Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
23-05-2024 01:50
Static task
static1
Behavioral task
behavioral1
Sample
719bea0f7b927ed6dc1e0040b1d358b0_NeikiAnalytics.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
719bea0f7b927ed6dc1e0040b1d358b0_NeikiAnalytics.exe
Resource
win10v2004-20240426-en
General
-
Target
719bea0f7b927ed6dc1e0040b1d358b0_NeikiAnalytics.exe
-
Size
91KB
-
MD5
719bea0f7b927ed6dc1e0040b1d358b0
-
SHA1
88b64a29556f66e75dcd47d129819a05584f3418
-
SHA256
ee337ca89999e8f945c95e99f064ea4998518dc54a47d3fa299f310ab1813238
-
SHA512
d7375e7807c106bf3f33b742ee141222b23b9d776427c6b984d99865de5e64cc27aa177702fdebdf1c8b63b887f3e97dba681ad7c907c8cb26d353ddc0a21dd4
-
SSDEEP
768:E3gRYjXbUeHORIC4ZxBMldNKm8Mxm8I+IxrjPfAQ4o3Imuo3gRYjXbUeHORIC4ZR:uT3OA3+KQsxfS41T3OA3+KQsxfS4N
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
Processes:
719bea0f7b927ed6dc1e0040b1d358b0_NeikiAnalytics.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe \"C:\\Windows\\system32\\IExplorer.exe\"" 719bea0f7b927ed6dc1e0040b1d358b0_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\IExplorer.exe" 719bea0f7b927ed6dc1e0040b1d358b0_NeikiAnalytics.exe -
Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
Processes:
719bea0f7b927ed6dc1e0040b1d358b0_NeikiAnalytics.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" 719bea0f7b927ed6dc1e0040b1d358b0_NeikiAnalytics.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
Processes:
719bea0f7b927ed6dc1e0040b1d358b0_NeikiAnalytics.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 719bea0f7b927ed6dc1e0040b1d358b0_NeikiAnalytics.exe -
Disables RegEdit via registry modification 2 IoCs
Processes:
719bea0f7b927ed6dc1e0040b1d358b0_NeikiAnalytics.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" 719bea0f7b927ed6dc1e0040b1d358b0_NeikiAnalytics.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" 719bea0f7b927ed6dc1e0040b1d358b0_NeikiAnalytics.exe -
Disables use of System Restore points 1 TTPs
-
Executes dropped EXE 14 IoCs
Processes:
xk.exeIExplorer.exeWINLOGON.EXECSRSS.EXESERVICES.EXELSASS.EXESMSS.EXExk.exeIExplorer.exeWINLOGON.EXECSRSS.EXESERVICES.EXELSASS.EXESMSS.EXEpid process 760 xk.exe 1652 IExplorer.exe 4432 WINLOGON.EXE 5012 CSRSS.EXE 4396 SERVICES.EXE 4932 LSASS.EXE 2264 SMSS.EXE 5092 xk.exe 1452 IExplorer.exe 3024 WINLOGON.EXE 4736 CSRSS.EXE 3240 SERVICES.EXE 2388 LSASS.EXE 4328 SMSS.EXE -
Modifies system executable filetype association 2 TTPs 13 IoCs
Processes:
719bea0f7b927ed6dc1e0040b1d358b0_NeikiAnalytics.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 719bea0f7b927ed6dc1e0040b1d358b0_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\ = "File Folder" 719bea0f7b927ed6dc1e0040b1d358b0_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 719bea0f7b927ed6dc1e0040b1d358b0_NeikiAnalytics.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open 719bea0f7b927ed6dc1e0040b1d358b0_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 719bea0f7b927ed6dc1e0040b1d358b0_NeikiAnalytics.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command 719bea0f7b927ed6dc1e0040b1d358b0_NeikiAnalytics.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command 719bea0f7b927ed6dc1e0040b1d358b0_NeikiAnalytics.