Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
23-05-2024 01:51
Static task
static1
Behavioral task
behavioral1
Sample
71b55f0558d85976a5293764cfd69b90_NeikiAnalytics.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
71b55f0558d85976a5293764cfd69b90_NeikiAnalytics.exe
Resource
win10v2004-20240426-en
General
-
Target
71b55f0558d85976a5293764cfd69b90_NeikiAnalytics.exe
-
Size
3.6MB
-
MD5
71b55f0558d85976a5293764cfd69b90
-
SHA1
5151e2091b8c9f628449ba0fc8aee7efc95b2e10
-
SHA256
86ee7e63999c135c0477f22f1bf2724dae3f6389393c8c5ebe1a26417bb3990b
-
SHA512
25c91287f1d8cd558be11a36d516270eff10c5866b26353677ca4ce30651cd04b58ba6f3796ab268154e91c39932d1cd3ff2b08039d4a94d0b735a3c1c193bdf
-
SSDEEP
98304:gMmD2mDc2mDMmD2mDe2mDMmD2mDc2mDMmD2mDZ:gMmD2mDc2mDMmD2mDe2mDMmD2mDc2mDr
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 3 IoCs
Processes:
avscan.exehosts.exe71b55f0558d85976a5293764cfd69b90_NeikiAnalytics.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" avscan.exe Set value (int) \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" hosts.exe Set value (int) \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" 71b55f0558d85976a5293764cfd69b90_NeikiAnalytics.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 3 IoCs
Processes:
71b55f0558d85976a5293764cfd69b90_NeikiAnalytics.exeavscan.exehosts.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 71b55f0558d85976a5293764cfd69b90_NeikiAnalytics.exe Set value (int) \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" avscan.exe Set value (int) \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" hosts.exe -
Adds policy Run key to start application 2 TTPs 6 IoCs
Processes:
WScript.exeWScript.exeWScript.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\RHATQEDQ = "W_X_C.bat" WScript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run WScript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\RHATQEDQ = "W_X_C.bat" WScript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run WScript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\RHATQEDQ = "W_X_C.bat" WScript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run WScript.exe -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
cmd.execmd.execmd.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\Control Panel\International\Geo\Nation cmd.exe Key value queried \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\Control Panel\International\Geo\Nation cmd.exe Key value queried \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\Control Panel\International\Geo\Nation cmd.exe -
Executes dropped EXE 6 IoCs
Processes:
avscan.exeavscan.exehosts.exehosts.exeavscan.exehosts.exepid process 3440 avscan.exe 392 avscan.exe 4704 hosts.exe 2112 hosts.exe 2604 avscan.exe 1192 hosts.exe -
Adds Run key to start application 2 TTPs 3 IoCs
Processes:
avscan.exehosts.exe71b55f0558d85976a5293764cfd69b90_NeikiAnalytics.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\avscan = "C:\\Users\\Admin\\AppData\\Local\\Temp\\avscan.exe" avscan.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\avscan = "C:\\Users\\Admin\\AppData\\Local\\Temp\\avscan.exe" hosts.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\avscan = "C:\\Users\\Admin\\AppData\\Local\\Temp\\avscan.exe" 71b55f0558d85976a5293764cfd69b90_NeikiAnalytics.exe -
Drops file in Windows directory 5 IoCs
