Malware Analysis Report

2025-08-11 00:04

Sample ID 240525-137dlacc2z
Target 2830d47f1565de3d29c155daa3436b70_NeikiAnalytics.exe
SHA256 50493ad9d642e296b836eaf821c2dcbc2ad9576f6441d9b4d0026c581357f7a0
Tags
evasion persistence
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

50493ad9d642e296b836eaf821c2dcbc2ad9576f6441d9b4d0026c581357f7a0

Threat Level: Known bad

The file 2830d47f1565de3d29c155daa3436b70_NeikiAnalytics.exe was found to be: Known bad.

Malicious Activity Summary

evasion persistence

Modifies visiblity of hidden/system files in Explorer

Checks computer location settings

Executes dropped EXE

Loads dropped DLL

Adds Run key to start application

Unsigned PE

Enumerates physical storage devices

Suspicious behavior: EnumeratesProcesses

Suspicious use of SetWindowsHookEx

Suspicious use of WriteProcessMemory

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-05-25 22:11

Signatures

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-05-25 22:11

Reported

2024-05-25 22:14

Platform

win7-20240220-en

Max time kernel

149s

Max time network

144s

Command Line

"C:\Users\Admin\AppData\Local\Temp\2830d47f1565de3d29c155daa3436b70_NeikiAnalytics.exe"

Signatures

Modifies visiblity of hidden/system files in Explorer

evasion
Description Indicator Process Target
Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" C:\Users\Admin\AppData\Local\Temp\2830d47f1565de3d29c155daa3436b70_NeikiAnalytics.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" C:\Users\Admin\daaqad.exe N/A

