Analysis
-
max time kernel
149s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
22-05-2024 20:32
Static task
static1
Behavioral task
behavioral1
Sample
34d287f31b87286d6ce3121b80a5cef0_NeikiAnalytics.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
34d287f31b87286d6ce3121b80a5cef0_NeikiAnalytics.exe
Resource
win10v2004-20240226-en
General
-
Target
34d287f31b87286d6ce3121b80a5cef0_NeikiAnalytics.exe
-
Size
2.7MB
-
MD5
34d287f31b87286d6ce3121b80a5cef0
-
SHA1
03a64af9f39c7989a8fd800ad0229688ea531e85
-
SHA256
844167d57b507f3144e594dec81f124320792c381a2c3d805964bc37af24b3cf
-
SHA512
ed710668cad07edbed3c706a256b2fed40eac69b3ec990b68bdbbbe67d109cf1851d6f8fd7f97f83ad0791814ccb7c68c9defc6d3a1372e56db73cb4d9e76298
-
SSDEEP
49152:+R0p8xHycIq+GI27nGroMPTJPer1c2HSjpjK3LBz9w4Sx:+R0pI/IQlUoMPdmpSpT4
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
aoptiec.exepid process 2264 aoptiec.exe -
Loads dropped DLL 1 IoCs
Processes:
34d287f31b87286d6ce3121b80a5cef0_NeikiAnalytics.exepid process 1520 34d287f31b87286d6ce3121b80a5cef0_NeikiAnalytics.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
34d287f31b87286d6ce3121b80a5cef0_NeikiAnalytics.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Run\Parametr = "C:\\Files9L\\aoptiec.exe" 34d287f31b87286d6ce3121b80a5cef0_NeikiAnalytics.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\Parametr = "C:\\KaVBRL\\boddevsys.exe" 34d287f31b87286d6ce3121b80a5cef0_NeikiAnalytics.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
34d287f31b87286d6ce3121b80a5cef0_NeikiAnalytics.exeaoptiec.exepid process 1520 34d287f31b87286d6ce3121b80a5cef0_NeikiAnalytics.exe 1520 34d287f31b87286d6ce3121b80a5cef0_NeikiAnalytics.exe 2264 aoptiec.exe 1520 34d287f31b87286d6ce3121b80a5cef0_NeikiAnalytics.exe 2264 aoptiec.exe 1520 34d287f31b87286d6ce3121b80a5cef0_NeikiAnalytics.exe 2264 aoptiec.exe 1520 34d287f31b87286d6ce3121b80a5cef0_NeikiAnalytics.exe 2264 aoptiec.exe 1520 34d287f31b87286d6ce3121b80a5cef0_NeikiAnalytics.exe 2264 aoptiec.exe 1520 34d287f31b87286d6ce3121b80a5cef0_NeikiAnalytics.exe 2264 aoptiec.exe 1520 34d287f31b87286d6ce3121b80a5cef0_NeikiAnalytics.exe 2264 aoptiec.exe 1520 34d287f31b87286d6ce3121b80a5cef0_NeikiAnalytics.exe 2264 aoptiec.exe 1520 34d287f31b87286d6ce3121b80a5cef0_NeikiAnalytics.exe 2264 aoptiec.exe 1520 34d287f31b87286d6ce3121b80a5cef0_NeikiAnalytics.exe 2264 aoptiec.exe 1520 34d287f31b87286d6ce3121b80a5cef0_NeikiAnalytics.exe 2264 aoptiec.exe 1520 34d287f31b87286d6ce3121b80a5cef0_NeikiAnalytics.exe 2264 aoptiec.exe 1520 34d287f31b87286d6ce3121b80a5cef0_NeikiAnalytics.exe 2264 aoptiec.exe 1520 34d287f31b87286d6ce3121b80a5cef0_NeikiAnalytics.exe 2264 aoptiec.exe 1520 34d287f31b87286d6ce3121b80a5cef0_NeikiAnalytics.exe 2264 aoptiec.exe 1520 34d287f31b87286d6ce3121b80a5cef0_NeikiAnalytics.exe 2264 aoptiec.exe 1520 34d287f31b87286d6ce3121b80a5cef0_NeikiAnalytics.exe 2264 aoptiec.exe 1520 