Analysis
-
max time kernel
148s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
23-05-2024 00:39
Static task
static1
Behavioral task
behavioral1
Sample
63c7dce2483ae36d6c3475cde91ca7f0_NeikiAnalytics.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
63c7dce2483ae36d6c3475cde91ca7f0_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
63c7dce2483ae36d6c3475cde91ca7f0_NeikiAnalytics.exe
-
Size
408KB
-
MD5
63c7dce2483ae36d6c3475cde91ca7f0
-
SHA1
d463f2c4bc5999806b9adae2678fd4c627e65c2e
-
SHA256
b8b637c3d768e27e5945d174a2ffaecac50212a5d4b00b8db7af1e2de3a35c61
-
SHA512
8ad3b56ec3e5428bfd8f0595e0e6fc7ee899b2853f6ab4e3c56f217efb603607f35d627b2abc5fd464d9073d4342a489b84da15158198924438667914971204e
-
SSDEEP
12288:4jauDReWwqcAXOc1HzxXNbSGr4CDD5+umPNE:4DD0sXf1HzxXNbSGsCDD5+ux
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
hqkftv.exepid process 1912 hqkftv.exe -
Loads dropped DLL 2 IoCs
Processes:
63c7dce2483ae36d6c3475cde91ca7f0_NeikiAnalytics.exepid process 3000 63c7dce2483ae36d6c3475cde91ca7f0_NeikiAnalytics.exe 3000 63c7dce2483ae36d6c3475cde91ca7f0_NeikiAnalytics.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
hqkftv.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Windows\CurrentVersion\Run\Microsoft® Windows® Operating System = "C:\\ProgramData\\hqkftv.exe" hqkftv.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
63c7dce2483ae36d6c3475cde91ca7f0_NeikiAnalytics.exedescription pid process target process PID 3000 wrote to memory of 1912 3000 63c7dce2483ae36d6c3475cde91ca7f0_NeikiAnalytics.exe hqkftv.exe PID 3000 wrote to memory of 1912 3000 63c7dce2483ae36d6c3475cde91ca7f0_NeikiAnalytics.exe hqkftv.exe PID 3000 wrote to memory of 1912 3000 63c7dce2483ae36d6c3475cde91ca7f0_NeikiAnalytics.exe hqkftv.exe PID 3000 wrote to memory of 1912 3000 63c7dce2483ae36d6c3475cde91ca7f0_NeikiAnalytics.exe hqkftv.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\63c7dce2483ae36d6c3475cde91ca7f0_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\63c7dce2483ae36d6c3475cde91ca7f0_NeikiAnalytics.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:3000 -
C:\ProgramData\hqkftv.exe"C:\ProgramData\hqkftv.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:1912
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
408KB
MD545e4e90ddff34316bcefedf437106207
SHA1ec24445c4ccaf2a53eae35d2352495cfe0fe283b
SHA25678252869a3a503b9ee7ac35bc42883f4138df6f4277887d7589b4a97942c64c4
SHA512d8736a1e5070a4e58d674e73c1029eb34f46c6d9ffcb99721664c5a16a8fe4e47e9f2bcaab6af72cc9b893d87584372fe1171a6f35e604530acc10402f17ed34
-
Filesize
136KB
MD5cb4c442a26bb46671c638c794bf535af
SHA18a742d0b372f2ddd2d1fdf688c3c4ac7f9272abf
SHA256f8d2c17bdf34ccfb58070ac8b131a8d95055340101a329f9a7212ac5240d0c25
SHA512074a31e8da403c0a718f93cbca50574d8b658921193db0e6e20eacd232379286f14a3698cd443dc740d324ad19d74934ae001a7ad64b88897d8afefbc9a3d4e3
-
Filesize
271KB
MD51ec6c638113688b766d9b4c826e7dc2e
SHA1afb175ea96902be5793650497d16410194fba30f
SHA2560e9fa51a6cb23124c61a8cec9b695c73f8793b54449ec5de118c7f492a4121f8
SHA512801283106d5e3173c4654a835f983dfb9d2c9e7fc8ad84b4e711f86cb40b1ee0a1ba92a03c18fdcbff9352ed16ee4d9634117b845c302ce91bad57df21fe87e7