Analysis
-
max time kernel
150s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
24-05-2024 04:22
Static task
static1
Behavioral task
behavioral1
Sample
a62e706774bb13312f2aae9931c02700_NeikiAnalytics.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
a62e706774bb13312f2aae9931c02700_NeikiAnalytics.exe
Resource
win10v2004-20240426-en
General
-
Target
a62e706774bb13312f2aae9931c02700_NeikiAnalytics.exe
-
Size
53KB
-
MD5
a62e706774bb13312f2aae9931c02700
-
SHA1
567b2bcecbfb6542d0e7986afeea818d686220d1
-
SHA256
c4351cd85df8b0a4a65ec8fe72dcbc38176f9ab8668635f74f48130dc36a6202
-
SHA512
6948261aa7b0e5856c5cd60d553fb337f4a868188c2a51a11862fba73bd74450944925110743a2dac81d7d4d5b792ab273aa56aebf73a2d9b5451ab43088864b
-
SSDEEP
1536:vNug8r8Q9FKu97Kp3StjEMjmLM3ztDJWZsXy4JzxPMk:UFKMJJjmLM3zRJWZsXy4JN
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
Processes:
vtgub.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" vtgub.exe -
Executes dropped EXE 1 IoCs
Processes:
vtgub.exepid process 2332 vtgub.exe -
Loads dropped DLL 2 IoCs
Processes:
a62e706774bb13312f2aae9931c02700_NeikiAnalytics.exepid process 2436 a62e706774bb13312f2aae9931c02700_NeikiAnalytics.exe 2436 a62e706774bb13312f2aae9931c02700_NeikiAnalytics.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
vtgub.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Windows\CurrentVersion\Run\vtgub = "C:\\Users\\Admin\\vtgub.exe" vtgub.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
vtgub.exepid process 2332 vtgub.exe 2332 vtgub.exe 2332 vtgub.exe 2332 vtgub.exe 2332 vtgub.exe 2332 vtgub.exe 2332 vtgub.exe 2332 vtgub.exe 2332 vtgub.exe 2332 vtgub.exe 2332 vtgub.exe 2332 vtgub.exe 2332 vtgub.exe 2332 vtgub.exe 2332 vtgub.exe 2332 vtgub.exe 2332 vtgub.exe 2332 vtgub.exe 2332 vtgub.exe 2332 vtgub.exe 2332 vtgub.exe 2332 vtgub.exe 2332 vtgub.exe 2332 vtgub.exe 2332 vtgub.exe 2332 vtgub.exe 2332 vtgub.exe 2332 vtgub.exe 2332 vtgub.exe 2332 vtgub.exe 2332 vtgub.exe 2332 vtgub.exe 2332 vtgub.exe 2332 vtgub.exe 2332 vtgub.exe 2332 vtgub.exe 2332 vtgub.exe 2332 vtgub.exe 2332 vtgub.exe 2332 vtgub.exe 2332 vtgub.exe 2332 vtgub.exe 2332 vtgub.exe 2332 vtgub.exe 2332 vtgub.exe 2332 vtgub.exe 2332 vtgub.exe 2332 vtgub.exe 2332 vtgub.exe 2332 vtgub.exe 2332 vtgub.exe 2332 vtgub.exe 2332 vtgub.exe 2332 vtgub.exe 2332 vtgub.exe 2332 vtgub.exe 2332 vtgub.exe 2332 vtgub.exe 2332 vtgub.exe 2332 vtgub.exe 2332 vtgub.exe 2332 vtgub.exe 2332 vtgub.exe 2332 vtgub.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
a62e706774bb13312f2aae9931c02700_NeikiAnalytics.exevtgub.exepid process 2436 a62e706774bb13312f2aae9931c02700_NeikiAnalytics.exe 2332 vtgub.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
a62e706774bb13312f2aae9931c02700_NeikiAnalytics.exevtgub.exedescription pid process target process PID 2436 wrote to memory of 2332 2436 a62e706774bb13312f2aae9931c02700_NeikiAnalytics.exe vtgub.exe PID 2436 wrote to memory of 2332 2436 a62e706774bb13312f2aae9931c02700_NeikiAnalytics.exe vtgub.exe PID 2436 wrote to memory of 2332 2436 a62e706774bb13312f2aae9931c02700_NeikiAnalytics.exe vtgub.exe PID 2436 wrote to memory of 2332 2436 a62e706774bb13312f2aae9931c02700_NeikiAnalytics.exe vtgub.exe PID 2332 wrote to memory of 2436 2332 vtgub.exe a62e706774bb13312f2aae9931c02700_NeikiAnalytics.exe PID 