34d287f31b87286d6ce3121b80a5cef0_NeikiAnalytics.exe 2264 aoptiec.exe 1520 34d287f31b87286d6ce3121b80a5cef0_NeikiAnalytics.exe 2264 aoptiec.exe 1520 34d287f31b87286d6ce3121b80a5cef0_NeikiAnalytics.exe 2264 aoptiec.exe 1520 34d287f31b87286d6ce3121b80a5cef0_NeikiAnalytics.exe 2264 aoptiec.exe 1520 34d287f31b87286d6ce3121b80a5cef0_NeikiAnalytics.exe 2264 aoptiec.exe 1520 34d287f31b87286d6ce3121b80a5cef0_NeikiAnalytics.exe 2264 aoptiec.exe 1520 34d287f31b87286d6ce3121b80a5cef0_NeikiAnalytics.exe 2264 aoptiec.exe 1520 34d287f31b87286d6ce3121b80a5cef0_NeikiAnalytics.exe 2264 aoptiec.exe 1520 34d287f31b87286d6ce3121b80a5cef0_NeikiAnalytics.exe 2264 aoptiec.exe 1520 34d287f31b87286d6ce3121b80a5cef0_NeikiAnalytics.exe 2264 aoptiec.exe 1520 34d287f31b87286d6ce3121b80a5cef0_NeikiAnalytics.exe 2264 aoptiec.exe 1520 34d287f31b87286d6ce3121b80a5cef0_NeikiAnalytics.exe 2264 aoptiec.exe 1520 34d287f31b87286d6ce3121b80a5cef0_NeikiAnalytics.exe 2264 aoptiec.exe 1520 34d287f31b87286d6ce3121b80a5cef0_NeikiAnalytics.exe 2264 aoptiec.exe 1520 34d287f31b87286d6ce3121b80a5cef0_NeikiAnalytics.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
34d287f31b87286d6ce3121b80a5cef0_NeikiAnalytics.exedescription pid process target process PID 1520 wrote to memory of 2264 1520 34d287f31b87286d6ce3121b80a5cef0_NeikiAnalytics.exe aoptiec.exe PID 1520 wrote to memory of 2264 1520 34d287f31b87286d6ce3121b80a5cef0_NeikiAnalytics.exe aoptiec.exe PID 1520 wrote to memory of 2264 1520 34d287f31b87286d6ce3121b80a5cef0_NeikiAnalytics.exe aoptiec.exe PID 1520 wrote to memory of 2264 1520 34d287f31b87286d6ce3121b80a5cef0_NeikiAnalytics.exe aoptiec.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\34d287f31b87286d6ce3121b80a5cef0_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\34d287f31b87286d6ce3121b80a5cef0_NeikiAnalytics.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1520 -
C:\Files9L\aoptiec.exeC:\Files9L\aoptiec.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2264
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
12KB
MD5d5a7d525dbe308b8a427c14d39f93449
SHA1be921176bd559fb31ca16ffa3f7b1138564947f3
SHA2568989c30319b39766d8386754527ee98423aa21136d1918453163df7dc04c58fa
SHA51287796e55cee373ea3be465a18afcec7543ea327cc6f5a289619a90950d3b9b16cf510f7ec55871ee8f7a27fc7bcc672ae59cb2a6862aadb1004c706de3925521
-
Filesize
202B
MD57039996cc8584225bf5f4dc17225652f
SHA10804a859ab6bba3044e224f0077f1ba4811a83c4
SHA256cd5fd1401fb66a1ecfef02f3c50d2e159d7f1e55befdf78cec2c969fc37adbd0
SHA512faa90db8b46fdbbb044eb3c18fc2e0b39cb7804c6e518f51817339028b2774a51658c0ece4cb34be24b69fe6abede7542b681e95301e07d3c911c5bad1381f74
-
Filesize
2.7MB
MD5a731397e8d55fbab05f6fee58c7205ff
SHA198586cae1aa626fda999f68a49237d6bcc7bf7ab
SHA256ac624670826e2a41babf15bdfdf1dce4bcec63f3dc872091152358bc03fee8d1
SHA512ac16f9c6fc68af827ed00357993e0ff137019e68a0085f805276fdff8724fd0b3765277010ffe7b522d9d36d2b2c9b3104a42a63a9a5793235888edb7386d765