiAnalytics.exe PID 2932 wrote to memory of 5064 2932 kaiyem.exe a4e3ec7d4ad20c6c1243f47327191a90_NeikiAnalytics.exe PID 2932 wrote to memory of 5064 2932 kaiyem.exe a4e3ec7d4ad20c6c1243f47327191a90_NeikiAnalytics.exe PID 2932 wrote to memory of 5064 2932 kaiyem.exe a4e3ec7d4ad20c6c1243f47327191a90_NeikiAnalytics.exe PID 2932 wrote to memory of 5064 2932 kaiyem.exe a4e3ec7d4ad20c6c1243f47327191a90_NeikiAnalytics.exe PID 2932 wrote to memory of 5064 2932 kaiyem.exe a4e3ec7d4ad20c6c1243f47327191a90_NeikiAnalytics.exe PID 2932 wrote to memory of 5064 2932 kaiyem.exe a4e3ec7d4ad20c6c1243f47327191a90_NeikiAnalytics.exe PID 2932 wrote to memory of 5064 2932 kaiyem.exe a4e3ec7d4ad20c6c1243f47327191a90_NeikiAnalytics.exe PID 2932 wrote to memory of 5064 2932 kaiyem.exe a4e3ec7d4ad20c6c1243f47327191a90_NeikiAnalytics.exe PID 2932 wrote to memory of 5064 2932 kaiyem.exe a4e3ec7d4ad20c6c1243f47327191a90_NeikiAnalytics.exe PID 2932 wrote to memory of 5064 2932 kaiyem.exe a4e3ec7d4ad20c6c1243f47327191a90_NeikiAnalytics.exe PID 2932 wrote to memory of 5064 2932 kaiyem.exe a4e3ec7d4ad20c6c1243f47327191a90_NeikiAnalytics.exe PID 2932 wrote to memory of 5064 2932 kaiyem.exe a4e3ec7d4ad20c6c1243f47327191a90_NeikiAnalytics.exe PID 2932 wrote to memory of 5064 2932 kaiyem.exe a4e3ec7d4ad20c6c1243f47327191a90_NeikiAnalytics.exe PID 2932 wrote to memory of 5064 2932 kaiyem.exe a4e3ec7d4ad20c6c1243f47327191a90_NeikiAnalytics.exe PID 2932 wrote to memory of 5064 2932 kaiyem.exe a4e3ec7d4ad20c6c1243f47327191a90_NeikiAnalytics.exe PID 2932 wrote to memory of 5064 2932 kaiyem.exe a4e3ec7d4ad20c6c1243f47327191a90_NeikiAnalytics.exe PID 2932 wrote to memory of 5064 2932 kaiyem.exe a4e3ec7d4ad20c6c1243f47327191a90_NeikiAnalytics.exe PID 2932 wrote to memory of 5064 2932 kaiyem.exe a4e3ec7d4ad20c6c1243f47327191a90_NeikiAnalytics.exe PID 2932 wrote to memory of 5064 2932 kaiyem.exe a4e3ec7d4ad20c6c1243f47327191a90_NeikiAnalytics.exe PID 2932 wrote to memory of 5064 2932 kaiyem.exe a4e3ec7d4ad20c6c1243f47327191a90_NeikiAnalytics.exe PID 2932 wrote to memory of 5064 2932 kaiyem.exe a4e3ec7d4ad20c6c1243f47327191a90_NeikiAnalytics.exe PID 2932 wrote to memory of 5064 2932 kaiyem.exe a4e3ec7d4ad20c6c1243f47327191a90_NeikiAnalytics.exe PID 2932 wrote to memory of 5064 2932 kaiyem.exe a4e3ec7d4ad20c6c1243f47327191a90_NeikiAnalytics.exe PID 2932 wrote to memory of 5064 2932 kaiyem.exe a4e3ec7d4ad20c6c1243f47327191a90_NeikiAnalytics.exe PID 2932 wrote to memory of 5064 2932 kaiyem.exe a4e3ec7d4ad20c6c1243f47327191a90_NeikiAnalytics.exe PID 2932 wrote to memory of 5064 2932 kaiyem.exe a4e3ec7d4ad20c6c1243f47327191a90_NeikiAnalytics.exe PID 2932 wrote to memory of 5064 2932 kaiyem.exe