Processes:
71b55f0558d85976a5293764cfd69b90_NeikiAnalytics.exeavscan.exehosts.exedescription ioc process File opened for modification C:\Windows\hosts.exe 71b55f0558d85976a5293764cfd69b90_NeikiAnalytics.exe File opened for modification C:\Windows\hosts.exe avscan.exe File opened for modification C:\Windows\hosts.exe hosts.exe File created C:\windows\W_X_C.vbs 71b55f0558d85976a5293764cfd69b90_NeikiAnalytics.exe File created \??\c:\windows\W_X_C.bat 71b55f0558d85976a5293764cfd69b90_NeikiAnalytics.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 4 IoCs
Processes:
cmd.execmd.exe71b55f0558d85976a5293764cfd69b90_NeikiAnalytics.execmd.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000_Classes\Local Settings 71b55f0558d85976a5293764cfd69b90_NeikiAnalytics.exe Key created \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000_Classes\Local Settings cmd.exe -
Modifies registry key 1 TTPs 9 IoCs
Processes:
REG.exeREG.exeREG.exeREG.exeREG.exeREG.exeREG.exeREG.exeREG.exepid process 4500 REG.exe 2112 REG.exe 1948 REG.exe 4436 REG.exe 4024 REG.exe 4896 REG.exe 5104 REG.exe 1224 REG.exe 3356 REG.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
Processes:
avscan.exehosts.exepid process 3440 avscan.exe 4704 hosts.exe -
Suspicious use of SetWindowsHookEx 7 IoCs
Processes:
71b55f0558d85976a5293764cfd69b90_NeikiAnalytics.exeavscan.exeavscan.exehosts.exehosts.exeavscan.exehosts.exepid process 4504 71b55f0558d85976a5293764cfd69b90_NeikiAnalytics.exe 3440 avscan.exe 392 avscan.exe 2112 hosts.exe 4704 hosts.exe 2604 avscan.exe 1192 hosts.exe -
Suspicious use of WriteProcessMemory 63 IoCs
Processes:
71b55f0558d85976a5293764cfd69b90_NeikiAnalytics.exeavscan.execmd.execmd.exehosts.execmd.exedescription pid process target process PID 4504 wrote to memory of 4500 4504 71b55f0558d85976a5293764cfd69b90_NeikiAnalytics.exe REG.exe PID 4504 wrote to memory of 4500 4504 71b55f0558d85976a5293764cfd69b90_NeikiAnalytics.exe REG.exe PID 4504 wrote to memory of 4500 4504 71b55f0558d85976a5293764cfd69b90_NeikiAnalytics.exe REG.exe PID 4504 wrote to memory of 3440 4504 71b55f0558d85976a5293764cfd69b90_NeikiAnalytics.exe avscan.exe PID 4504 wrote to memory of 3440 4504 71b55f0558d85976a5293764cfd69b90_NeikiAnalytics.exe avscan.exe PID 4504 wrote to memory of 3440 4504 71b55f0558d85976a5293764cfd69b90_NeikiAnalytics.exe avscan.exe PID 3440 wrote to memory of 392 3440 avscan.exe avscan.exe PID 3440 wrote to memory of 392 3440 avscan.exe avscan.exe PID 3440 wrote to memory of 392 3440 avscan.exe avscan.exe PID 3440 wrote to memory of 3396 3440 avscan.exe cmd.exe PID 3440 wrote to memory of 3396 3440 avscan.exe cmd.exe PID 3440 wrote to memory of 3396 3440 avscan.exe cmd.exe PID 4504 wrote to memory of 4912 4504 71b55f0558d85976a5293764cfd69b90_NeikiAnalytics.exe cmd.exe PID 4504 wrote to memory of 4912 4504 71b55f0558d85976a5293764cfd69b90_NeikiAnalytics.exe cmd.exe PID 4504 wrote to memory of 4912 4504 71b55f0558d85976a5293764cfd69b90_NeikiAnalytics.exe cmd.exe PID 4912 wrote to memory of 4704 4912 cmd.exe hosts.exe PID 4912 wrote to memory of 4704 4912 cmd.exe hosts.exe PID 4912 wrote to memory of 4704 4912 cmd.exe hosts.exe PID 3396 wrote to memory of 2112 3396 cmd.exe hosts.exe PID 3396 wrote to memory of 2112 3396 cmd.exe hosts.exe PID 3396 wrote to memory of 2112 3396 cmd.exe hosts.exe PID 4704 wrote to memory of 