Analysis
-
max time kernel
150s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
23-05-2024 02:22
Static task
static1
Behavioral task
behavioral1
Sample
7712c7f5db2b173cb4cc845469ba2fb0_NeikiAnalytics.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
7712c7f5db2b173cb4cc845469ba2fb0_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
7712c7f5db2b173cb4cc845469ba2fb0_NeikiAnalytics.exe
-
Size
53KB
-
MD5
7712c7f5db2b173cb4cc845469ba2fb0
-
SHA1
e97d31de4428f70a56047b66e793dceb3d7bfd7e
-
SHA256
ec8190ed62c3735d6849a5d7445126e1a4b748415ba75fa0e40249b662b9eaa8
-
SHA512
a57d0e70bb35c328154196d001bc5a3433e71b5b91204bc4e814ebfb184b91e872c5d3c69f522e49c5344ff7b275a3aa12ea70698330298833a2c2babb8afc43
-
SSDEEP
1536:vNJg8r8Qs4LuPgzl7Kp3StjEMjmLM3ztDJWZsXy4JzxPME:c4LegzlJJjmLM3zRJWZsXy4JN
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
Processes:
qoehuy.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" qoehuy.exe -
Executes dropped EXE 1 IoCs
Processes:
qoehuy.exepid process 2112 qoehuy.exe -
Loads dropped DLL 2 IoCs
Processes:
7712c7f5db2b173cb4cc845469ba2fb0_NeikiAnalytics.exepid process 836 7712c7f5db2b173cb4cc845469ba2fb0_NeikiAnalytics.exe 836 7712c7f5db2b173cb4cc845469ba2fb0_NeikiAnalytics.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
qoehuy.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Windows\CurrentVersion\Run\qoehuy = "C:\\Users\\Admin\\qoehuy.exe" qoehuy.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
qoehuy.exepid process 2112 qoehuy.exe 2112 qoehuy.exe 2112 qoehuy.exe 2112 qoehuy.exe 2112 qoehuy.exe 2112 qoehuy.exe 2112 qoehuy.exe 2112 qoehuy.exe 2112 qoehuy.exe 2112 qoehuy.exe 2112 qoehuy.exe 2112 qoehuy.exe 2112 qoehuy.exe 2112 qoehuy.exe 2112 qoehuy.exe 2112 qoehuy.exe 2112 qoehuy.exe 2112 qoehuy.exe 2112 qoehuy.exe 2112 qoehuy.exe 2112 qoehuy.exe 2112 qoehuy.exe 2112 qoehuy.exe 2112 qoehuy.exe 2112 qoehuy.exe 2112 qoehuy.exe 2112 qoehuy.exe 2112 qoehuy.exe 2112 qoehuy.exe 2112 qoehuy.exe 2112 qoehuy.exe 2112 qoehuy.exe 2112 qoehuy.exe 2112 qoehuy.exe 2112 qoehuy.exe 2112 qoehuy.exe 2112 qoehuy.exe 2112 qoehuy.exe 2112 qoehuy.exe 2112 qoehuy.exe 2112 qoehuy.exe 2112 qoehuy.exe 2112 qoehuy.exe 2112 qoehuy.exe 2112 qoehuy.exe 2112 qoehuy.exe 2112 qoehuy.exe 2112 qoehuy.exe 2112 qoehuy.exe 2112 qoehuy.exe 2112 qoehuy.exe 2112 qoehuy.exe 2112 qoehuy.exe 2112 qoehuy.exe 2112 qoehuy.exe 2112 qoehuy.exe 2112 qoehuy.exe 2112 qoehuy.exe 2112 qoehuy.exe 2112 qoehuy.exe 2112 qoehuy.exe 2112 qoehuy.exe 2112 qoehuy.exe 2112 qoehuy.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
7712c7f5db2b173cb4cc845469ba2fb0_NeikiAnalytics.exeqoehuy.exepid process 836 7712c7f5db2b173cb4cc845469ba2fb0_NeikiAnalytics.exe 2112 qoehuy.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
7712c7f5db2b173cb4cc845469ba2fb0_NeikiAnalytics.exeqoehuy.exedescription pid process target process PID 836 wrote to memory of 2112 836 7712c7f5db2b173cb4cc845469ba2fb0_NeikiAnalytics.exe qoehuy.exe PID 836 wrote to memory of 2112 836 7712c7f5db2b173cb4cc845469ba2fb0_NeikiAnalytics.exe qoehuy.exe PID 836 wrote to memory of 2112 836 7712c7f5db2b173cb4cc845469ba2fb0_NeikiAnalytics.exe qoehuy.exe PID 836 wrote to memory of 2112 836 7712c7f5db2b173cb4cc845469ba2fb0_NeikiAnalytics.exe qoehuy.exe PID 2112 wrote to memory of 836 2112 qoehuy.exe 