Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
23/05/2024, 16:38
Static task
static1
Behavioral task
behavioral1
Sample
7db8021ebcc4499fb05ba10a8cc1bdf0_NeikiAnalytics.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
7db8021ebcc4499fb05ba10a8cc1bdf0_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
7db8021ebcc4499fb05ba10a8cc1bdf0_NeikiAnalytics.exe
-
Size
2.6MB
-
MD5
7db8021ebcc4499fb05ba10a8cc1bdf0
-
SHA1
7b0f25dbd730e4c22b510e427871da99c208782d
-
SHA256
5e220a1aa1c5b178729c38ca9b705b3e81925fd194594b1d3282f3f59fbfb393
-
SHA512
4b564771442e6ac5bc449bdc7ed44a16f34a6a27f491282cd9dd71d53c1b96bb522b42c206f006c19db150aa712fe5f7df0adb2bd524a8925e86ae708cdf7338
-
SSDEEP
49152:TeS12nRc6C5CEAHD26ICQVt1ULUQRP6a6YPkCLJ37xbIjNyX5Hxzl/q:6S+c6ZEmqCMtmoQRP6aZtnsNq9l/q
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe -
Executes dropped EXE 4 IoCs
pid Process 1040 explorer.exe 4376 spoolsv.exe 688 svchost.exe 1300 spoolsv.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\resources\\themes\\explorer.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\resources\\svchost.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\resources\\themes\\explorer.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\resources\\svchost.exe RO" svchost.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\explorer.exe explorer.exe File opened for modification C:\Windows\SysWOW64\explorer.exe svchost.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 33 IoCs
pid Process 1296 7db8021ebcc4499fb05ba10a8cc1bdf0_NeikiAnalytics.exe 1040 explorer.exe 4376 spoolsv.exe 688 svchost.exe 1300 spoolsv.exe 1040 explorer.exe 688 svchost.exe 1040 explorer.exe 688 svchost.exe 1040 explorer.exe 688 svchost.exe 1040 explorer.exe 688 svchost.exe 1040 explorer.exe 688 svchost.exe 1040 explorer.exe 688 svchost.exe 1040 explorer.exe 688 svchost.exe 1040 explorer.exe 688 svchost.exe 1040 explorer.exe 688 svchost.exe 1040 explorer.exe 688 svchost.exe 1040 explorer.exe 688 svchost.exe 1040 explorer.exe 688 svchost.exe 1040 explorer.exe 688 svchost.exe 1040 explorer.exe 688 svchost.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification \??\c:\windows\resources\themes\explorer.exe 7db8021ebcc4499fb05ba10a8cc1bdf0_NeikiAnalytics.exe File opened for modification \??\c:\windows\resources\spoolsv.exe explorer.exe File opened for modification \??\c:\windows\resources\svchost.exe spoolsv.exe File opened for modification C:\Windows\Resources\tjud.exe explorer.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1296 7db8021ebcc4499fb05ba10a8cc1bdf0_NeikiAnalytics.exe 1296 7db8021ebcc4499fb05ba10a8cc1bdf0_NeikiAnalytics.exe 1296 7db8021ebcc4499fb05ba10a8cc1bdf0_NeikiAnalytics.exe 1296 7db8021ebcc4499fb05ba10a8cc1bdf0_NeikiAnalytics.exe 1296 7db8021ebcc4499fb05ba10a8cc1bdf0_NeikiAnalytics.exe 1296 7db8021ebcc4499fb05ba10a8cc1bdf0_NeikiAnalytics.exe 1296 7db8021ebcc4499fb05ba10a8cc1bdf0_NeikiAnalytics.exe 1296 7db8021ebcc4499fb05ba10a8cc1bdf0_NeikiAnalytics.exe 1296 7db8021ebcc4499fb05ba10a8cc1bdf0_NeikiAnalytics.exe 1296 7db8021ebcc4499fb05ba10a8cc1bdf0_NeikiAnalytics.exe 1296 7db8021ebcc4499fb05ba10a8cc1bdf0_NeikiAnalytics.exe 1296 7db8021ebcc4499fb05ba10a8cc1bdf0_NeikiAnalytics.exe 1296 7db8021ebcc4499fb05ba10a8cc1bdf0_NeikiAnalytics.exe 1296 7db8021ebcc4499fb05ba10a8cc1bdf0_NeikiAnalytics.exe 1296 7db8021ebcc4499fb05ba10a8cc1bdf0_NeikiAnalytics.exe 1296 7db8021ebcc4499fb05ba10a8cc1bdf0_NeikiAnalytics.exe 1296 7db8021ebcc4499fb05ba10a8cc1bdf0_NeikiAnalytics.exe 1296 7db8021ebcc4499fb05ba10a8cc1bdf0_NeikiAnalytics.exe 1296 7db8021ebcc4499fb05ba10a8cc1bdf0_NeikiAnalytics.exe 1296 7db8021ebcc4499fb05ba10a8cc1bdf0_NeikiAnalytics.exe 1296 7db8021ebcc4499fb05ba10a8cc1bdf0_NeikiAnalytics.exe 1296 7db8021ebcc4499fb05ba10a8cc1bdf0_NeikiAnalytics.exe 1296 7db8021ebcc4499fb05ba10a8cc1bdf0_NeikiAnalytics.exe 1296 7db8021ebcc4499fb05ba10a8cc1bdf0_NeikiAnalytics.exe 1296 7db8021ebcc4499fb05ba10a8cc1bdf0_NeikiAnalytics.exe 1296 7db8021ebcc4499fb05ba10a8cc1bdf0_NeikiAnalytics.exe 1296 