Analysis
-
max time kernel
150s -
max time network
123s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
24-05-2024 04:59
Static task
static1
Behavioral task
behavioral1
Sample
add31980a5ab936ef2587cd0241a92b0_NeikiAnalytics.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
add31980a5ab936ef2587cd0241a92b0_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
add31980a5ab936ef2587cd0241a92b0_NeikiAnalytics.exe
-
Size
53KB
-
MD5
add31980a5ab936ef2587cd0241a92b0
-
SHA1
aea631aabaf634edf80237efb38e55c5a5ab5b3e
-
SHA256
5a008594118c8a7436827d5c6fb277f9c38106fba60f700d126ab437a56f41ab
-
SHA512
ba4b45223ce433e3cf2567fc3a3e2097ec6e8923f3767838783648346456c301148b1583622e5a4757885a999e2643d88080d98a37ad01ed3eb7e80bd3d78fbb
-
SSDEEP
1536:vNvg8r8Q6CUS/X7Kp3StjEMjmLM3ztDJWZsXy4JzxPMU:ECUS/XJJjmLM3zRJWZsXy4Jd
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
Processes:
qiotoo.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" qiotoo.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
add31980a5ab936ef2587cd0241a92b0_NeikiAnalytics.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation add31980a5ab936ef2587cd0241a92b0_NeikiAnalytics.exe -
Executes dropped EXE 1 IoCs
Processes:
qiotoo.exepid process 2508 qiotoo.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
qiotoo.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\qiotoo = "C:\\Users\\Admin\\qiotoo.exe" qiotoo.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
qiotoo.exepid process 2508 qiotoo.exe 2508 qiotoo.exe 2508 qiotoo.exe 2508 qiotoo.exe 2508 qiotoo.exe 2508 qiotoo.exe 2508 qiotoo.exe 2508 qiotoo.exe 2508 qiotoo.exe 2508 qiotoo.exe 2508 qiotoo.exe 2508 qiotoo.exe 2508 qiotoo.exe 2508 qiotoo.exe 2508 qiotoo.exe 2508 qiotoo.exe 2508 qiotoo.exe 2508 qiotoo.exe 2508 qiotoo.exe 2508 qiotoo.exe 2508 qiotoo.exe 2508 qiotoo.exe 2508 qiotoo.exe 2508 qiotoo.exe 2508 qiotoo.exe 2508 qiotoo.exe 2508 qiotoo.exe 2508 qiotoo.exe 2508 qiotoo.exe 2508 qiotoo.exe 2508 qiotoo.exe 2508 qiotoo.exe 2508 qiotoo.exe 2508 qiotoo.exe 2508 qiotoo.exe 2508 qiotoo.exe 2508 qiotoo.exe 2508 qiotoo.exe 2508 qiotoo.exe 2508 qiotoo.exe 2508 qiotoo.exe 2508 qiotoo.exe 2508 qiotoo.exe 2508 qiotoo.exe 2508 qiotoo.exe 2508 qiotoo.exe 2508 qiotoo.exe 2508 qiotoo.exe 2508 qiotoo.exe 2508 qiotoo.exe 2508 qiotoo.exe 2508 qiotoo.exe 2508 qiotoo.exe 2508 qiotoo.exe 2508 qiotoo.exe 2508 qiotoo.exe 2508 qiotoo.exe 2508 qiotoo.exe 2508 qiotoo.exe 2508 qiotoo.exe 2508 qiotoo.exe 2508 qiotoo.exe 2508 qiotoo.exe 2508 qiotoo.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
add31980a5ab936ef2587cd0241a92b0_NeikiAnalytics.exeqiotoo.exepid process 3304 add31980a5ab936ef2587cd0241a92b0_NeikiAnalytics.exe 2508 qiotoo.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
add31980a5ab936ef2587cd0241a92b0_NeikiAnalytics.exeqiotoo.exedescription pid process target process PID 3304 wrote to memory of 2508 3304 add31980a5ab936ef2587cd0241a92b0_NeikiAnalytics.exe qiotoo.exe PID 3304 wrote to memory of 2508 3304 add31980a5ab936ef2587cd0241a92b0_NeikiAnalytics.exe qiotoo.exe PID 3304 wrote to memory of 2508 3304 add31980a5ab936ef2587cd0241a92b0_NeikiAnalytics.exe qiotoo.exe PID 2508 wrote to memory of 3304 2508 qiotoo.exe add31980a5ab936ef2587cd0241a92b0_NeikiAnalytics.exe PID 2508 wrote to memory of 3304 2508 qiotoo.exe add31980a5ab936ef2587cd0241a92b0_NeikiAnalytics.exe