a4e3ec7d4ad20c6c1243f47327191a90_NeikiAnalytics.exe PID 2932 wrote to memory of 5064 2932 kaiyem.exe a4e3ec7d4ad20c6c1243f47327191a90_NeikiAnalytics.exe PID 2932 wrote to memory of 5064 2932 kaiyem.exe a4e3ec7d4ad20c6c1243f47327191a90_NeikiAnalytics.exe PID 2932 wrote to memory of 5064 2932 kaiyem.exe a4e3ec7d4ad20c6c1243f47327191a90_NeikiAnalytics.exe PID 2932 wrote to memory of 5064 2932 kaiyem.exe a4e3ec7d4ad20c6c1243f47327191a90_NeikiAnalytics.exe PID 2932 wrote to memory of 5064 2932 kaiyem.exe a4e3ec7d4ad20c6c1243f47327191a90_NeikiAnalytics.exe PID 2932 wrote to memory of 5064 2932 kaiyem.exe a4e3ec7d4ad20c6c1243f47327191a90_NeikiAnalytics.exe PID 2932 wrote to memory of 5064 2932 kaiyem.exe a4e3ec7d4ad20c6c1243f47327191a90_NeikiAnalytics.exe PID 2932 wrote to memory of 5064 2932 kaiyem.exe a4e3ec7d4ad20c6c1243f47327191a90_NeikiAnalytics.exe PID 2932 wrote to memory of 5064 2932 kaiyem.exe a4e3ec7d4ad20c6c1243f47327191a90_NeikiAnalytics.exe PID 2932 wrote to memory of 5064 2932 kaiyem.exe a4e3ec7d4ad20c6c1243f47327191a90_NeikiAnalytics.exe PID 2932 wrote to memory of 5064 2932 kaiyem.exe a4e3ec7d4ad20c6c1243f47327191a90_NeikiAnalytics.exe PID 2932 wrote to memory of 5064 2932 kaiyem.exe a4e3ec7d4ad20c6c1243f47327191a90_NeikiAnalytics.exe PID 2932 wrote to memory of 5064 2932 kaiyem.exe a4e3ec7d4ad20c6c1243f47327191a90_NeikiAnalytics.exe PID 2932 wrote to memory of 5064 2932 kaiyem.exe a4e3ec7d4ad20c6c1243f47327191a90_NeikiAnalytics.exe PID 2932 wrote to memory of 5064 2932 kaiyem.exe a4e3ec7d4ad20c6c1243f47327191a90_NeikiAnalytics.exe PID 2932 wrote to memory of 5064 2932 kaiyem.exe a4e3ec7d4ad20c6c1243f47327191a90_NeikiAnalytics.exe PID 2932 wrote to memory of 5064 2932 kaiyem.exe a4e3ec7d4ad20c6c1243f47327191a90_NeikiAnalytics.exe PID 2932 wrote to memory of 5064 2932 kaiyem.exe a4e3ec7d4ad20c6c1243f47327191a90_NeikiAnalytics.exe PID 2932 wrote to memory of 5064 2932 kaiyem.exe a4e3ec7d4ad20c6c1243f47327191a90_NeikiAnalytics.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\a4e3ec7d4ad20c6c1243f47327191a90_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\a4e3ec7d4ad20c6c1243f47327191a90_NeikiAnalytics.exe"1⤵
- Checks computer location settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5064 -
C:\Users\Admin\kaiyem.exe"C:\Users\Admin\kaiyem.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2932
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
204KB
MD5e2c1a2c0d9404d45e2d623e41b171f6e
SHA14ddfe2790671c3a6e9c9fe6275607ff0ec139fe1
SHA2568603ce16d17a41e58b7609ad4c7e8b4053fa642756fa42b30f79b134330a9182
SHA512894ec8e9f3a06aae8917c355aa8e284f1d064e63025ed4d3bf82b76b58657656fee8d6c4b616b828d43b0d187ba4dc9136485d2a8bfaa9c0c9e61fef4de9e46c