Analysis
-
max time kernel
133s -
max time network
103s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
23-05-2024 03:03
Static task
static1
Behavioral task
behavioral1
Sample
7e6e2a883ecdaf212f05d0b6564c9460_NeikiAnalytics.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
7e6e2a883ecdaf212f05d0b6564c9460_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
7e6e2a883ecdaf212f05d0b6564c9460_NeikiAnalytics.exe
-
Size
1.5MB
-
MD5
7e6e2a883ecdaf212f05d0b6564c9460
-
SHA1
3b722c5588234f8eac02f133d572b6157da656c9
-
SHA256
fae3e2bc39240e2b8f244b4a79be9fffaa0a55331cbd4171e0886280760dd270
-
SHA512
506c669018f29b98a63e42cfe5e930d1600f617a14d99fd04a72344f93e16a98c8800f21189f55817fa0fae57edf9376cdbef18b1fd2719bdc7593bf782b4b09
-
SSDEEP
6144:+afcEHI/prnm4y3NjTjuC8xOcxphSe+dbjMMqcXmr8MMtjyhX9+FL:rHIhnmn9jT8rs3MMq/r8MMP
Malware Config
Signatures
-
Enumerates connected drives 3 TTPs 10 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
7e6e2a883ecdaf212f05d0b6564c9460_NeikiAnalytics.exedescription ioc process File opened (read-only) \??\E: 7e6e2a883ecdaf212f05d0b6564c9460_NeikiAnalytics.exe File opened (read-only) \??\H: 7e6e2a883ecdaf212f05d0b6564c9460_NeikiAnalytics.exe File opened (read-only) \??\L: 7e6e2a883ecdaf212f05d0b6564c9460_NeikiAnalytics.exe File opened (read-only) \??\M: 7e6e2a883ecdaf212f05d0b6564c9460_NeikiAnalytics.exe File opened (read-only) \??\N: 7e6e2a883ecdaf212f05d0b6564c9460_NeikiAnalytics.exe File opened (read-only) \??\O: 7e6e2a883ecdaf212f05d0b6564c9460_NeikiAnalytics.exe File opened (read-only) \??\G: 7e6e2a883ecdaf212f05d0b6564c9460_NeikiAnalytics.exe File opened (read-only) \??\I: 7e6e2a883ecdaf212f05d0b6564c9460_NeikiAnalytics.exe File opened (read-only) \??\J: 7e6e2a883ecdaf212f05d0b6564c9460_NeikiAnalytics.exe File opened (read-only) \??\K: 7e6e2a883ecdaf212f05d0b6564c9460_NeikiAnalytics.exe -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
Processes:
7e6e2a883ecdaf212f05d0b6564c9460_NeikiAnalytics.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\Desktop\Wallpaper = "C:\\windows\\WallPapers.jpg" 7e6e2a883ecdaf212f05d0b6564c9460_NeikiAnalytics.exe -
Drops file in Program Files directory 21 IoCs
Processes:
7e6e2a883ecdaf212f05d0b6564c9460_NeikiAnalytics.exedescription ioc process File created C:\Program Files\readme.1xt 7e6e2a883ecdaf212f05d0b6564c9460_NeikiAnalytics.exe File opened for modification C:\Program Files\7-Zip\7z.exe 7e6e2a883ecdaf212f05d0b6564c9460_NeikiAnalytics.exe File created C:\Program Files\7-Zip\7zFM.cab 7e6e2a883ecdaf212f05d0b6564c9460_NeikiAnalytics.exe File created C:\Program Files\7-Zip\7zFM.exe 7e6e2a883ecdaf212f05d0b6564c9460_NeikiAnalytics.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\RCX7380.tmp 7e6e2a883ecdaf212f05d0b6564c9460_NeikiAnalytics.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\RCX7391.tmp 7e6e2a883ecdaf212f05d0b6564c9460_NeikiAnalytics.exe File opened for modification C:\Program Files\7-Zip\RCX7290.tmp 7e6e2a883ecdaf212f05d0b6564c9460_NeikiAnalytics.exe File opened for modification C:\Program Files\7-Zip\RCX7291.tmp 7e6e2a883ecdaf212f05d0b6564c9460_NeikiAnalytics.exe File opened for modification C:\Program Files\7-Zip\7zFM.exe 7e6e2a883ecdaf212f05d0b6564c9460_NeikiAnalytics.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\appvcleaner.cab 7e6e2a883ecdaf212f05d0b6564c9460_NeikiAnalytics.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\appvcleaner.cab 7e6e2a883ecdaf212f05d0b6564c9460_NeikiAnalytics.