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\Users\Admin\daaqad.exe N/A

Adds Run key to start application

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\daaqad = "C:\\Users\\Admin\\daaqad.exe /q" C:\Users\Admin\daaqad.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\daaqad = "C:\\Users\\Admin\\daaqad.exe /Q" C:\Users\Admin\daaqad.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\daaqad = "C:\\Users\\Admin\\daaqad.exe /f" C:\Users\Admin\daaqad.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\daaqad = "C:\\Users\\Admin\\daaqad.exe /O" C:\Users\Admin\daaqad.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\daaqad = "C:\\Users\\Admin\\daaqad.exe /J" C:\Users\Admin\daaqad.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\daaqad = "C:\\Users\\Admin\\daaqad.exe /P" C:\Users\Admin\daaqad.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\daaqad = "C:\\Users\\Admin\\daaqad.exe /a" C:\Users\Admin\daaqad.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\daaqad = "C:\\Users\\Admin\\daaqad.exe /V" C:\Users\Admin\daaqad.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\daaqad = "C:\\Users\\Admin\\daaqad.exe /K" C:\Users\Admin\daaqad.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\daaqad = "C:\\Users\\Admin\\daaqad.exe /H" C:\Users\Admin\daaqad.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\daaqad = "C:\\Users\\Admin\\daaqad.exe /T" C:\Users\Admin\daaqad.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\daaqad = "C:\\Users\\Admin\\daaqad.exe /p" C:\Users\Admin\daaqad.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\daaqad = "C:\\Users\\Admin\\daaqad.exe /x" C:\Users\Admin\daaqad.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\daaqad = "C:\\Users\\Admin\\daaqad.exe /b" C:\Users\Admin\daaqad.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\daaqad = "C:\\Users\\Admin\\daaqad.exe /h" C:\Users\Admin\daaqad.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\daaqad = "C:\\Users\\Admin\\daaqad.exe /L" C:\Users\Admin\daaqad.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\daaqad = "C:\\Users\\Admin\\daaqad.exe /U" C:\Users\Admin\AppData\Local\Temp\2830d47f1565de3d29c155daa3436b70_NeikiAnalytics.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\daaqad = "C:\\Users\\Admin\\daaqad.exe /i" C:\Users\Admin\daaqad.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\daaqad = "C:\\Users\\Admin\\daaqad.exe /I" C:\Users\Admin\daaqad.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\daaqad = "C:\\Users\\Admin\\daaqad.exe /E" C:\Users\Admin\daaqad.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\daaqad = "C:\\Users\\Admin\\daaqad.exe /e" C:\Users\Admin\daaqad.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\daaqad = "C:\\Users\\Admin\\daaqad.exe /s" C:\Users\Admin\daaqad.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\daaqad = "C:\\Users\\Admin\\daaqad.exe /v" C:\Users\Admin\daaqad.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\daaqad = "C:\\Users\\Admin\\daaqad.exe /B" C:\Users\Admin\daaqad.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\daaqad = "C:\\Users\\Admin\\daaqad.exe /W" C:\Users\Admin\daaqad.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\daaqad = "C:\\Users\\Admin\\daaqad.exe /C" C:\Users\Admin\daaqad.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\daaqad = "C:\\Users\\Admin\\daaqad.exe /R" C:\Users\Admin\daaqad.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\daaqad = "C:\\Users\\Admin\\daaqad.exe /l" C:\Users\Admin\daaqad.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\daaqad = "C:\\Users\\Admin\\daaqad.exe /z" C:\Users\Admin\daaqad.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\daaqad = "C:\\Users\\Admin\\daaqad.exe /t" C:\Users\Admin\daaqad.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\daaqad = "C:\\Users\\Admin\\daaqad.exe /r" C:\Users\Admin\daaqad.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\daaqad = "C:\\Users\\Admin\\daaqad.exe /M" C:\Users\Admin\daaqad.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\daaqad = "C:\\Users\\Admin\\daaqad.exe /n" C:\Users\Admin\daaqad.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\daaqad = "C:\\Users\\Admin\\daaqad.exe /D" C:\Users\Admin\daaqad.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\daaqad = "C:\\Users\\Admin\\daaqad.exe /U" C:\Users\Admin\daaqad.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\daaqad = "C:\\Users\\Admin\\daaqad.exe /w" C:\Users\Admin\daaqad.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\daaqad = "C:\\Users\\Admin\\daaqad.exe /Y" C:\Users\Admin\daaqad.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\daaqad = "C:\\Users\\Admin\\daaqad.exe /c" C:\Users\Admin\daaqad.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\daaqad = "C:\\Users\\Admin\\daaqad.exe /S" C:\Users\Admin\daaqad.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\daaqad = "C:\\Users\\Admin\\daaqad.exe /N" C:\Users\Admin\daaqad.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\daaqad = "C:\\Users\\Admin\\daaqad.exe /k" C:\Users\Admin\daaqad.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\daaqad = "C:\\Users\\Admin\\daaqad.exe /g" C:\Users\Admin\daaqad.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\daaqad = "C:\\Users\\Admin\\daaqad.exe /F" C:\Users\Admin\daaqad.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\daaqad = "C:\\Users\\Admin\\daaqad.exe /o" C:\Users\Admin\daaqad.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\daaqad = "C:\\Users\\Admin\\daaqad.exe /d" C:\Users\Admin\daaqad.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\daaqad = "C:\\Users\\Admin\\daaqad.exe /y" C:\Users\Admin\daaqad.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\daaqad = "C:\\Users\\Admin\\daaqad.exe /X" C:\Users\Admin\daaqad.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\daaqad = "C:\\Users\\Admin\\daaqad.exe /A" C:\Users\Admin\daaqad.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\daaqad = "C:\\Users\\Admin\\daaqad.exe /Z" C:\Users\Admin\daaqad.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\daaqad = "C:\\Users\\Admin\\daaqad.exe /m" C:\Users\Admin\daaqad.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\daaqad = "C:\\Users\\Admin\\daaqad.exe /j" C:\Users\Admin\daaqad.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\daaqad = "C:\\Users\\Admin\\daaqad.exe /u" C:\Users\Admin\daaqad.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\daaqad = "C:\\Users\\Admin\\daaqad.exe /G" C:\Users\Admin\daaqad.exe N/A