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command 719bea0f7b927ed6dc1e0040b1d358b0_NeikiAnalytics.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command 719bea0f7b927ed6dc1e0040b1d358b0_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 719bea0f7b927ed6dc1e0040b1d358b0_NeikiAnalytics.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command 719bea0f7b927ed6dc1e0040b1d358b0_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 719bea0f7b927ed6dc1e0040b1d358b0_NeikiAnalytics.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell 719bea0f7b927ed6dc1e0040b1d358b0_NeikiAnalytics.exe -
Adds Run key to start application 2 TTPs 5 IoCs
Processes:
719bea0f7b927ed6dc1e0040b1d358b0_NeikiAnalytics.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xk = "C:\\Windows\\xk.exe" 719bea0f7b927ed6dc1e0040b1d358b0_NeikiAnalytics.exe Set value (str) \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MSMSGS = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\WINLOGON.EXE" 719bea0f7b927ed6dc1e0040b1d358b0_NeikiAnalytics.exe Set value (str) \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ServiceAdmin = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\SERVICES.EXE" 719bea0f7b927ed6dc1e0040b1d358b0_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\LogonAdmin = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\CSRSS.EXE" 719bea0f7b927ed6dc1e0040b1d358b0_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\System Monitoring = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\LSASS.EXE" 719bea0f7b927ed6dc1e0040b1d358b0_NeikiAnalytics.exe -
Drops desktop.ini file(s) 4 IoCs
Processes:
719bea0f7b927ed6dc1e0040b1d358b0_NeikiAnalytics.exedescription ioc process File opened for modification C:\desktop.ini 719bea0f7b927ed6dc1e0040b1d358b0_NeikiAnalytics.exe File created C:\desktop.ini 719bea0f7b927ed6dc1e0040b1d358b0_NeikiAnalytics.exe File opened for modification F:\desktop.ini 719bea0f7b927ed6dc1e0040b1d358b0_NeikiAnalytics.exe File created F:\desktop.ini 719bea0f7b927ed6dc1e0040b1d358b0_NeikiAnalytics.exe -
Enumerates connected drives 3 TTPs 22 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
719bea0f7b927ed6dc1e0040b1d358b0_NeikiAnalytics.exedescription ioc process File opened (read-only) \??\Q: 719bea0f7b927ed6dc1e0040b1d358b0_NeikiAnalytics.exe File opened (read-only) \??\S: 719bea0f7b927ed6dc1e0040b1d358b0_NeikiAnalytics.exe File opened (read-only) \??\T: 719bea0f7b927ed6dc1e0040b1d358b0_NeikiAnalytics.exe File opened (read-only) \??\E: 719bea0f7b927ed6dc1e0040b1d358b0_NeikiAnalytics.exe File opened (read-only) \??\J: 719bea0f7b927ed6dc1e0040b1d358b0_NeikiAnalytics.exe File opened (read-only) \??\K: 719bea0f7b927ed6dc1e0040b1d358b0_NeikiAnalytics.exe File opened (read-only) \??\P: 719bea0f7b927ed6dc1e0040b1d358b0_NeikiAnalytics.exe File opened (read-only) \??\Y: 719bea0f7b927ed6dc1e0040b1d358b0_NeikiAnalytics.exe File opened (read-only) \??\Z: 719bea0f7b927ed6dc1e0040b1d358b0_NeikiAnalytics.exe File opened (read-only) \??\H: 719bea0f7b927ed6dc1e0040b1d358b0_NeikiAnalytics.exe File opened (read-only) \??\L: 719bea0f7b927ed6dc1e0040b1d358b0_NeikiAnalytics.exe File opened (read-only) \??\M: 719bea0f7b927ed6dc1e0040b1d358b0_NeikiAnalytics.exe File opened (read-only) \??\O: 719bea0f7b927ed6dc1e0040b1d358b0_NeikiAnalytics.exe File opened (read-only) \??