2332 wrote to memory of 2436 2332 vtgub.exe a62e706774bb13312f2aae9931c02700_NeikiAnalytics.exe PID 2332 wrote to memory of 2436 2332 vtgub.exe a62e706774bb13312f2aae9931c02700_NeikiAnalytics.exe PID 2332 wrote to memory of 2436 2332 vtgub.exe a62e706774bb13312f2aae9931c02700_NeikiAnalytics.exe PID 2332 wrote to memory of 2436 2332 vtgub.exe a62e706774bb13312f2aae9931c02700_NeikiAnalytics.exe PID 2332 wrote to memory of 2436 2332 vtgub.exe a62e706774bb13312f2aae9931c02700_NeikiAnalytics.exe PID 2332 wrote to memory of 2436 2332 vtgub.exe a62e706774bb13312f2aae9931c02700_NeikiAnalytics.exe PID 2332 wrote to memory of 2436 2332 vtgub.exe a62e706774bb13312f2aae9931c02700_NeikiAnalytics.exe PID 2332 wrote to memory of 2436 2332 vtgub.exe a62e706774bb13312f2aae9931c02700_NeikiAnalytics.exe PID 2332 wrote to memory of 2436 2332 vtgub.exe a62e706774bb13312f2aae9931c02700_NeikiAnalytics.exe PID 2332 wrote to memory of 2436 2332 vtgub.exe a62e706774bb13312f2aae9931c02700_NeikiAnalytics.exe PID 2332 wrote to memory of 2436 2332 vtgub.exe a62e706774bb13312f2aae9931c02700_NeikiAnalytics.exe PID 2332 wrote to memory of 2436 2332 vtgub.exe a62e706774bb13312f2aae9931c02700_NeikiAnalytics.exe PID 2332 wrote to memory of 2436 2332 vtgub.exe a62e706774bb13312f2aae9931c02700_NeikiAnalytics.exe PID 2332 wrote to memory of 2436 2332 vtgub.exe a62e706774bb13312f2aae9931c02700_NeikiAnalytics.exe PID 2332 wrote to memory of 2436 2332 vtgub.exe a62e706774bb13312f2aae9931c02700_NeikiAnalytics.exe PID 2332 wrote to memory of 2436 2332 vtgub.exe a62e706774bb13312f2aae9931c02700_NeikiAnalytics.exe PID 2332 wrote to memory of 2436 2332 vtgub.exe a62e706774bb13312f2aae9931c02700_NeikiAnalytics.exe PID 2332 wrote to memory of 2436 2332 vtgub.exe a62e706774bb13312f2aae9931c02700_NeikiAnalytics.exe PID 2332 wrote to memory of 2436 2332 vtgub.exe a62e706774bb13312f2aae9931c02700_NeikiAnalytics.exe PID 2332 wrote to memory of 2436 2332 vtgub.exe a62e706774bb13312f2aae9931c02700_NeikiAnalytics.exe PID 2332 wrote to memory of 2436 2332 vtgub.exe a62e706774bb13312f2aae9931c02700_NeikiAnalytics.exe PID 2332 wrote to memory of 2436 2332 vtgub.exe a62e706774bb13312f2aae9931c02700_NeikiAnalytics.exe PID 2332 wrote to memory of 2436 2332 vtgub.exe a62e706774bb13312f2aae9931c02700_NeikiAnalytics.exe PID 2332 wrote to memory of 2436 2332 vtgub.exe a62e706774bb13312f2aae9931c02700_NeikiAnalytics.exe PID 2332 wrote to memory of 2436 2332 vtgub.exe a62e706774bb13312f2aae9931c02700_NeikiAnalytics.exe PID 2332 wrote to memory of 2436 2332 vtgub.exe a62e706774bb13312f2aae9931c02700_NeikiAnalytics.exe PID 2332 wrote to memory of 2436 2332 vtgub.exe a62e706774bb13312f2aae9931c02700_NeikiAnalytics.exe PID 2332 wrote to memory of 2436 2332 vtgub.exe a62e706774bb13312f2aae9931c02700_NeikiAnalytics.exe PID 2332 wrote to memory of 2436 2332 vtgub.exe a62e706774bb13312f2aae9931c02700_NeikiAnalytics.exe PID 2332 wrote to memory of 2436 2332 vtgub.exe a62e706774bb13312f2aae9931c02700_NeikiAnalytics.exe PID 2332 wrote to memory of 2436 2332 vtgub.exe a62e706774bb13312f2aae9931c02700_NeikiAnalytics.exe PID 2332 wrote to memory of 2436 2332 vtgub.exe a62e706774bb13312f2aae9931c02700_NeikiAnalytics.exe PID 2332 wrote to memory of 2436 2332 vtgub.exe a62e706774bb13312f2aae9931c02700_NeikiAnalytics.exe