Analysis
-
max time kernel
142s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
24-05-2024 17:50
Behavioral task
behavioral1
Sample
f1f0bc22079b5b2b33ec560b0a64c330_NeikiAnalytics.exe
Resource
win7-20240221-en
General
-
Target
f1f0bc22079b5b2b33ec560b0a64c330_NeikiAnalytics.exe
-
Size
504KB
-
MD5
f1f0bc22079b5b2b33ec560b0a64c330
-
SHA1
216fe91a2916660d82ce58357f40ef05992b5d1e
-
SHA256
ebb8f40ced7bc2272ef320188049ca5e08e33ef6d9847185d784a27b3846d70e
-
SHA512
8c6b35a5292f79d234e873fb2514254ee881471058db4910cd51dd2696d2ab61f71110118cd2f192512ec06f25d58ac641418608212ed26f50e26ca1913b4e48
-
SSDEEP
12288:tPmTkT0+nXTv1d5Jo/H4a6ZeUOHFVS9Qg:Vmo4IXhd81rS
Malware Config
Signatures
-
Executes dropped EXE 3 IoCs
Processes:
Explorrer.exeExplorrer.exeExplorrer.exepid process 2368 Explorrer.exe 1948 Explorrer.exe 1520 Explorrer.exe -
Loads dropped DLL 4 IoCs
Processes:
f1f0bc22079b5b2b33ec560b0a64c330_NeikiAnalytics.exeregsvr32.exeregsvr32.exepid process 2532 f1f0bc22079b5b2b33ec560b0a64c330_NeikiAnalytics.exe 2532 f1f0bc22079b5b2b33ec560b0a64c330_NeikiAnalytics.exe 1196 regsvr32.exe 2892 regsvr32.exe -
Processes:
resource yara_rule behavioral1/memory/2664-0-0x0000000000400000-0x000000000049C000-memory.dmp upx behavioral1/memory/2664-3-0x0000000000400000-0x000000000049C000-memory.dmp upx behavioral1/memory/2664-20-0x0000000002630000-0x00000000026CC000-memory.dmp upx behavioral1/memory/2664-22-0x0000000000400000-0x000000000049C000-memory.dmp upx behavioral1/memory/2664-4-0x0000000000400000-0x000000000049C000-memory.dmp upx \Users\Admin\AppData\Roaming\AppsData\Explorrer.exe upx behavioral1/memory/2532-30-0x00000000024C0000-0x000000000255C000-memory.dmp upx behavioral1/memory/2368-37-0x0000000000400000-0x000000000049C000-memory.dmp upx behavioral1/memory/2368-43-0x0000000000400000-0x000000000049C000-memory.dmp upx behavioral1/memory/2368-89-0x0000000000400000-0x000000000049C000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
reg.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Run\Explorrer = "C:\\Users\\Admin\\AppData\\Roaming\\AppsData\\Explorrer.exe -notray" reg.exe -
Installs/modifies Browser Helper Object 2 TTPs 2 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
Processes:
regsvr32.exedescription ioc process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{DE274C2C-2133-4B4B-93B3-8F21486DABC0} regsvr32.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{DE274C2C-2133-4B4B-93B3-8F21486DABC0}\NoExplorer = "1" regsvr32.exe -
Suspicious use of SetThreadContext 3 IoCs
Processes:
f1f0bc22079b5b2b33ec560b0a64c330_NeikiAnalytics.exeExplorrer.exedescription pid process target process PID 2664 set thread context of 2532 2664 f1f0bc22079b5b2b33ec560b0a64c330_NeikiAnalytics.exe f1f0bc22079b5b2b33ec560b0a64c330_NeikiAnalytics.exe PID 2368 set thread context of 1948 2368 Explorrer.exe Explorrer.exe PID 2368 set thread context of 1520 2368 Explorrer.exe Explorrer.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Gathers network information 2 TTPs 1 IoCs
Uses commandline utility to view network configuration.