Enumerates physical storage devices

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\2830d47f1565de3d29c155daa3436b70_NeikiAnalytics.exe N/A
N/A N/A C:\Users\Admin\daaqad.exe N/A
N/A N/A C:\Users\Admin\daaqad.exe N/A
N/A N/A C:\Users\Admin\daaqad.exe N/A
N/A N/A C:\Users\Admin\daaqad.exe N/A
N/A N/A C:\Users\Admin\daaqad.exe N/A
N/A N/A C:\Users\Admin\daaqad.exe N/A
N/A N/A C:\Users\Admin\daaqad.exe N/A
N/A N/A C:\Users\Admin\daaqad.exe N/A
N/A N/A C:\Users\Admin\daaqad.exe N/A
N/A N/A C:\Users\Admin\daaqad.exe N/A
N/A N/A C:\Users\Admin\daaqad.exe N/A
N/A N/A C:\Users\Admin\daaqad.exe N/A
N/A N/A C:\Users\Admin\daaqad.exe N/A
N/A N/A C:\Users\Admin\daaqad.exe N/A
N/A N/A C:\Users\Admin\daaqad.exe N/A
N/A N/A C:\Users\Admin\daaqad.exe N/A
N/A N/A C:\Users\Admin\daaqad.exe N/A
N/A N/A C:\Users\Admin\daaqad.exe N/A
N/A N/A C:\Users\Admin\daaqad.exe N/A
N/A N/A C:\Users\Admin\daaqad.exe N/A
N/A N/A C:\Users\Admin\daaqad.exe N/A
N/A N/A C:\Users\Admin\daaqad.exe N/A
N/A N/A C:\Users\Admin\daaqad.exe N/A
N/A N/A C:\Users\Admin\daaqad.exe N/A
N/A N/A C:\Users\Admin\daaqad.exe N/A
N/A N/A C:\Users\Admin\daaqad.exe N/A
N/A N/A C:\Users\Admin\daaqad.exe N/A
N/A N/A C:\Users\Admin\daaqad.exe N/A
N/A N/A C:\Users\Admin\daaqad.exe N/A
N/A N/A C:\Users\Admin\daaqad.exe N/A
N/A N/A C:\Users\Admin\daaqad.exe N/A
N/A N/A C:\Users\Admin\daaqad.exe N/A
N/A N/A C:\Users\Admin\daaqad.exe N/A
N/A N/A C:\Users\Admin\daaqad.exe N/A
N/A N/A C:\Users\Admin\daaqad.exe N/A
N/A N/A C:\Users\Admin\daaqad.exe N/A
N/A N/A C:\Users\Admin\daaqad.exe N/A
N/A N/A C:\Users\Admin\daaqad.exe N/A
N/A N/A C:\Users\Admin\daaqad.exe N/A
N/A N/A C:\Users\Admin\daaqad.exe N/A
N/A N/A C:\Users\Admin\daaqad.exe N/A
N/A N/A C:\Users\Admin\daaqad.exe N/A
N/A N/A C:\Users\Admin\daaqad.exe N/A
N/A N/A C:\Users\Admin\daaqad.exe N/A
N/A N/A C:\Users\Admin\daaqad.exe N/A
N/A N/A C:\Users\Admin\daaqad.exe N/A
N/A N/A C:\Users\Admin\daaqad.exe N/A
N/A N/A C:\Users\Admin\daaqad.exe N/A
N/A N/A C:\Users\Admin\daaqad.exe N/A
N/A N/A C:\Users\Admin\daaqad.exe N/A
N/A N/A C:\Users\Admin\daaqad.exe N/A
N/A N/A C:\Users\Admin\daaqad.exe N/A
N/A N/A C:\Users\Admin\daaqad.exe N/A
N/A N/A C:\Users\Admin\daaqad.exe N/A
N/A N/A C:\Users\Admin\daaqad.exe N/A
N/A N/A C:\Users\Admin\daaqad.exe N/A
N/A N/A C:\Users\Admin\daaqad.exe N/A
N/A N/A C:\Users\Admin\daaqad.exe N/A
N/A N/A C:\Users\Admin\daaqad.exe N/A
N/A N/A C:\Users\Admin\daaqad.exe N/A
N/A N/A C:\Users\Admin\daaqad.exe N/A
N/A N/A C:\Users\Admin\daaqad.exe N/A
N/A N/A C:\Users\Admin\daaqad.exe N/A

Suspicious use of SetWindowsHookEx

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\2830d47f1565de3d29c155daa3436b70_NeikiAnalytics.exe N/A
N/A N/A C:\Users\Admin\daaqad.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\2830d47f1565de3d29c155daa3436b70_NeikiAnalytics.exe

"C:\Users\Admin\AppData\Local\Temp\2830d47f1565de3d29c155daa3436b70_NeikiAnalytics.exe"

C:\Users\Admin\daaqad.exe

"C:\Users\Admin\daaqad.exe"

Network

Country Destination Domain Proto
US 8.8.8.8:53 ns1.player1532.com udp
US 107.178.223.183:8000 ns1.player1532.com tcp

Files

\Users\Admin\daaqad.exe

MD5 b752389a2bcaa36cab6ca4f60ba82b55
SHA1 0e4bd56a12a819add1556d19c213fd269bc2fbef
SHA256 abf5db414f810b893c748fb4b1c43090170c4a5f4b7998982919344075bbef33
SHA512 059e1a372c5f41e228b8d2fcab4033479b95ea582990845dd0f9018d3d91b4a147a878171334052e918972fafb5b043dd39106cc44403bacc826e183cdd21972