2604 4704 hosts.exe avscan.exe PID 4704 wrote to memory of 2604 4704 hosts.exe avscan.exe PID 4704 wrote to memory of 2604 4704 hosts.exe avscan.exe PID 3396 wrote to memory of 4728 3396 cmd.exe WScript.exe PID 3396 wrote to memory of 4728 3396 cmd.exe WScript.exe PID 3396 wrote to memory of 4728 3396 cmd.exe WScript.exe PID 4704 wrote to memory of 5092 4704 hosts.exe cmd.exe PID 4704 wrote to memory of 5092 4704 hosts.exe cmd.exe PID 4704 wrote to memory of 5092 4704 hosts.exe cmd.exe PID 4912 wrote to memory of 4100 4912 cmd.exe WScript.exe PID 4912 wrote to memory of 4100 4912 cmd.exe WScript.exe PID 4912 wrote to memory of 4100 4912 cmd.exe WScript.exe PID 5092 wrote to memory of 1192 5092 cmd.exe hosts.exe PID 5092 wrote to memory of 1192 5092 cmd.exe hosts.exe PID 5092 wrote to memory of 1192 5092 cmd.exe hosts.exe PID 5092 wrote to memory of 3108 5092 cmd.exe WScript.exe PID 5092 wrote to memory of 3108 5092 cmd.exe WScript.exe PID 5092 wrote to memory of 3108 5092 cmd.exe WScript.exe PID 3440 wrote to memory of 2112 3440 avscan.exe REG.exe PID 3440 wrote to memory of 2112 3440 avscan.exe REG.exe PID 3440 wrote to memory of 2112 3440 avscan.exe REG.exe PID 4704 wrote to memory of 1948 4704 hosts.exe REG.exe PID 4704 wrote to memory of 1948 4704 hosts.exe REG.exe PID 4704 wrote to memory of 1948 4704 hosts.exe REG.exe PID 3440 wrote to memory of 4436 3440 avscan.exe REG.exe PID 3440 wrote to memory of 4436 3440 avscan.exe REG.exe PID 3440 wrote to memory of 4436 3440 avscan.exe REG.exe PID 4704 wrote to memory of 4896 4704 hosts.exe REG.exe PID 4704 wrote to memory of 4896 4704 hosts.exe REG.exe PID 4704 wrote to memory of 4896 4704 hosts.exe REG.exe PID 3440 wrote to memory of 5104 3440 avscan.exe REG.exe PID 3440 wrote to memory of 5104 3440 avscan.exe REG.exe PID 3440 wrote to memory of 5104 3440 avscan.exe REG.exe PID 4704 wrote to memory of 4024 4704 hosts.exe REG.exe PID 4704 wrote to memory of 4024 4704 hosts.exe REG.exe PID 4704 wrote to memory of 4024 4704 hosts.exe REG.exe PID 3440 wrote to memory of 1224 3440 avscan.exe REG.exe PID 3440 wrote to memory of 1224 3440 avscan.exe REG.exe PID 3440 wrote to memory of 1224 3440 avscan.exe REG.exe PID 4704 wrote to memory of 3356 4704 hosts.exe REG.exe PID 4704 wrote to memory of 3356 4704 hosts.exe REG.exe PID 4704 wrote to memory of 3356 4704 hosts.exe REG.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\71b55f0558d85976a5293764cfd69b90_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\71b55f0558d85976a5293764cfd69b90_NeikiAnalytics.exe"1⤵
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Adds Run key to start application
- Drops file in Windows directory
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4504 -
C:\Windows\SysWOW64\REG.exeREG DELETE HKLM\SYSTEM\CurrentControlSet\Control\SafeBoot /f2⤵
- Modifies registry key
PID:4500 -
C:\Users\Admin\AppData\Local\Temp\avscan.exeC:\Users\Admin\AppData\Local\Temp\avscan.exe2⤵
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3440 -
C:\Users\Admin\AppData\Local\Temp\avscan.exeC:\Users\Admin\AppData\Local\Temp\avscan.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:392 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c c:\windows\W_X_C.bat3⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3396 -