7712c7f5db2b173cb4cc845469ba2fb0_NeikiAnalytics.exe PID 2112 wrote to memory of 836 2112 qoehuy.exe 7712c7f5db2b173cb4cc845469ba2fb0_NeikiAnalytics.exe PID 2112 wrote to memory of 836 2112 qoehuy.exe 7712c7f5db2b173cb4cc845469ba2fb0_NeikiAnalytics.exe PID 2112 wrote to memory of 836 2112 qoehuy.exe 7712c7f5db2b173cb4cc845469ba2fb0_NeikiAnalytics.exe PID 2112 wrote to memory of 836 2112 qoehuy.exe 7712c7f5db2b173cb4cc845469ba2fb0_NeikiAnalytics.exe PID 2112 wrote to memory of 836 2112 qoehuy.exe 7712c7f5db2b173cb4cc845469ba2fb0_NeikiAnalytics.exe PID 2112 wrote to memory of 836 2112 qoehuy.exe 7712c7f5db2b173cb4cc845469ba2fb0_NeikiAnalytics.exe PID 2112 wrote to memory of 836 2112 qoehuy.exe 7712c7f5db2b173cb4cc845469ba2fb0_NeikiAnalytics.exe PID 2112 wrote to memory of 836 2112 qoehuy.exe 7712c7f5db2b173cb4cc845469ba2fb0_NeikiAnalytics.exe PID 2112 wrote to memory of 836 2112 qoehuy.exe 7712c7f5db2b173cb4cc845469ba2fb0_NeikiAnalytics.exe PID 2112 wrote to memory of 836 2112 qoehuy.exe 7712c7f5db2b173cb4cc845469ba2fb0_NeikiAnalytics.exe PID 2112 wrote to memory of 836 2112 qoehuy.exe 7712c7f5db2b173cb4cc845469ba2fb0_NeikiAnalytics.exe PID 2112 wrote to memory of 836 2112 qoehuy.exe 7712c7f5db2b173cb4cc845469ba2fb0_NeikiAnalytics.exe PID 2112 wrote to memory of 836 2112 qoehuy.exe 7712c7f5db2b173cb4cc845469ba2fb0_NeikiAnalytics.exe PID 2112 wrote to memory of 836 2112 qoehuy.exe 7712c7f5db2b173cb4cc845469ba2fb0_NeikiAnalytics.exe PID 2112 wrote to memory of 836 2112 qoehuy.exe 7712c7f5db2b173cb4cc845469ba2fb0_NeikiAnalytics.exe PID 2112 wrote to memory of 836 2112 qoehuy.exe 7712c7f5db2b173cb4cc845469ba2fb0_NeikiAnalytics.exe PID 2112 wrote to memory of 836 2112 qoehuy.exe 7712c7f5db2b173cb4cc845469ba2fb0_NeikiAnalytics.exe PID 2112 wrote to memory of 836 2112 qoehuy.exe 7712c7f5db2b173cb4cc845469ba2fb0_NeikiAnalytics.exe PID 2112 wrote to memory of 836 2112 qoehuy.exe 7712c7f5db2b173cb4cc845469ba2fb0_NeikiAnalytics.exe PID 2112 wrote to memory of 836 2112 qoehuy.exe 7712c7f5db2b173cb4cc845469ba2fb0_NeikiAnalytics.exe PID 2112 wrote to memory of 836 2112 qoehuy.exe 7712c7f5db2b173cb4cc845469ba2fb0_NeikiAnalytics.exe PID 2112 wrote to memory of 836 2112 qoehuy.exe 7712c7f5db2b173cb4cc845469ba2fb0_NeikiAnalytics.exe PID 2112 wrote to memory of 836 2112 qoehuy.exe 7712c7f5db2b173cb4cc845469ba2fb0_NeikiAnalytics.exe PID 2112 wrote to memory of 836 2112 qoehuy.exe 7712c7f5db2b173cb4cc845469ba2fb0_NeikiAnalytics.exe PID 2112 wrote to memory of 836 2112 qoehuy.exe 7712c7f5db2b173cb4cc845469ba2fb0_NeikiAnalytics.exe PID 2112 wrote to memory of 836 2112 qoehuy.exe 7712c7f5db2b173cb4cc845469ba2fb0_NeikiAnalytics.exe PID 2112 wrote to memory of 836 2112 qoehuy.exe 7712c7f5db2b173cb4cc845469ba2fb0_NeikiAnalytics.exe PID 2112 wrote to memory of 836 2112 qoehuy.exe 7712c7f5db2b173cb4cc845469ba2fb0_NeikiAnalytics.exe PID 2112 wrote to memory of 836 2112 qoehuy.exe 7712c7f5db2b173cb4cc845469ba2fb0_NeikiAnalytics.exe PID 2112 wrote to memory of 836 2112 qoehuy.exe 7712c7f5db2b173cb4cc845469ba2fb0_NeikiAnalytics.exe PID 2112 wrote to memory of 836 2112 qoehuy.exe 7712c7f5db2b173cb4cc845469ba2fb0_NeikiAnalytics.exe PID 2112 wrote to memory of 836 2112 qoehuy.exe 7712c7f5db2b173cb4cc845469ba2fb0_NeikiAnalytics.exe PID 2112 wrote to memory of 836 2112 qoehuy.exe 7712c7f5db2b173cb4cc845469ba2fb0_NeikiAnalytics.exe