Analysis: behavioral2

Detonation Overview

Submitted

2024-05-25 22:11

Reported

2024-05-25 22:14

Platform

win10v2004-20240426-en

Max time kernel

150s

Max time network

151s

Command Line

"C:\Users\Admin\AppData\Local\Temp\2830d47f1565de3d29c155daa3436b70_NeikiAnalytics.exe"

Signatures

Modifies visiblity of hidden/system files in Explorer

evasion
Description Indicator Process Target
Set value (int) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" C:\Users\Admin\guejae.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" C:\Users\Admin\AppData\Local\Temp\2830d47f1565de3d29c155daa3436b70_NeikiAnalytics.exe N/A

Checks computer location settings

Description Indicator Process Target
Key value queried \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\Control Panel\International\Geo\Nation C:\Users\Admin\AppData\Local\Temp\2830d47f1565de3d29c155daa3436b70_NeikiAnalytics.exe N/A

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\Users\Admin\guejae.exe N/A

Adds Run key to start application

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\guejae = "C:\\Users\\Admin\\guejae.exe /N" C:\Users\Admin\guejae.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\guejae = "C:\\Users\\Admin\\guejae.exe /t" C:\Users\Admin\guejae.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\guejae = "C:\\Users\\Admin\\guejae.exe /l" C:\Users\Admin\guejae.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\guejae = "C:\\Users\\Admin\\guejae.exe /H" C:\Users\Admin\guejae.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\guejae = "C:\\Users\\Admin\\guejae.exe /s" C:\Users\Admin\guejae.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\guejae = "C:\\Users\\Admin\\guejae.exe /a" C:\Users\Admin\guejae.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\guejae = "C:\\Users\\Admin\\guejae.exe /M" C:\Users\Admin\guejae.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\guejae = "C:\\Users\\Admin\\guejae.exe /n" C:\Users\Admin\guejae.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\guejae = "C:\\Users\\Admin\\guejae.exe /b" C:\Users\Admin\guejae.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\guejae = "C:\\Users\\Admin\\guejae.exe /S" C:\Users\Admin\guejae.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\guejae = "C:\\Users\\Admin\\guejae.exe /V" C:\Users\Admin\guejae.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\guejae = "C:\\Users\\Admin\\guejae.exe /I" C:\Users\Admin\guejae.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\guejae = "C:\\Users\\Admin\\guejae.exe /k" C:\Users\Admin\guejae.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\guejae = "C:\\Users\\Admin\\guejae.exe /g" C:\Users\Admin\guejae.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\guejae = "C:\\Users\\Admin\\guejae.exe /F" C:\Users\Admin\guejae.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\guejae = "C:\\Users\\Admin\\guejae.exe /o" C:\Users\Admin\guejae.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\guejae = "C:\\Users\\Admin\\guejae.exe /E" C:\Users\Admin\guejae.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\guejae = "C:\\Users\\Admin\\guejae.exe /d" C:\Users\Admin\guejae.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\guejae = "C:\\Users\\Admin\\guejae.exe /Q" C:\Users\Admin\guejae.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\guejae = "C:\\Users\\Admin\\guejae.exe /A" C:\Users\Admin\guejae.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\guejae = "C:\\Users\\Admin\\guejae.exe /q" C:\Users\Admin\guejae.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\guejae = "C:\\Users\\Admin\\guejae.exe /W" C:\Users\Admin\guejae.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\guejae = "C:\\Users\\Admin\\guejae.exe /j" C:\Users\Admin\guejae.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\guejae = "C:\\Users\\Admin\\guejae.exe /u" C:\Users\Admin\guejae.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\guejae = "C:\\Users\\Admin\\guejae.exe /Y" C:\Users\Admin\guejae.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\guejae = "C:\\Users\\Admin\\guejae.exe /m" C:\Users\Admin\guejae.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\guejae = "C:\\Users\\Admin\\guejae.exe /L" C:\Users\Admin\guejae.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\guejae = "C:\\Users\\Admin\\guejae.exe /z" C:\Users\Admin\guejae.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\guejae = "C:\\Users\\Admin\\guejae.exe /J" C:\Users\Admin\guejae.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\guejae = "C:\\Users\\Admin\\guejae.exe /r" C:\Users\Admin\guejae.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\guejae = "C:\\Users\\Admin\\guejae.exe /Z" C:\Users\Admin\guejae.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\guejae = "C:\\Users\\Admin\\guejae.exe /y" C:\Users\Admin\guejae.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\guejae = "C:\\Users\\Admin\\guejae.exe /t" C:\Users\Admin\AppData\Local\Temp\2830d47f1565de3d29c155daa3436b70_NeikiAnalytics.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\guejae = "C:\\Users\\Admin\\guejae.exe /X" C:\Users\Admin\guejae.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\guejae = "C:\\Users\\Admin\\guejae.exe /P" C:\Users\Admin\guejae.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\guejae = "C:\\Users\\Admin\\guejae.exe /x" C:\Users\Admin\guejae.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\guejae = "C:\\Users\\Admin\\guejae.exe /e" C:\Users\Admin\guejae.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\guejae = "C:\\Users\\Admin\\guejae.exe /f" C:\Users\Admin\guejae.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\guejae = "C:\\Users\\Admin\\guejae.exe /U" C:\Users\Admin\guejae.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\guejae = "C:\\Users\\Admin\\guejae.exe /i" C:\Users\Admin\guejae.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\guejae = "C:\\Users\\Admin\\guejae.exe /C" C:\Users\Admin\guejae.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\guejae = "C:\\Users\\Admin\\guejae.exe /w" C:\Users\Admin\guejae.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\guejae = "C:\\Users\\Admin\\guejae.exe /K" C:\Users\Admin\guejae.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\guejae = "C:\\Users\\Admin\\guejae.exe /h" C:\Users\Admin\guejae.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\guejae = "C:\\Users\\Admin\\guejae.exe /T" C:\Users\Admin\guejae.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\guejae = "C:\\Users\\Admin\\guejae.exe /p" C:\Users\Admin\guejae.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\guejae = "C:\\Users\\Admin\\guejae.exe /R" C:\Users\Admin\guejae.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\guejae = "C:\\Users\\Admin\\guejae.exe /c" C:\Users\Admin\guejae.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\guejae = "C:\\Users\\Admin\\guejae.exe /O" C:\Users\Admin\guejae.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\guejae = "C:\\Users\\Admin\\guejae.exe /D" C:\Users\Admin\guejae.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\guejae = "C:\\Users\\Admin\\guejae.exe /v" C:\Users\Admin\guejae.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\guejae = "C:\\Users\\Admin\\guejae.exe /B" C:\Users\Admin\guejae.exe N/A