\G: 719bea0f7b927ed6dc1e0040b1d358b0_NeikiAnalytics.exe File opened (read-only) \??\N: 719bea0f7b927ed6dc1e0040b1d358b0_NeikiAnalytics.exe File opened (read-only) \??\U: 719bea0f7b927ed6dc1e0040b1d358b0_NeikiAnalytics.exe File opened (read-only) \??\X: 719bea0f7b927ed6dc1e0040b1d358b0_NeikiAnalytics.exe File opened (read-only) \??\W: 719bea0f7b927ed6dc1e0040b1d358b0_NeikiAnalytics.exe File opened (read-only) \??\B: 719bea0f7b927ed6dc1e0040b1d358b0_NeikiAnalytics.exe File opened (read-only) \??\I: 719bea0f7b927ed6dc1e0040b1d358b0_NeikiAnalytics.exe File opened (read-only) \??\R: 719bea0f7b927ed6dc1e0040b1d358b0_NeikiAnalytics.exe File opened (read-only) \??\V: 719bea0f7b927ed6dc1e0040b1d358b0_NeikiAnalytics.exe -
Drops file in System32 directory 6 IoCs
Processes:
719bea0f7b927ed6dc1e0040b1d358b0_NeikiAnalytics.exedescription ioc process File opened for modification C:\Windows\SysWOW64\shell.exe 719bea0f7b927ed6dc1e0040b1d358b0_NeikiAnalytics.exe File created C:\Windows\SysWOW64\shell.exe 719bea0f7b927ed6dc1e0040b1d358b0_NeikiAnalytics.exe File created C:\Windows\SysWOW64\Mig2.scr 719bea0f7b927ed6dc1e0040b1d358b0_NeikiAnalytics.exe File created C:\Windows\SysWOW64\IExplorer.exe 719bea0f7b927ed6dc1e0040b1d358b0_NeikiAnalytics.exe File opened for modification C:\Windows\SysWOW64\IExplorer.exe 719bea0f7b927ed6dc1e0040b1d358b0_NeikiAnalytics.exe File opened for modification C:\Windows\SysWOW64\Mig2.scr 719bea0f7b927ed6dc1e0040b1d358b0_NeikiAnalytics.exe -
Drops file in Windows directory 2 IoCs
Processes:
719bea0f7b927ed6dc1e0040b1d358b0_NeikiAnalytics.exedescription ioc process File opened for modification C:\Windows\xk.exe 719bea0f7b927ed6dc1e0040b1d358b0_NeikiAnalytics.exe File created C:\Windows\xk.exe 719bea0f7b927ed6dc1e0040b1d358b0_NeikiAnalytics.exe -
Modifies Control Panel 4 IoCs
Processes:
719bea0f7b927ed6dc1e0040b1d358b0_NeikiAnalytics.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\Control Panel\Desktop\ 719bea0f7b927ed6dc1e0040b1d358b0_NeikiAnalytics.exe Set value (str) \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\Control Panel\Desktop\SCRNSAVE.EXE = "C:\\Windows\\system32\\Mig~mig.SCR" 719bea0f7b927ed6dc1e0040b1d358b0_NeikiAnalytics.exe Set value (str) \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\Control Panel\Desktop\ScreenSaverIsSecure = "0" 719bea0f7b927ed6dc1e0040b1d358b0_NeikiAnalytics.exe Set value (str) \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\Control Panel\Desktop\ScreenSaveTimeOut = "600" 719bea0f7b927ed6dc1e0040b1d358b0_NeikiAnalytics.exe -
Modifies registry class 15 IoCs
Processes:
719bea0f7b927ed6dc1e0040b1d358b0_NeikiAnalytics.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile 719bea0f7b927ed6dc1e0040b1d358b0_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 719bea0f7b927ed6dc1e0040b1d358b0_NeikiAnalytics.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command 719bea0f7b927ed6dc1e0040b1d358b0_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 719bea0f7b927ed6dc1e0040b1d358b0_NeikiAnalytics.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command 719bea0f7b927ed6dc1e0040b1d358b0_NeikiAnalytics.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile 719bea0f7b927ed6dc1e0040b1d358b0_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 719bea0f7b927ed6dc1e0040b1d358b0_NeikiAnalytics.