Processes:
ipconfig.exepid process 1660 ipconfig.exe -
Processes:
Explorrer.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Approved Extensions Explorrer.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Approved Extensions\{3543619C-D563-43f7-95EA-4DA7E1CC396A} = 51667a6c4c1d3b1b003ad2d87fc9ac0780c431c2a3933e7f Explorrer.exe -
Modifies registry class 5 IoCs
Processes:
regsvr32.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{DE274C2C-2133-4B4B-93B3-8F21486DABC0}\InProcServer32\ThreadingModel = "Apartment" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{DE274C2C-2133-4B4B-93B3-8F21486DABC0} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{DE274C2C-2133-4B4B-93B3-8F21486DABC0}\ = "IE MANAGER" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{DE274C2C-2133-4B4B-93B3-8F21486DABC0}\InProcServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{DE274C2C-2133-4B4B-93B3-8F21486DABC0}\InProcServer32\ = "C:\\Users\\Admin\\AppData\\Roaming\\IE\\bho.dll" regsvr32.exe -
Modifies registry key 1 TTPs 1 IoCs
-
Suspicious use of SetWindowsHookEx 4 IoCs
Processes:
f1f0bc22079b5b2b33ec560b0a64c330_NeikiAnalytics.exef1f0bc22079b5b2b33ec560b0a64c330_NeikiAnalytics.exeExplorrer.exeExplorrer.exepid process 2664 f1f0bc22079b5b2b33ec560b0a64c330_NeikiAnalytics.exe 2532 f1f0bc22079b5b2b33ec560b0a64c330_NeikiAnalytics.exe 2368 Explorrer.exe 1948 Explorrer.exe -
Suspicious use of WriteProcessMemory 62 IoCs
Processes:
f1f0bc22079b5b2b33ec560b0a64c330_NeikiAnalytics.exef1f0bc22079b5b2b33ec560b0a64c330_NeikiAnalytics.exeExplorrer.exeExplorrer.exeExplorrer.exeipconfig.execmd.exedescription pid process target process PID 2664 wrote to memory of 2532 2664 f1f0bc22079b5b2b33ec560b0a64c330_NeikiAnalytics.exe f1f0bc22079b5b2b33ec560b0a64c330_NeikiAnalytics.exe PID 2664 wrote to memory of 2532 2664 f1f0bc22079b5b2b33ec560b0a64c330_NeikiAnalytics.exe f1f0bc22079b5b2b33ec560b0a64c330_NeikiAnalytics.exe PID 2664 wrote to memory of 2532 2664 f1f0bc22079b5b2b33ec560b0a64c330_NeikiAnalytics.exe f1f0bc22079b5b2b33ec560b0a64c330_NeikiAnalytics.exe PID 2664 wrote to memory of 2532 2664 f1f0bc22079b5b2b33ec560b0a64c330_NeikiAnalytics.exe f1f0bc22079b5b2b33ec560b0a64c330_NeikiAnalytics.exe PID 2664 wrote to memory of 2532 2664 f1f0bc22079b5b2b33ec560b0a64c330_NeikiAnalytics.exe f1f0bc22079b5b2b33ec560b0a64c330_NeikiAnalytics.exe PID 2664 wrote to memory of 2532 2664 f1f0bc22079b5b2b33ec560b0a64c330_NeikiAnalytics.exe f1f0bc22079b5b2b33ec560b0a64c330_NeikiAnalytics.exe PID 2664 wrote to memory of 2532 2664 f1f0bc22079b5b2b33ec560b0a64c330_NeikiAnalytics.exe f1f0bc22079b5b2b33ec560b0a64c330_NeikiAnalytics.exe PID 2664 wrote to memory of 2532 2664 f1f0bc22079b5b2b33ec560b0a64c330_NeikiAnalytics.exe f1f0bc22079b5b2b33ec560b0a64c330_NeikiAnalytics.exe PID 2664 wrote to memory of 2532 2664 f1f0bc22079b5b2b33ec560b0a64c330_NeikiAnalytics.exe f1f0bc22079b5b2b33ec560b0a64c330_NeikiAnalytics.exe PID 2532 wrote to memory of 2368 2532 f1f0bc22079b5b2b33ec560b0a64c330_NeikiAnalytics.exe Explorrer.exe PID 2532 wrote to memory of 2368 2532 f1f0bc22079b5b2b33ec560b0a64c330_NeikiAnalytics.exe