PID 2508 wrote to memory of 3304 2508 qiotoo.exe add31980a5ab936ef2587cd0241a92b0_NeikiAnalytics.exe PID 2508 wrote to memory of 3304 2508 qiotoo.exe add31980a5ab936ef2587cd0241a92b0_NeikiAnalytics.exe PID 2508 wrote to memory of 3304 2508 qiotoo.exe add31980a5ab936ef2587cd0241a92b0_NeikiAnalytics.exe PID 2508 wrote to memory of 3304 2508 qiotoo.exe add31980a5ab936ef2587cd0241a92b0_NeikiAnalytics.exe PID 2508 wrote to memory of 3304 2508 qiotoo.exe add31980a5ab936ef2587cd0241a92b0_NeikiAnalytics.exe PID 2508 wrote to memory of 3304 2508 qiotoo.exe add31980a5ab936ef2587cd0241a92b0_NeikiAnalytics.exe PID 2508 wrote to memory of 3304 2508 qiotoo.exe add31980a5ab936ef2587cd0241a92b0_NeikiAnalytics.exe PID 2508 wrote to memory of 3304 2508 qiotoo.exe add31980a5ab936ef2587cd0241a92b0_NeikiAnalytics.exe PID 2508 wrote to memory of 3304 2508 qiotoo.exe add31980a5ab936ef2587cd0241a92b0_NeikiAnalytics.exe PID 2508 wrote to memory of 3304 2508 qiotoo.exe add31980a5ab936ef2587cd0241a92b0_NeikiAnalytics.exe PID 2508 wrote to memory of 3304 2508 qiotoo.exe add31980a5ab936ef2587cd0241a92b0_NeikiAnalytics.exe PID 2508 wrote to memory of 3304 2508 qiotoo.exe add31980a5ab936ef2587cd0241a92b0_NeikiAnalytics.exe PID 2508 wrote to memory of 3304 2508 qiotoo.exe add31980a5ab936ef2587cd0241a92b0_NeikiAnalytics.exe PID 2508 wrote to memory of 3304 2508 qiotoo.exe add31980a5ab936ef2587cd0241a92b0_NeikiAnalytics.exe PID 2508 wrote to memory of 3304 2508 qiotoo.exe add31980a5ab936ef2587cd0241a92b0_NeikiAnalytics.exe PID 2508 wrote to memory of 3304 2508 qiotoo.exe add31980a5ab936ef2587cd0241a92b0_NeikiAnalytics.exe PID 2508 wrote to memory of 3304 2508 qiotoo.exe add31980a5ab936ef2587cd0241a92b0_NeikiAnalytics.exe PID 2508 wrote to memory of 3304 2508 qiotoo.exe add31980a5ab936ef2587cd0241a92b0_NeikiAnalytics.exe PID 2508 wrote to memory of 3304 2508 qiotoo.exe add31980a5ab936ef2587cd0241a92b0_NeikiAnalytics.exe PID 2508 wrote to memory of 3304 2508 qiotoo.exe add31980a5ab936ef2587cd0241a92b0_NeikiAnalytics.exe PID 2508 wrote to memory of 3304 2508 qiotoo.exe add31980a5ab936ef2587cd0241a92b0_NeikiAnalytics.exe PID 2508 wrote to memory of 3304 2508 qiotoo.exe add31980a5ab936ef2587cd0241a92b0_NeikiAnalytics.exe PID 2508 wrote to memory of 3304 2508 qiotoo.exe add31980a5ab936ef2587cd0241a92b0_NeikiAnalytics.exe PID 2508 wrote to memory of 3304 2508 qiotoo.exe add31980a5ab936ef2587cd0241a92b0_NeikiAnalytics.exe PID 2508 wrote to memory of 3304 2508 qiotoo.exe add31980a5ab936ef2587cd0241a92b0_NeikiAnalytics.exe PID 2508 wrote to memory of 3304 2508 qiotoo.exe add31980a5ab936ef2587cd0241a92b0_NeikiAnalytics.exe PID 2508 wrote to memory of 3304 2508 qiotoo.exe add31980a5ab936ef2587cd0241a92b0_NeikiAnalytics.exe PID 2508 wrote to memory of 3304 2508 qiotoo.exe add31980a5ab936ef2587cd0241a92b0_NeikiAnalytics.exe PID 2508 wrote to memory of 3304 2508 qiotoo.exe add31980a5ab936ef2587cd0241a92b0_NeikiAnalytics.exe PID 2508 wrote to memory of 3304 2508 qiotoo.exe add31980a5ab936ef2587cd0241a92b0_NeikiAnalytics.exe PID 2508 wrote to memory of 3304 2508 qiotoo.exe add31980a5ab936ef2587cd0241a92b0_NeikiAnalytics.exe PID 2508 wrote to memory of 3304 2508 qiotoo.exe add31980a5ab936ef2587cd0241a92b0_NeikiAnalytics.exe PID 2508 wrote to memory of 3304 2508 qiotoo.exe add31980a5ab936ef2587cd0241a92b0_NeikiAnalytics.exe PID 2508 