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell 719bea0f7b927ed6dc1e0040b1d358b0_NeikiAnalytics.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command 719bea0f7b927ed6dc1e0040b1d358b0_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 719bea0f7b927ed6dc1e0040b1d358b0_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 719bea0f7b927ed6dc1e0040b1d358b0_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\ = "File Folder" 719bea0f7b927ed6dc1e0040b1d358b0_NeikiAnalytics.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command 719bea0f7b927ed6dc1e0040b1d358b0_NeikiAnalytics.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command 719bea0f7b927ed6dc1e0040b1d358b0_NeikiAnalytics.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open 719bea0f7b927ed6dc1e0040b1d358b0_NeikiAnalytics.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
719bea0f7b927ed6dc1e0040b1d358b0_NeikiAnalytics.exepid process 4304 719bea0f7b927ed6dc1e0040b1d358b0_NeikiAnalytics.exe 4304 719bea0f7b927ed6dc1e0040b1d358b0_NeikiAnalytics.exe -
Suspicious use of SetWindowsHookEx 15 IoCs
Processes:
719bea0f7b927ed6dc1e0040b1d358b0_NeikiAnalytics.exexk.exeIExplorer.exeWINLOGON.EXECSRSS.EXESERVICES.EXELSASS.EXESMSS.EXExk.exeIExplorer.exeWINLOGON.EXECSRSS.EXESERVICES.EXELSASS.EXESMSS.EXEpid process 4304 719bea0f7b927ed6dc1e0040b1d358b0_NeikiAnalytics.exe 760 xk.exe 1652 IExplorer.exe 4432 WINLOGON.EXE 5012 CSRSS.EXE 4396 SERVICES.EXE 4932 LSASS.EXE 2264 SMSS.EXE 5092 xk.exe 1452 IExplorer.exe 3024 WINLOGON.EXE 4736 CSRSS.EXE 3240 SERVICES.EXE 2388 LSASS.EXE 4328 SMSS.EXE -
Suspicious use of WriteProcessMemory 42 IoCs
Processes:
719bea0f7b927ed6dc1e0040b1d358b0_NeikiAnalytics.exedescription pid process target process PID 4304 wrote to memory of 760 4304 719bea0f7b927ed6dc1e0040b1d358b0_NeikiAnalytics.exe xk.exe PID 4304 wrote to memory of 760 4304 719bea0f7b927ed6dc1e0040b1d358b0_NeikiAnalytics.exe xk.exe PID 4304 wrote to memory of 760 4304 719bea0f7b927ed6dc1e0040b1d358b0_NeikiAnalytics.exe xk.exe PID 4304 wrote to memory of 1652 4304 719bea0f7b927ed6dc1e0040b1d358b0_NeikiAnalytics.exe IExplorer.exe PID 4304 wrote to memory of 1652 4304 719bea0f7b927ed6dc1e0040b1d358b0_NeikiAnalytics.exe IExplorer.exe PID 4304 wrote to memory of 1652 4304 719bea0f7b927ed6dc1e0040b1d358b0_NeikiAnalytics.exe IExplorer.exe PID 4304 wrote to memory of 4432 4304 719bea0f7b927ed6dc1e0040b1d358b0_NeikiAnalytics.exe WINLOGON.EXE PID 4304 wrote to memory of 4432 4304 719bea0f7b927ed6dc1e0040b1d358b0_NeikiAnalytics.exe WINLOGON.EXE PID 4304 wrote to memory of 4432 4304 719bea0f7b927ed6dc1e0040b1d358b0_NeikiAnalytics.exe WINLOGON.EXE PID 4304 wrote to memory of 5012 4304 719bea0f7b927ed6dc1e0040b1d358b0_NeikiAnalytics.exe CSRSS.EXE PID 4304 wrote to memory of 5012 4304 719bea0f7b927ed6dc1e0040b1d358b0_NeikiAnalytics.exe CSRSS.EXE PID 4304 wrote to memory of 5012 4304 719bea0f7b927ed6dc1e0040b1d358b0_NeikiAnalytics.exe CSRSS.EXE PID 4304 wrote to memory of 4396 4304 719bea0f7b927ed6dc1e0040b1d358b0_NeikiAnalytics.exe SERVICES.EXE PID 4304 wrote to memory of 4396 4304 719bea0f7b927ed6dc1e0040b1d358b0_NeikiAnalytics.exe SERVICES.EXE PID 4304 wrote to memory of 4396 4304 