PID 2112 wrote to memory of 836 2112 qoehuy.exe 7712c7f5db2b173cb4cc845469ba2fb0_NeikiAnalytics.exe PID 2112 wrote to memory of 836 2112 qoehuy.exe 7712c7f5db2b173cb4cc845469ba2fb0_NeikiAnalytics.exe PID 2112 wrote to memory of 836 2112 qoehuy.exe 7712c7f5db2b173cb4cc845469ba2fb0_NeikiAnalytics.exe PID 2112 wrote to memory of 836 2112 qoehuy.exe 7712c7f5db2b173cb4cc845469ba2fb0_NeikiAnalytics.exe PID 2112 wrote to memory of 836 2112 qoehuy.exe 7712c7f5db2b173cb4cc845469ba2fb0_NeikiAnalytics.exe PID 2112 wrote to memory of 836 2112 qoehuy.exe 7712c7f5db2b173cb4cc845469ba2fb0_NeikiAnalytics.exe PID 2112 wrote to memory of 836 2112 qoehuy.exe 7712c7f5db2b173cb4cc845469ba2fb0_NeikiAnalytics.exe PID 2112 wrote to memory of 836 2112 qoehuy.exe 7712c7f5db2b173cb4cc845469ba2fb0_NeikiAnalytics.exe PID 2112 wrote to memory of 836 2112 qoehuy.exe 7712c7f5db2b173cb4cc845469ba2fb0_NeikiAnalytics.exe PID 2112 wrote to memory of 836 2112 qoehuy.exe 7712c7f5db2b173cb4cc845469ba2fb0_NeikiAnalytics.exe PID 2112 wrote to memory of 836 2112 qoehuy.exe 7712c7f5db2b173cb4cc845469ba2fb0_NeikiAnalytics.exe PID 2112 wrote to memory of 836 2112 qoehuy.exe 7712c7f5db2b173cb4cc845469ba2fb0_NeikiAnalytics.exe PID 2112 wrote to memory of 836 2112 qoehuy.exe 7712c7f5db2b173cb4cc845469ba2fb0_NeikiAnalytics.exe PID 2112 wrote to memory of 836 2112 qoehuy.exe 7712c7f5db2b173cb4cc845469ba2fb0_NeikiAnalytics.exe PID 2112 wrote to memory of 836 2112 qoehuy.exe 7712c7f5db2b173cb4cc845469ba2fb0_NeikiAnalytics.exe PID 2112 wrote to memory of 836 2112 qoehuy.exe 7712c7f5db2b173cb4cc845469ba2fb0_NeikiAnalytics.exe PID 2112 wrote to memory of 836 2112 qoehuy.exe 7712c7f5db2b173cb4cc845469ba2fb0_NeikiAnalytics.exe PID 2112 wrote to memory of 836 2112 qoehuy.exe 7712c7f5db2b173cb4cc845469ba2fb0_NeikiAnalytics.exe PID 2112 wrote to memory of 836 2112 qoehuy.exe 7712c7f5db2b173cb4cc845469ba2fb0_NeikiAnalytics.exe PID 2112 wrote to memory of 836 2112 qoehuy.exe 7712c7f5db2b173cb4cc845469ba2fb0_NeikiAnalytics.exe PID 2112 wrote to memory of 836 2112 qoehuy.exe 7712c7f5db2b173cb4cc845469ba2fb0_NeikiAnalytics.exe PID 2112 wrote to memory of 836 2112 qoehuy.exe 7712c7f5db2b173cb4cc845469ba2fb0_NeikiAnalytics.exe PID 2112 wrote to memory of 836 2112 qoehuy.exe 7712c7f5db2b173cb4cc845469ba2fb0_NeikiAnalytics.exe PID 2112 wrote to memory of 836 2112 qoehuy.exe 7712c7f5db2b173cb4cc845469ba2fb0_NeikiAnalytics.exe PID 2112 wrote to memory of 836 2112 qoehuy.exe 7712c7f5db2b173cb4cc845469ba2fb0_NeikiAnalytics.exe PID 2112 wrote to memory of 836 2112 qoehuy.exe 7712c7f5db2b173cb4cc845469ba2fb0_NeikiAnalytics.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\7712c7f5db2b173cb4cc845469ba2fb0_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\7712c7f5db2b173cb4cc845469ba2fb0_NeikiAnalytics.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:836 -
C:\Users\Admin\qoehuy.exe"C:\Users\Admin\qoehuy.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2112
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
53KB
MD5adab94c6cfe9460f64b4bf2f1a9779cd
SHA162489020c69baec5be03ca5cc86e0131acc8a388
SHA256d6f7fafb5f9f37da759f28cf0b8d79fe5ce48ecf6315cd2e936f57788cfb9813
SHA512e5a61768dd1eebb578a90ad43d5a07f81a88826e24f6e45ea36f9c1d9fb021edf470d180bb7716145a77bdc54940648f574ab5f96996c7ee8d449348d34a0d04