wrote to memory of 3304 2508 qiotoo.exe add31980a5ab936ef2587cd0241a92b0_NeikiAnalytics.exe PID 2508 wrote to memory of 3304 2508 qiotoo.exe add31980a5ab936ef2587cd0241a92b0_NeikiAnalytics.exe PID 2508 wrote to memory of 3304 2508 qiotoo.exe add31980a5ab936ef2587cd0241a92b0_NeikiAnalytics.exe PID 2508 wrote to memory of 3304 2508 qiotoo.exe add31980a5ab936ef2587cd0241a92b0_NeikiAnalytics.exe PID 2508 wrote to memory of 3304 2508 qiotoo.exe add31980a5ab936ef2587cd0241a92b0_NeikiAnalytics.exe PID 2508 wrote to memory of 3304 2508 qiotoo.exe add31980a5ab936ef2587cd0241a92b0_NeikiAnalytics.exe PID 2508 wrote to memory of 3304 2508 qiotoo.exe add31980a5ab936ef2587cd0241a92b0_NeikiAnalytics.exe PID 2508 wrote to memory of 3304 2508 qiotoo.exe add31980a5ab936ef2587cd0241a92b0_NeikiAnalytics.exe PID 2508 wrote to memory of 3304 2508 qiotoo.exe add31980a5ab936ef2587cd0241a92b0_NeikiAnalytics.exe PID 2508 wrote to memory of 3304 2508 qiotoo.exe add31980a5ab936ef2587cd0241a92b0_NeikiAnalytics.exe PID 2508 wrote to memory of 3304 2508 qiotoo.exe add31980a5ab936ef2587cd0241a92b0_NeikiAnalytics.exe PID 2508 wrote to memory of 3304 2508 qiotoo.exe add31980a5ab936ef2587cd0241a92b0_NeikiAnalytics.exe PID 2508 wrote to memory of 3304 2508 qiotoo.exe add31980a5ab936ef2587cd0241a92b0_NeikiAnalytics.exe PID 2508 wrote to memory of 3304 2508 qiotoo.exe add31980a5ab936ef2587cd0241a92b0_NeikiAnalytics.exe PID 2508 wrote to memory of 3304 2508 qiotoo.exe add31980a5ab936ef2587cd0241a92b0_NeikiAnalytics.exe PID 2508 wrote to memory of 3304 2508 qiotoo.exe add31980a5ab936ef2587cd0241a92b0_NeikiAnalytics.exe PID 2508 wrote to memory of 3304 2508 qiotoo.exe add31980a5ab936ef2587cd0241a92b0_NeikiAnalytics.exe PID 2508 wrote to memory of 3304 2508 qiotoo.exe add31980a5ab936ef2587cd0241a92b0_NeikiAnalytics.exe PID 2508 wrote to memory of 3304 2508 qiotoo.exe add31980a5ab936ef2587cd0241a92b0_NeikiAnalytics.exe PID 2508 wrote to memory of 3304 2508 qiotoo.exe add31980a5ab936ef2587cd0241a92b0_NeikiAnalytics.exe PID 2508 wrote to memory of 3304 2508 qiotoo.exe add31980a5ab936ef2587cd0241a92b0_NeikiAnalytics.exe PID 2508 wrote to memory of 3304 2508 qiotoo.exe add31980a5ab936ef2587cd0241a92b0_NeikiAnalytics.exe PID 2508 wrote to memory of 3304 2508 qiotoo.exe add31980a5ab936ef2587cd0241a92b0_NeikiAnalytics.exe PID 2508 wrote to memory of 3304 2508 qiotoo.exe add31980a5ab936ef2587cd0241a92b0_NeikiAnalytics.exe PID 2508 wrote to memory of 3304 2508 qiotoo.exe add31980a5ab936ef2587cd0241a92b0_NeikiAnalytics.exe PID 2508 wrote to memory of 3304 2508 qiotoo.exe add31980a5ab936ef2587cd0241a92b0_NeikiAnalytics.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\add31980a5ab936ef2587cd0241a92b0_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\add31980a5ab936ef2587cd0241a92b0_NeikiAnalytics.exe"1⤵
- Checks computer location settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3304 -
C:\Users\Admin\qiotoo.exe"C:\Users\Admin\qiotoo.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2508
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
53KB
MD51c4ec15da61718d7349b50fa37f75cc8
SHA1f13b8ef2eedf8afed577a25a5d63846f80ad1aae
SHA256e8f878a8c2d444a6cef7a5365c3b1da3fb443d7cf00acc4b18c0f3f98086bf4f
SHA512d5168e623cea7f0a8ad9f7d9961b545de55be12f58509a058fdfe693a3ec6f3b501a8041355172c8b31cdcfaaef4d875a601938fe08abf7b3ec11f12d3828cf9