719bea0f7b927ed6dc1e0040b1d358b0_NeikiAnalytics.exe SERVICES.EXE PID 4304 wrote to memory of 4932 4304 719bea0f7b927ed6dc1e0040b1d358b0_NeikiAnalytics.exe LSASS.EXE PID 4304 wrote to memory of 4932 4304 719bea0f7b927ed6dc1e0040b1d358b0_NeikiAnalytics.exe LSASS.EXE PID 4304 wrote to memory of 4932 4304 719bea0f7b927ed6dc1e0040b1d358b0_NeikiAnalytics.exe LSASS.EXE PID 4304 wrote to memory of 2264 4304 719bea0f7b927ed6dc1e0040b1d358b0_NeikiAnalytics.exe SMSS.EXE PID 4304 wrote to memory of 2264 4304 719bea0f7b927ed6dc1e0040b1d358b0_NeikiAnalytics.exe SMSS.EXE PID 4304 wrote to memory of 2264 4304 719bea0f7b927ed6dc1e0040b1d358b0_NeikiAnalytics.exe SMSS.EXE PID 4304 wrote to memory of 5092 4304 719bea0f7b927ed6dc1e0040b1d358b0_NeikiAnalytics.exe xk.exe PID 4304 wrote to memory of 5092 4304 719bea0f7b927ed6dc1e0040b1d358b0_NeikiAnalytics.exe xk.exe PID 4304 wrote to memory of 5092 4304 719bea0f7b927ed6dc1e0040b1d358b0_NeikiAnalytics.exe xk.exe PID 4304 wrote to memory of 1452 4304 719bea0f7b927ed6dc1e0040b1d358b0_NeikiAnalytics.exe IExplorer.exe PID 4304 wrote to memory of 1452 4304 719bea0f7b927ed6dc1e0040b1d358b0_NeikiAnalytics.exe IExplorer.exe PID 4304 wrote to memory of 1452 4304 719bea0f7b927ed6dc1e0040b1d358b0_NeikiAnalytics.exe IExplorer.exe PID 4304 wrote to memory of 3024 4304 719bea0f7b927ed6dc1e0040b1d358b0_NeikiAnalytics.exe WINLOGON.EXE PID 4304 wrote to memory of 3024 4304 719bea0f7b927ed6dc1e0040b1d358b0_NeikiAnalytics.exe WINLOGON.EXE PID 4304 wrote to memory of 3024 4304 719bea0f7b927ed6dc1e0040b1d358b0_NeikiAnalytics.exe WINLOGON.EXE PID 4304 wrote to memory of 4736 4304 719bea0f7b927ed6dc1e0040b1d358b0_NeikiAnalytics.exe CSRSS.EXE PID 4304 wrote to memory of 4736 4304 719bea0f7b927ed6dc1e0040b1d358b0_NeikiAnalytics.exe CSRSS.EXE PID 4304 wrote to memory of 4736 4304 719bea0f7b927ed6dc1e0040b1d358b0_NeikiAnalytics.exe CSRSS.EXE PID 4304 wrote to memory of 3240 4304 719bea0f7b927ed6dc1e0040b1d358b0_NeikiAnalytics.exe SERVICES.EXE PID 4304 wrote to memory of 3240 4304 719bea0f7b927ed6dc1e0040b1d358b0_NeikiAnalytics.exe SERVICES.EXE PID 4304 wrote to memory of 3240 4304 719bea0f7b927ed6dc1e0040b1d358b0_NeikiAnalytics.exe SERVICES.EXE PID 4304 wrote to memory of 2388 4304 719bea0f7b927ed6dc1e0040b1d358b0_NeikiAnalytics.exe LSASS.EXE PID 4304 wrote to memory of 2388 4304 719bea0f7b927ed6dc1e0040b1d358b0_NeikiAnalytics.exe LSASS.EXE PID 4304 wrote to memory of 2388 4304 719bea0f7b927ed6dc1e0040b1d358b0_NeikiAnalytics.exe LSASS.EXE PID 4304 wrote to memory of 4328 4304 719bea0f7b927ed6dc1e0040b1d358b0_NeikiAnalytics.exe SMSS.EXE PID 4304 wrote to memory of 4328 4304 719bea0f7b927ed6dc1e0040b1d358b0_NeikiAnalytics.exe SMSS.EXE PID 4304 wrote to memory of 4328 4304 719bea0f7b927ed6dc1e0040b1d358b0_NeikiAnalytics.exe SMSS.EXE -
System policy modification 1 TTPs 4 IoCs
Processes:
719bea0f7b927ed6dc1e0040b1d358b0_NeikiAnalytics.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" 719bea0f7b927ed6dc1e0040b1d358b0_NeikiAnalytics.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer 719bea0f7b927ed6dc1e0040b1d358b0_NeikiAnalytics.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" 719bea0f7b927ed6dc1e0040b1d358b0_NeikiAnalytics.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System 719bea0f7b927ed6dc1e0040b1d358b0_NeikiAnalytics.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\719bea0f7b927ed6dc1e0040b1d358b0_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\719bea0f7b927ed6dc1e0040b1d358b0_NeikiAnalytics.exe"1⤵