7db8021ebcc4499fb05ba10a8cc1bdf0_NeikiAnalytics.exe 1296 7db8021ebcc4499fb05ba10a8cc1bdf0_NeikiAnalytics.exe 1296 7db8021ebcc4499fb05ba10a8cc1bdf0_NeikiAnalytics.exe 1296 7db8021ebcc4499fb05ba10a8cc1bdf0_NeikiAnalytics.exe 1296 7db8021ebcc4499fb05ba10a8cc1bdf0_NeikiAnalytics.exe 1296 7db8021ebcc4499fb05ba10a8cc1bdf0_NeikiAnalytics.exe 1296 7db8021ebcc4499fb05ba10a8cc1bdf0_NeikiAnalytics.exe 1296 7db8021ebcc4499fb05ba10a8cc1bdf0_NeikiAnalytics.exe 1040 explorer.exe 1040 explorer.exe 1040 explorer.exe 1040 explorer.exe 1040 explorer.exe 1040 explorer.exe 1040 explorer.exe 1040 explorer.exe 1040 explorer.exe 1040 explorer.exe 1040 explorer.exe 1040 explorer.exe 1040 explorer.exe 1040 explorer.exe 1040 explorer.exe 1040 explorer.exe 1040 explorer.exe 1040 explorer.exe 1040 explorer.exe 1040 explorer.exe 1040 explorer.exe 1040 explorer.exe 1040 explorer.exe 1040 explorer.exe 1040 explorer.exe 1040 explorer.exe 1040 explorer.exe 1040 explorer.exe 1040 explorer.exe 1040 explorer.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 1040 explorer.exe 688 svchost.exe -
Suspicious use of SetWindowsHookEx 15 IoCs
pid Process 1296 7db8021ebcc4499fb05ba10a8cc1bdf0_NeikiAnalytics.exe 1296 7db8021ebcc4499fb05ba10a8cc1bdf0_NeikiAnalytics.exe 1296 7db8021ebcc4499fb05ba10a8cc1bdf0_NeikiAnalytics.exe 1040 explorer.exe 1040 explorer.exe 1040 explorer.exe 4376 spoolsv.exe 4376 spoolsv.exe 4376 spoolsv.exe 688 svchost.exe 688 svchost.exe 688 svchost.exe 1300 spoolsv.exe 1300 spoolsv.exe 1300 spoolsv.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1296 wrote to memory of 1040 1296 7db8021ebcc4499fb05ba10a8cc1bdf0_NeikiAnalytics.exe 83 PID 1296 wrote to memory of 1040 1296 7db8021ebcc4499fb05ba10a8cc1bdf0_NeikiAnalytics.exe 83 PID 1296 wrote to memory of 1040 1296 7db8021ebcc4499fb05ba10a8cc1bdf0_NeikiAnalytics.exe 83 PID 1040 wrote to memory of 4376 1040 explorer.exe 85 PID 1040 wrote to memory of 4376 1040 explorer.exe 85 PID 1040 wrote to memory of 4376 1040 explorer.exe 85 PID 4376 wrote to memory of 688 4376 spoolsv.exe 87 PID 4376 wrote to memory of 688 4376 spoolsv.exe 87 PID 4376 wrote to memory of 688 4376 spoolsv.exe 87 PID 688 wrote to memory of 1300 688 svchost.exe 89 PID 688 wrote to memory of 1300 688 svchost.exe 89 PID 688 wrote to memory of 1300 688 svchost.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\7db8021ebcc4499fb05ba10a8cc1bdf0_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\7db8021ebcc4499fb05ba10a8cc1bdf0_NeikiAnalytics.exe"1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1296 -
\??\c:\windows\resources\themes\explorer.exec:\windows\resources\themes\explorer.exe2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1040 -
\??\c:\windows\resources\spoolsv.exec:\windows\resources\spoolsv.exe SE3⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4376 -
\??\c:\windows\resources\svchost.exec:\windows\resources\svchost.exe4⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:688 -
\??\c:\windows\resources\spoolsv.exec:\windows\resources\spoolsv.exe PR5⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetWindowsHookEx
PID:1300
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.6MB
MD5c177915065f539deb27ca301f748c1f3
SHA1f4afd5efb9efadef6ffa119383b103e4561aa83d
SHA2567d92fbdb296bb9da95891aa7a240ed8117b4a1ae473a9eab710b1531e4bec30f
SHA512ee6ce8360596efe0bf481866400f0fc8f2e73da48f9a3dee741489df226eac13d41bbfd7e7e5889aaab5144196b2a4b44d4cb7467f8c82457728f32c3de5387d
-
Filesize
2.6MB
MD5ac2c640ae9d4c52266d9d350264175f8
SHA19844d9c5f2d975606c4c3449f0c912b7d2ce328c
SHA256db5b11edb1becf9b1613ce2c0e5c13ba93f486cc79408bb8720f8d6d01525efd
SHA512ebc76f97e6dd5728485597ef57998617e7b60e74f6c934e250268bd163f764679851127572913617a7ed3d699117733044b89d11a316d26495487979b758f075
-
Filesize
2.6MB
MD5a97298c5304c6d8e84734697617b3fec
SHA1c16b705799413e2b5745f744a2d3cbc3cd901415
SHA256516c96e86f71b805873713091a7ef0e820b42de81490eb3409c4514ed60018d9
SHA5124f068e2116b2916486ff1478f6229ef63efc29471b622d593d32adc3e9a175909354428f47a0301c281e5624a2cb96d858335d829c29d9d6b63a53cab010c27b