C:\windows\hosts.exeC:\windows\hosts.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2112 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Windows\W_X_C.vbs"4⤵
- Adds policy Run key to start application
PID:4728 -
C:\Windows\SysWOW64\REG.exeREG DELETE HKLM\SYSTEM\CurrentControlSet\Control\SafeBoot /f3⤵
- Modifies registry key
PID:2112 -
C:\Windows\SysWOW64\REG.exeREG DELETE HKLM\SYSTEM\CurrentControlSet\Control\SafeBoot /f3⤵
- Modifies registry key
PID:4436 -
C:\Windows\SysWOW64\REG.exeREG DELETE HKLM\SYSTEM\CurrentControlSet\Control\SafeBoot /f3⤵
- Modifies registry key
PID:5104 -
C:\Windows\SysWOW64\REG.exeREG DELETE HKLM\SYSTEM\CurrentControlSet\Control\SafeBoot /f3⤵
- Modifies registry key
PID:1224 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c c:\windows\W_X_C.bat2⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4912 -
C:\windows\hosts.exeC:\windows\hosts.exe3⤵
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4704 -
C:\Users\Admin\AppData\Local\Temp\avscan.exeC:\Users\Admin\AppData\Local\Temp\avscan.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2604 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c c:\windows\W_X_C.bat4⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:5092 -
C:\windows\hosts.exeC:\windows\hosts.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1192 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Windows\W_X_C.vbs"5⤵
- Adds policy Run key to start application
PID:3108 -
C:\Windows\SysWOW64\REG.exeREG DELETE HKLM\SYSTEM\CurrentControlSet\Control\SafeBoot /f4⤵
- Modifies registry key
PID:1948 -
C:\Windows\SysWOW64\REG.exeREG DELETE HKLM\SYSTEM\CurrentControlSet\Control\SafeBoot /f4⤵
- Modifies registry key
PID:4896 -
C:\Windows\SysWOW64\REG.exeREG DELETE HKLM\SYSTEM\CurrentControlSet\Control\SafeBoot /f4⤵
- Modifies registry key
PID:4024 -
C:\Windows\SysWOW64\REG.exeREG DELETE HKLM\SYSTEM\CurrentControlSet\Control\SafeBoot /f4⤵
- Modifies registry key
PID:3356 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Windows\W_X_C.vbs"3⤵
- Adds policy Run key to start application
PID:4100
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:1652
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.6MB
MD5799602b9a942a2af2d6a663e75082f1e
SHA18aa4a104ec84f196c82a8500fbc9a363800a66af
SHA256a436dd37839a4e616db8ccb01e55fffabb8d03dd23da0b028ba601c60c8a4430
SHA512b49a078c4abcd501e6741c8c30b4009c47674bbbdd5c940eab4a4fb161c9aba153210402854b3df4769b6d53504a15d402cdf7162841e6936c4bf5e0b8f57452
-
Filesize
195B
MD5e56768b7d6fae52321112a970fe42aa7
SHA13b4e99aa35d8fec4bb858d89d555018c3631a4d4
SHA256f244d64f81bda25f55d289aedf6e1b8b046fc183b712e256744ea6437fadc524
SHA51237f3a3644619e766841e2acda13d18b2b9b6a4662fc625484c89c9358b56a5b933a3ee7fcfa394b102756896f6e1b561be8f230f018546fda17be97f948e5d4b
-
Filesize
3.6MB
MD50bc1ca1f65cfb2083579e77258c6a9ee
SHA141298beeff0d9899600967f0aba359ddab47a1e9
SHA25620db58eb542425ba3f4e4fe3d2553b0cfff93d930c4fbfb226c54dfb02cf52b0
SHA5122773173f3f63660b29193225945ce40cfbfbd8d4b2fbaad68b3050b228277b1148a6a6b6d52fa2e87537f56b81728a13ecaeae6313a3427aaf107a9038604702
-
Filesize
336B
MD54db9f8b6175722b62ececeeeba1ce307
SHA13b3ba8414706e72a6fa19e884a97b87609e11e47
SHA256d2150b9e5a4ce55e140f0ca91c4e300715d42095c8fddf58c77037cdd2cfaf78
SHA5121d6dc274cf7a3dd704f840e6a5ad57ab4c4e35d5f09489aeff520bb797e1c825bac53fc335156fe41e767a46520d031855fe42fe7b175409ebe5e9e986fb9b8b