Enumerates physical storage devices

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\2830d47f1565de3d29c155daa3436b70_NeikiAnalytics.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2830d47f1565de3d29c155daa3436b70_NeikiAnalytics.exe N/A
N/A N/A C:\Users\Admin\guejae.exe N/A
N/A N/A C:\Users\Admin\guejae.exe N/A
N/A N/A C:\Users\Admin\guejae.exe N/A
N/A N/A C:\Users\Admin\guejae.exe N/A
N/A N/A C:\Users\Admin\guejae.exe N/A
N/A N/A C:\Users\Admin\guejae.exe N/A
N/A N/A C:\Users\Admin\guejae.exe N/A
N/A N/A C:\Users\Admin\guejae.exe N/A
N/A N/A C:\Users\Admin\guejae.exe N/A
N/A N/A C:\Users\Admin\guejae.exe N/A
N/A N/A C:\Users\Admin\guejae.exe N/A
N/A N/A C:\Users\Admin\guejae.exe N/A
N/A N/A C:\Users\Admin\guejae.exe N/A
N/A N/A C:\Users\Admin\guejae.exe N/A
N/A N/A C:\Users\Admin\guejae.exe N/A
N/A N/A C:\Users\Admin\guejae.exe N/A
N/A N/A C:\Users\Admin\guejae.exe N/A
N/A N/A C:\Users\Admin\guejae.exe N/A
N/A N/A C:\Users\Admin\guejae.exe N/A
N/A N/A C:\Users\Admin\guejae.exe N/A
N/A N/A C:\Users\Admin\guejae.exe N/A
N/A N/A C:\Users\Admin\guejae.exe N/A
N/A N/A C:\Users\Admin\guejae.exe N/A
N/A N/A C:\Users\Admin\guejae.exe N/A
N/A N/A C:\Users\Admin\guejae.exe N/A
N/A N/A C:\Users\Admin\guejae.exe N/A
N/A N/A C:\Users\Admin\guejae.exe N/A
N/A N/A C:\Users\Admin\guejae.exe N/A
N/A N/A C:\Users\Admin\guejae.exe N/A
N/A N/A C:\Users\Admin\guejae.exe N/A
N/A N/A C:\Users\Admin\guejae.exe N/A
N/A N/A C:\Users\Admin\guejae.exe N/A
N/A N/A C:\Users\Admin\guejae.exe N/A
N/A N/A C:\Users\Admin\guejae.exe N/A
N/A N/A C:\Users\Admin\guejae.exe N/A
N/A N/A C:\Users\Admin\guejae.exe N/A
N/A N/A C:\Users\Admin\guejae.exe N/A
N/A N/A C:\Users\Admin\guejae.exe N/A
N/A N/A C:\Users\Admin\guejae.exe N/A
N/A N/A C:\Users\Admin\guejae.exe N/A
N/A N/A C:\Users\Admin\guejae.exe N/A
N/A N/A C:\Users\Admin\guejae.exe N/A
N/A N/A C:\Users\Admin\guejae.exe N/A
N/A N/A C:\Users\Admin\guejae.exe N/A
N/A N/A C:\Users\Admin\guejae.exe N/A
N/A N/A C:\Users\Admin\guejae.exe N/A
N/A N/A C:\Users\Admin\guejae.exe N/A
N/A N/A C:\Users\Admin\guejae.exe N/A
N/A N/A C:\Users\Admin\guejae.exe N/A
N/A N/A C:\Users\Admin\guejae.exe N/A
N/A N/A C:\Users\Admin\guejae.exe N/A
N/A N/A C:\Users\Admin\guejae.exe N/A
N/A N/A C:\Users\Admin\guejae.exe N/A
N/A N/A C:\Users\Admin\guejae.exe N/A
N/A N/A C:\Users\Admin\guejae.exe N/A
N/A N/A C:\Users\Admin\guejae.exe N/A
N/A N/A C:\Users\Admin\guejae.exe N/A
N/A N/A C:\Users\Admin\guejae.exe N/A
N/A N/A C:\Users\Admin\guejae.exe N/A
N/A N/A C:\Users\Admin\guejae.exe N/A
N/A N/A C:\Users\Admin\guejae.exe N/A
N/A N/A C:\Users\Admin\guejae.exe N/A

