Analysis
-
max time kernel
155s -
max time network
159s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
24-05-2024 03:49
Static task
static1
Behavioral task
behavioral1
Sample
a013011a02b4eddd3a6b900a2dfbb530_NeikiAnalytics.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
a013011a02b4eddd3a6b900a2dfbb530_NeikiAnalytics.exe
Resource
win10v2004-20240226-en
General
-
Target
a013011a02b4eddd3a6b900a2dfbb530_NeikiAnalytics.exe
-
Size
408KB
-
MD5
a013011a02b4eddd3a6b900a2dfbb530
-
SHA1
241327ee02e188be8907df4915f18e967819037b
-
SHA256
18b170a9022186f4ff709e068aa7f082479a71c0dbbcc57271c0386ba175ae19
-
SHA512
62419d2a45638bfc09fbd257a4a15ece06c323714a6e3bce6a7cff7bd66856b5aecc89160449e7467a13df6b851353bc78e6626b933baedc85c1e5d5e2e4f64d
-
SSDEEP
6144:4jlYKRF/LReWAsUyLUCE/RpdM/2Tdh21LUYkv:4jauDReWjCc/2TK6Nv
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
lycfn.exepid process 2248 lycfn.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
lycfn.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Microsoft® Windows® Operating System = "C:\\ProgramData\\lycfn.exe" lycfn.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
a013011a02b4eddd3a6b900a2dfbb530_NeikiAnalytics.exedescription pid process target process PID 4336 wrote to memory of 2248 4336 a013011a02b4eddd3a6b900a2dfbb530_NeikiAnalytics.exe lycfn.exe PID 4336 wrote to memory of 2248 4336 a013011a02b4eddd3a6b900a2dfbb530_NeikiAnalytics.exe lycfn.exe PID 4336 wrote to memory of 2248 4336 a013011a02b4eddd3a6b900a2dfbb530_NeikiAnalytics.exe lycfn.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\a013011a02b4eddd3a6b900a2dfbb530_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\a013011a02b4eddd3a6b900a2dfbb530_NeikiAnalytics.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4336 -
C:\ProgramData\lycfn.exe"C:\ProgramData\lycfn.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:2248
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4240 --field-trial-handle=2656,i,16940681401824032220,151921362336696246,262144 --variations-seed-version /prefetch:81⤵PID:4264
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
408KB
MD5dafcd15551417668a11a28b1dc1f5fb7
SHA1e9df90f4edd9b9b8e7b3ef60e6e30d7d86b0a041
SHA25684386f74b3d4f013eca1541e33f1dcd82860ad51506b6d7311178a31fdf71c49
SHA5121214c1a8a505eab99a608e5c7b4491efcc3d6ab6368c3c797990ab90ed0d58017fb8bfceda6f06c54cb9264172201eeb3d7999d809392a7406675bfb90a20e31
-
Filesize
136KB
MD5cb4c442a26bb46671c638c794bf535af
SHA18a742d0b372f2ddd2d1fdf688c3c4ac7f9272abf
SHA256f8d2c17bdf34ccfb58070ac8b131a8d95055340101a329f9a7212ac5240d0c25
SHA512074a31e8da403c0a718f93cbca50574d8b658921193db0e6e20eacd232379286f14a3698cd443dc740d324ad19d74934ae001a7ad64b88897d8afefbc9a3d4e3
-
Filesize
271KB
MD56557a58ba4306dba6805aaf6b95e962e
SHA123d538ebfe9b5aa273659e87c950c89b8ca1b3d0
SHA256217004356520c17060725bc8168f5724d94a50df9021ec39c42f67e9564053f6
SHA512bde6db37754032ba6e31e44554624547934a551aed7a00a9c98c2ab7c6acf42df6427300fe79cc82ba6e1dfdeae92602caa966b3da4a92607e47aab18970afff