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\appvcleaner.exe 7e6e2a883ecdaf212f05d0b6564c9460_NeikiAnalytics.exe File created C:\Program Files\7-Zip\7z.cab 7e6e2a883ecdaf212f05d0b6564c9460_NeikiAnalytics.exe File opened for modification C:\Program Files\7-Zip\7zFM.cab 7e6e2a883ecdaf212f05d0b6564c9460_NeikiAnalytics.exe File opened for modification C:\Program Files\7-Zip\RCX731F.tmp 7e6e2a883ecdaf212f05d0b6564c9460_NeikiAnalytics.exe File opened for modification C:\Program Files\7-Zip\7z.cab 7e6e2a883ecdaf212f05d0b6564c9460_NeikiAnalytics.exe File created C:\Program Files\7-Zip\7z.exe 7e6e2a883ecdaf212f05d0b6564c9460_NeikiAnalytics.exe File opened for modification C:\Program Files\7-Zip\RCX7320.tmp 7e6e2a883ecdaf212f05d0b6564c9460_NeikiAnalytics.exe File opened for modification C:\Program Files\7-Zip\RCX7321.tmp 7e6e2a883ecdaf212f05d0b6564c9460_NeikiAnalytics.exe File opened for modification C:\Program Files\7-Zip\RCX7322.tmp 7e6e2a883ecdaf212f05d0b6564c9460_NeikiAnalytics.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\appvcleaner.exe 7e6e2a883ecdaf212f05d0b6564c9460_NeikiAnalytics.exe -
Drops file in Windows directory 2 IoCs
Processes:
7e6e2a883ecdaf212f05d0b6564c9460_NeikiAnalytics.exedescription ioc process File created C:\windows\readme.1xt 7e6e2a883ecdaf212f05d0b6564c9460_NeikiAnalytics.exe File created C:\windows\WallPapers.jpg 7e6e2a883ecdaf212f05d0b6564c9460_NeikiAnalytics.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 3684 2996 WerFault.exe 7e6e2a883ecdaf212f05d0b6564c9460_NeikiAnalytics.exe -
Processes:
7e6e2a883ecdaf212f05d0b6564c9460_NeikiAnalytics.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Software\Microsoft\Internet Explorer\Desktop\General 7e6e2a883ecdaf212f05d0b6564c9460_NeikiAnalytics.exe Set value (str) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Internet Explorer\Desktop\General\WallpaperSource = "C:\\windows\\WallPapers.jpg" 7e6e2a883ecdaf212f05d0b6564c9460_NeikiAnalytics.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\7e6e2a883ecdaf212f05d0b6564c9460_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\7e6e2a883ecdaf212f05d0b6564c9460_NeikiAnalytics.exe"1⤵
- Enumerates connected drives
- Sets desktop wallpaper using registry
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies Internet Explorer settings
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2996 -s 7562⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 208 -p 2996 -ip 29961⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Program Files\7-Zip\7z.cabFilesize
544KB
MD59a1dd1d96481d61934dcc2d568971d06
SHA1f136ef9bf8bd2fc753292fb5b7cf173a22675fb3
SHA2568cebb25e240db3b6986fcaed6bc0b900fa09dad763a56fb71273529266c5c525
SHA5127ac1581f8a29e778ba1a1220670796c47fa5b838417f8f635e2cb1998a01515cff3ee57045dacb78a8ec70d43754b970743aba600379fe6d9481958d32d8a5aa
-
C:\Program Files\7-Zip\7z.exeFilesize
1.5MB
MD5cf87ac547ba109463084f58355333fc9
SHA1bf2f0095e41c8ccea0659b9011b405109973ca90
SHA2566cdd78f505d4ec4c35255c89c1087891a4d8d8983aca621e8eb9db51f332e8d5
SHA5127067178405fafc49826770f5516c6d5c1da1443ea422aec392886e88472cbf9ad163efe8610a102b37227a17deb44f4b2be8a6c03e48998fef708006ea78061c
-
C:\Program Files\7-Zip\7zFM.cabFilesize
930KB
MD530ac0b832d75598fb3ec37b6f2a8c86a
SHA16f47dbfd6ff36df7ba581a4cef024da527dc3046
SHA2561ea0839c8dc95ad2c060af7d042c40c0daed58ce8e4524c0fba12fd73e4afb74
SHA512505870601a4389b7ed2c8fecf85835adfd2944cbc10801f74bc4e08f5a0d6ecc9a52052fc37e216304cd1655129021862294a698ed36b3b43d428698f7263057
-
C:\Program Files\Common Files\microsoft shared\ClickToRun\RCX7380.tmpFilesize
168KB
MD5d31d478c87649a0046cc621224c46452
SHA1da7e366a1b7845297626b51c634b41c94b6aa625
SHA256ab8be413ba59162d4e071a9bee080aacdf344975c463e8d257430481be6a22a3
SHA512ddd7e87d69c1fed4ae1ca10128f638d22895184048dec52a346f588e07992ebf2f07945745bda0db886f4c52868b3dde7c394a3a984a6caeffc96d94307a7d1a
-
C:\Program Files\Common Files\microsoft shared\ClickToRun\appvcleaner.cabFilesize
2.1MB
MD5b8d69fa2755c3ab1f12f8866a8e2a4f7
SHA18e3cdfb20e158c2906323ba0094a18c7dd2aaf2d
SHA2567e0976036431640ae1d9f1c0b52bcea5dd37ef86cd3f5304dc8a96459d9483cd
SHA5125acac46068b331216978500f67a7fa5257bc5b05133fab6d88280b670ae4885ef2d5d1f531169b66bf1952e082f56b1ad2bc3901479b740f96c53ea405adda18
-
memory/2996-1-0x0000000000400000-0x00000000004AA000-memory.dmpFilesize
680KB
-
memory/2996-68-0x0000000000400000-0x00000000004AA000-memory.dmpFilesize
680KB