- Modifies WinLogon for persistence
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Disables RegEdit via registry modification
- Modifies system executable filetype association
- Adds Run key to start application
- Drops desktop.ini file(s)
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies Control Panel
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:4304 -
C:\Windows\xk.exeC:\Windows\xk.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:760 -
C:\Windows\SysWOW64\IExplorer.exeC:\Windows\system32\IExplorer.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1652 -
C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4432 -
C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:5012 -
C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4396 -
C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4932 -
C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2264 -
C:\Windows\xk.exeC:\Windows\xk.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:5092 -
C:\Windows\SysWOW64\IExplorer.exeC:\Windows\system32\IExplorer.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1452 -
C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3024 -
C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4736 -
C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3240 -
C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2388 -
C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4328
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Event Triggered Execution
1Change Default File Association
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Event Triggered Execution
1Change Default File Association
1Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Modify Registry
6Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
91KB
MD586f31c74619a28a0763985b522871899
SHA125721e70231e0f69c3f4c071a5ef5fc4d9a8538c
SHA256f87185c82f8b5e69b03b37aa0c56e53b5baa5d5946801da909a5a2cd6c8ca843
SHA51229a244d4cb53cc35a08d36743755cbdd3fb6581cec97d326925a5c967b3e9271191ae5337d35dc1ac077a20da7430dea3a1f72bc7e3852d1443a42b9cacdcdfe
-
Filesize
91KB
MD57aead681dc313e41165d1ddddc0a32aa
SHA10788bedee8ab308d545648fe3410a83fcb4e7ac0
SHA25688f061b0eca9b209ccf2d72eae8e67f29baba8fcc2d39c198fe5ed072507d26f
SHA512790a36219ebdf7060e65bf759a185b995a2b52e6dd725f9e5ee832de11bf5bca5d2c4afd329a97f630c7d4950c8bfae146a9950489fb29460063102f44ab38ad
-
Filesize
91KB
MD52de2bcd25739bba7f2e46ec22cba08f9
SHA1f07db4bfcf935c8dd646acfe8a23adba85586e5d
SHA256e7518695730c73a2e29478ea477ba923e169caeba1b91580e0dd05354d4d1288
SHA5124ea70e13c58580cf0b0beb41bdbfc6bad6d401f58eedebeda07491048a9f92b61065d1f344a6f1d3a2672bdb19ae963c36691c4435b8eccf844d86aabae8e1af
-
Filesize
91KB
MD5ca29e531d490277d6da84db1eee32cb3
SHA19c79c82783c348bc555b889a5c2d755853ad04d4
SHA2569c8791397e89a06a384e33c337d6b83da770a786b47ea64e7f93ad266d063f17
SHA5128c08f9554aaf51a4b158d1ff6cfe94e39e9bc2cb6be62e234ad7366fbb6e41d6551d328f19cf3688de1644be394d3bab4f086bec6014234110e389d11b5e6b5d
-
Filesize
91KB
MD56d76e1afde07c661187742aa6a6525af