Explorrer.exe PID 2532 wrote to memory of 2368 2532 f1f0bc22079b5b2b33ec560b0a64c330_NeikiAnalytics.exe Explorrer.exe PID 2532 wrote to memory of 2368 2532 f1f0bc22079b5b2b33ec560b0a64c330_NeikiAnalytics.exe Explorrer.exe PID 2368 wrote to memory of 1948 2368 Explorrer.exe Explorrer.exe PID 2368 wrote to memory of 1948 2368 Explorrer.exe Explorrer.exe PID 2368 wrote to memory of 1948 2368 Explorrer.exe Explorrer.exe PID 2368 wrote to memory of 1948 2368 Explorrer.exe Explorrer.exe PID 2368 wrote to memory of 1948 2368 Explorrer.exe Explorrer.exe PID 2368 wrote to memory of 1948 2368 Explorrer.exe Explorrer.exe PID 2368 wrote to memory of 1948 2368 Explorrer.exe Explorrer.exe PID 2368 wrote to memory of 1948 2368 Explorrer.exe Explorrer.exe PID 2368 wrote to memory of 1948 2368 Explorrer.exe Explorrer.exe PID 2368 wrote to memory of 1520 2368 Explorrer.exe Explorrer.exe PID 2368 wrote to memory of 1520 2368 Explorrer.exe Explorrer.exe PID 2368 wrote to memory of 1520 2368 Explorrer.exe Explorrer.exe PID 2368 wrote to memory of 1520 2368 Explorrer.exe Explorrer.exe PID 2368 wrote to memory of 1520 2368 Explorrer.exe Explorrer.exe PID 2368 wrote to memory of 1520 2368 Explorrer.exe Explorrer.exe PID 2368 wrote to memory of 1520 2368 Explorrer.exe Explorrer.exe PID 2368 wrote to memory of 1520 2368 Explorrer.exe Explorrer.exe PID 2368 wrote to memory of 1520 2368 Explorrer.exe Explorrer.exe PID 2368 wrote to memory of 1520 2368 Explorrer.exe Explorrer.exe PID 2368 wrote to memory of 1520 2368 Explorrer.exe Explorrer.exe PID 2368 wrote to memory of 1520 2368 Explorrer.exe Explorrer.exe PID 1948 wrote to memory of 1660 1948 Explorrer.exe ipconfig.exe PID 1948 wrote to memory of 1660 1948 Explorrer.exe ipconfig.exe PID 1948 wrote to memory of 1660 1948 Explorrer.exe ipconfig.exe PID 1948 wrote to memory of 1660 1948 Explorrer.exe ipconfig.exe PID 1948 wrote to memory of 1660 1948 Explorrer.exe ipconfig.exe PID 1948 wrote to memory of 1660 1948 Explorrer.exe ipconfig.exe PID 1520 wrote to memory of 1196 1520 Explorrer.exe regsvr32.exe PID 1520 wrote to memory of 1196 1520 Explorrer.exe regsvr32.exe PID 1520 wrote to memory of 1196 1520 Explorrer.exe regsvr32.exe PID 1520 wrote to memory of 1196 1520 Explorrer.exe regsvr32.exe PID 1520 wrote to memory of 1196 1520 Explorrer.exe regsvr32.exe PID 1520 wrote to memory of 1196 1520 Explorrer.exe regsvr32.exe PID 1520 wrote to memory of 1196 1520 Explorrer.exe regsvr32.exe PID 1660 wrote to memory of 2836 1660 ipconfig.exe cmd.exe PID 1660 wrote to memory of 2836 1660 ipconfig.exe cmd.exe PID 1660 wrote to memory of 2836 1660 ipconfig.exe cmd.exe PID 1660 wrote to memory of 2836 1660 ipconfig.exe cmd.exe PID 1520 wrote to memory of 2892 1520 Explorrer.exe regsvr32.exe PID 1520 wrote to memory of 2892 1520 Explorrer.exe regsvr32.exe PID 1520 wrote to memory of 2892 1520 Explorrer.exe regsvr32.exe PID 1520 wrote to memory of 2892 1520 Explorrer.exe regsvr32.exe PID 1520 wrote to memory of 2892 1520 Explorrer.exe regsvr32.exe PID 1520 wrote to memory of 2892 1520 Explorrer.exe regsvr32.exe PID 1520 wrote to memory of 2892 1520 Explorrer.exe regsvr32.exe PID 2836 wrote to memory of 1000 2836 cmd.exe reg.exe PID 2836 wrote to memory of 1000 2836 cmd.exe reg.exe PID 2836 wrote to memory of 1000 2836 cmd.exe reg.exe PID 2836 wrote to memory of 1000 2836 cmd.exe reg.