Suspicious use of SetWindowsHookEx

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\2830d47f1565de3d29c155daa3436b70_NeikiAnalytics.exe N/A
N/A N/A C:\Users\Admin\guejae.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\2830d47f1565de3d29c155daa3436b70_NeikiAnalytics.exe

"C:\Users\Admin\AppData\Local\Temp\2830d47f1565de3d29c155daa3436b70_NeikiAnalytics.exe"

C:\Users\Admin\guejae.exe

"C:\Users\Admin\guejae.exe"

Network

Country Destination Domain Proto
US 8.8.8.8:53 13.86.106.20.in-addr.arpa udp
US 8.8.8.8:53 105.83.221.88.in-addr.arpa udp
US 8.8.8.8:53 g.bing.com udp
US 204.79.197.237:443 g.bing.com tcp
NL 23.62.61.194:443 www.bing.com tcp
US 8.8.8.8:53 237.197.79.204.in-addr.arpa udp
NL 23.62.61.194:443 www.bing.com tcp
US 8.8.8.8:53 17.160.190.20.in-addr.arpa udp
US 8.8.8.8:53 205.47.74.20.in-addr.arpa udp
US 8.8.8.8:53 194.61.62.23.in-addr.arpa udp
US 8.8.8.8:53 ns1.player1532.com udp
US 8.8.8.8:53 157.123.68.40.in-addr.arpa udp
US 8.8.8.8:53 198.187.3.20.in-addr.arpa udp
US 8.8.8.8:53 0.204.248.87.in-addr.arpa udp
US 8.8.8.8:53 48.229.111.52.in-addr.arpa udp
US 8.8.8.8:53 tse1.mm.bing.net udp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 8.8.8.8:53 200.197.79.204.in-addr.arpa udp
US 8.8.8.8:53 11.179.89.13.in-addr.arpa udp

Files

C:\Users\Admin\guejae.exe

MD5 a2597f2fbb87190c943ab85325d729ce
SHA1 f5581155a35a8e8a38ae33dfb9b18c4ea214d580
SHA256 275531b6d4a0ceaf260c8ed75c6bfefad6232d0af76abb6426233392a8b41158
SHA512 6a8360f43d990461fa5ce3fdd144344a80d5faa8a0635663aa9d146da8b60ac8900c279e9faa90f95696fee1390d327ba7adeb3df2fe298b13d2fc7439c6f891