PID 2332 wrote to memory of 2436 2332 vtgub.exe a62e706774bb13312f2aae9931c02700_NeikiAnalytics.exe PID 2332 wrote to memory of 2436 2332 vtgub.exe a62e706774bb13312f2aae9931c02700_NeikiAnalytics.exe PID 2332 wrote to memory of 2436 2332 vtgub.exe a62e706774bb13312f2aae9931c02700_NeikiAnalytics.exe PID 2332 wrote to memory of 2436 2332 vtgub.exe a62e706774bb13312f2aae9931c02700_NeikiAnalytics.exe PID 2332 wrote to memory of 2436 2332 vtgub.exe a62e706774bb13312f2aae9931c02700_NeikiAnalytics.exe PID 2332 wrote to memory of 2436 2332 vtgub.exe a62e706774bb13312f2aae9931c02700_NeikiAnalytics.exe PID 2332 wrote to memory of 2436 2332 vtgub.exe a62e706774bb13312f2aae9931c02700_NeikiAnalytics.exe PID 2332 wrote to memory of 2436 2332 vtgub.exe a62e706774bb13312f2aae9931c02700_NeikiAnalytics.exe PID 2332 wrote to memory of 2436 2332 vtgub.exe a62e706774bb13312f2aae9931c02700_NeikiAnalytics.exe PID 2332 wrote to memory of 2436 2332 vtgub.exe a62e706774bb13312f2aae9931c02700_NeikiAnalytics.exe PID 2332 wrote to memory of 2436 2332 vtgub.exe a62e706774bb13312f2aae9931c02700_NeikiAnalytics.exe PID 2332 wrote to memory of 2436 2332 vtgub.exe a62e706774bb13312f2aae9931c02700_NeikiAnalytics.exe PID 2332 wrote to memory of 2436 2332 vtgub.exe a62e706774bb13312f2aae9931c02700_NeikiAnalytics.exe PID 2332 wrote to memory of 2436 2332 vtgub.exe a62e706774bb13312f2aae9931c02700_NeikiAnalytics.exe PID 2332 wrote to memory of 2436 2332 vtgub.exe a62e706774bb13312f2aae9931c02700_NeikiAnalytics.exe PID 2332 wrote to memory of 2436 2332 vtgub.exe a62e706774bb13312f2aae9931c02700_NeikiAnalytics.exe PID 2332 wrote to memory of 2436 2332 vtgub.exe a62e706774bb13312f2aae9931c02700_NeikiAnalytics.exe PID 2332 wrote to memory of 2436 2332 vtgub.exe a62e706774bb13312f2aae9931c02700_NeikiAnalytics.exe PID 2332 wrote to memory of 2436 2332 vtgub.exe a62e706774bb13312f2aae9931c02700_NeikiAnalytics.exe PID 2332 wrote to memory of 2436 2332 vtgub.exe a62e706774bb13312f2aae9931c02700_NeikiAnalytics.exe PID 2332 wrote to memory of 2436 2332 vtgub.exe a62e706774bb13312f2aae9931c02700_NeikiAnalytics.exe PID 2332 wrote to memory of 2436 2332 vtgub.exe a62e706774bb13312f2aae9931c02700_NeikiAnalytics.exe PID 2332 wrote to memory of 2436 2332 vtgub.exe a62e706774bb13312f2aae9931c02700_NeikiAnalytics.exe PID 2332 wrote to memory of 2436 2332 vtgub.exe a62e706774bb13312f2aae9931c02700_NeikiAnalytics.exe PID 2332 wrote to memory of 2436 2332 vtgub.exe a62e706774bb13312f2aae9931c02700_NeikiAnalytics.exe PID 2332 wrote to memory of 2436 2332 vtgub.exe a62e706774bb13312f2aae9931c02700_NeikiAnalytics.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\a62e706774bb13312f2aae9931c02700_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\a62e706774bb13312f2aae9931c02700_NeikiAnalytics.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2436 -
C:\Users\Admin\vtgub.exe"C:\Users\Admin\vtgub.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2332
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
53KB
MD5e69bcb3beadc5ac212dabadb3fa7b9ca
SHA1ca80e78687638d752657becf5c96ca1bdf567699
SHA25631a5a0e93aa7f73dd7fc073df1700ad607a46463c937b4592695c33185b1d965
SHA512b705e3708c2118026b907552d70f0b1da7a1143c3c4ae6271c8035abe04806608c0533e55e839097199336f3d48c68c49db2046e6667a604371ca3f05d04b4d3