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\f1f0bc22079b5b2b33ec560b0a64c330_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\f1f0bc22079b5b2b33ec560b0a64c330_NeikiAnalytics.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2664 -
C:\Users\Admin\AppData\Local\Temp\f1f0bc22079b5b2b33ec560b0a64c330_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\f1f0bc22079b5b2b33ec560b0a64c330_NeikiAnalytics.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2532 -
C:\Users\Admin\AppData\Roaming\AppsData\Explorrer.exeC:\Users\Admin\AppData\Roaming\AppsData\Explorrer.exe -notray3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2368 -
C:\Users\Admin\AppData\Roaming\AppsData\Explorrer.exe"C:\Users\Admin\AppData\Roaming\AppsData\Explorrer.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1948 -
C:\Windows\SysWOW64\ipconfig.exe"C:\Windows\system32\ipconfig.exe"5⤵
- Gathers network information
- Suspicious use of WriteProcessMemory
PID:1660 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\SKJRFFGB.bat" "6⤵
- Suspicious use of WriteProcessMemory
PID:2836 -
C:\Windows\SysWOW64\reg.exeREG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /v Explorrer /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\AppsData\Explorrer.exe -notray" /f7⤵
- Adds Run key to start application
- Modifies registry key
PID:1000
-
-
-
-
-
C:\Users\Admin\AppData\Roaming\AppsData\Explorrer.exe"C:\Users\Admin\AppData\Roaming\AppsData\Explorrer.exe"4⤵
- Executes dropped EXE
- Modifies Internet Explorer settings
- Suspicious use of WriteProcessMemory
PID:1520 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /u /s "C:\Users\Admin\AppData\Roaming\IE\bho.dll"5⤵
- Loads dropped DLL
PID:1196
-
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s "C:\Users\Admin\AppData\Roaming\IE\bho.dll"5⤵
- Loads dropped DLL
- Installs/modifies Browser Helper Object
- Modifies registry class
PID:2892
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
153B
MD502cbdd547ced25f8f7dc814d9169d567
SHA1fc9697d828dcda615f6edd3e49a55b9307dbd311
SHA256ec250cdf89523b18688d45fdc11bc93e46547a574ef59e03426c098f6b887c07
SHA512cec1b6c5d843408e3cb6345a3430d8469a07c09677e1bd4c522c41ee29dbd941236a8dd9963410c69a165f3913c30aa22cfd206e51a59b9ffd160c38e70cfe3f
-
Filesize
504KB
MD58d6b7a1973e2cb270540ee8d087d27b5
SHA15658043b8bc0e6b6017f810902be475e4c4c27a6
SHA256b1f6a56ae7f96bcc2d1891b0001567ce769800135b866e432a7f0208372f763c
SHA512fc7a7103be01a1bbf4df85571160fcfa3602af021f99798754136534e6f1bddc7673760efd404af062aa967d8bfb79e3f59a35a6c636547e7dfef4aeb6c2ed65
-
Filesize
87KB
MD549a92a33d1775b45b3bd45f8bec24585
SHA1ea404af50bbdad5cbc9f95f4068bdc30c9fceff6
SHA256976540cf1b4d04d80be1f1af8ea0f050c3f03a0a8c4e339589b7bb9180fc07f5
SHA5127d5c4ea5c6f950a41bff386289df88b3f6d78444d7eeaa8a426569ce7698c2dfa916ae02d321af2be839c20e53b2ba9b3bb6a1573cad3b578733b082f0dc292f