SHA13c2a02a07a82335bd4eedda44388fe93f57350f6
SHA25640748205e5d097a275b2fd74930ac14ef370d91c3865bb9185785265cd56ad2a
SHA5125985a0cd9734880a913d04c00bf4ebac7aa69cdc55a26f56f1ea26148c8036096d9d6cbc7133d128fd0e474252693a6838d5685a5f2c43687797c3c18d665d02
-
Filesize
91KB
MD5ede9cffb93aca362be927683baa9a186
SHA1bdce24b4a3ea5207989e55428d572327265de613
SHA256fe02a8fd30df2e01cea19f26dc3805234b923cfa1f7adf7aacc1eba6d8ae76a5
SHA512613ac69901cb93c7d36f09440c04567d0fb76e366f8e009667164a49b1161af33cd8496e0001c9d24559b9b99a81afacdf53a3b525952e4fcfd3e04cc3044022
-
Filesize
91KB
MD5142d9d5223f06541fb7cdd8c969f0b26
SHA15d8a6247df460ee3ab8693dbba1f23a4fa5388df
SHA2563f12b0d8dc1bf37a1ee12f45facaef8be00345e96e6e1ce760b4ed8e2827834c
SHA512d181b4bbaa126e34d39feaf4ada413fbb9d40a914b2b58746321754d07f7df0af5965acbac51995073a7741fe53f33d583efb6328b349b6c76c6f46fb0472601
-
Filesize
91KB
MD543bab5acb06130fbe181a43112a7b7b7
SHA16721b9752b267e15365cbcf8aa1cda7263da549a
SHA25679374ccccf105ec67b3acfa50b550b5c57469fe0cc95f64651148163433d0de8
SHA51291023641ed204feb53d5d453f212690a50bdb964d97abb554f7fc66930b47044243eb4f1f511deaf5b17af7456a3d3295b0b88f466a68258f1b62a398143e43d
-
Filesize
91KB
MD51035a2a735351aae7189f00b6c9ac135
SHA1d0a81162b6a5cc5c636e76a82567fc58ee62002e
SHA256abf30940d0249dc7d3d269d7ff24e77d5c4e39c61672c040c294ec6f5a8d8191
SHA512acf127c461cee9be95139f7698cf3dd4e5aeee66386dd9305be3b7b3261d8e3394cfe5d96c43a3ec7b27c956442859f2a5330efe9f52deed2f318798368d8b4c
-
Filesize
91KB
MD5ba526dad89ecb142aa2fbfca71d3b251
SHA1b0d95d9b83436b639d630ec592441f4d6d27f380
SHA256ae8778553c862b4fe37c27d8b42a3c06c0a189e3c91c638384f711aa26128d69
SHA512d56732db7f3cb488f21194be9d1cbbc7040d2d7d6f926022d61268fd77e38b5def0cefdd148ca90f692fb94959a3a6b0a40a5982a7e6ba98cca985201603ae04
-
Filesize
91KB
MD5719bea0f7b927ed6dc1e0040b1d358b0
SHA188b64a29556f66e75dcd47d129819a05584f3418
SHA256ee337ca89999e8f945c95e99f064ea4998518dc54a47d3fa299f310ab1813238
SHA512d7375e7807c106bf3f33b742ee141222b23b9d776427c6b984d99865de5e64cc27aa177702fdebdf1c8b63b887f3e97dba681ad7c907c8cb26d353ddc0a21dd4
-
Filesize
91KB
MD505b902c71e6d5a33e9b8137f91b44b95
SHA1dee07f58fa6c440b87ee0caf7af960a8bc71b43a
SHA256dd301f48f9bb2c1f2c0f401a2413d91c1bb4644b6aa08c3d47ec3a0de3249674
SHA51251d2b744ec54de7a61dbbc0c2baef45b2832f1531ffa78fbcfd21f2ec23d1b656aa0d3635939f86dba95f9629477a5d67f99d2a11c257537769a6096ec77e0f2
-
Filesize
91KB
MD51b2529e5ae861beec45d7f21f7c23e09
SHA19b50ac2c3ff057e67563c0df64016f2f0caf674b
SHA25615f11fc5bb54f2140988e473e86f8d5d367654adea0c65c3132d09d97d4e9fd9
SHA512124f20b00cf9c2b44e2391463f9ef75d70aa90d4f723fb1a4a203d064b7e0658081248a45e7518ac6fe09259f9f7544b9b9305d0c2f755c8fad5f72485a095ae
-
Filesize
91KB
MD55e3003ffed25fd646cad19e34fbe2522
SHA11a1dd953be3fd2ee6f5298cb4af710d9262f15ee
SHA256d32789c286752050cc417935aadd78b6a94c542358a4129b931c094419a62548
SHA512a24ced25e5662bf88a20fe398402cced48d7cfa0839ef2273ee0387a54d6f286e0717eb715a5502a7291c20d2fccfc025c7a96042d5250c1f61791e23f78e3db
-
Filesize
91KB
MD5761b33153aa82c95be2043169d573151
SHA15ea84d3dbfbf8d78fabb5946ba7f7972acd7c448
SHA2566d2d842d1bb1f2b026ab43d41e2da2a02105fadf4d8350d00a3801c00e5ab0e8
SHA512d3257f09f0f38447f9dc6b92d1250408dd5250408fff9e919a4bff1fa8a89ebab80ab13021bf03255af1c4803d112b45fe6ca911b51ddb57442c932a5a43e213