Analysis
-
max time kernel
149s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
25-05-2024 10:52
Static task
static1
Behavioral task
behavioral1
Sample
8490814de7e8c28c7bd10ff26417fbe0_NeikiAnalytics.exe
Resource
win7-20240508-en
General
-
Target
8490814de7e8c28c7bd10ff26417fbe0_NeikiAnalytics.exe
-
Size
1.0MB
-
MD5
8490814de7e8c28c7bd10ff26417fbe0
-
SHA1
e16da889e40e3e99603890344b261ae1dc24a846
-
SHA256
e61197136373c59dcb8d919ee6504fc0200718bb27a2fd39333af0f6ef73cf09
-
SHA512
61b30dff356e8ced6e118223d4c5fe5f16202f4adf837a57732a357d3c24ba4bf3781937bd27c03400c780a7d09abfac5df998f6294cc5cfb4f94d4b3d45d1cd
-
SSDEEP
24576:sAHnh+eWsN3skA4RV1Hom2KXMmHaizL/VwM4CPb2x5:Lh+ZkldoPK8YaiP2MFI
Malware Config
Extracted
formbook
4.1
es13
xn--p5tz1dc38d1tj.com
letszum.co
16475.autos
eat.company
ruletka-no-zero.store
mizj1yg0.shop
sxyaddhlmk.top
wlgj6789.cc
mammamiacookbook.com
sunart.tech
dutajp.co
odty58.app
newparentssupport.com
p2pprofitarbitrage.com
yeqzik.xyz
ncheikta.website
golfwick.com
premiumproducts.co.in
gemeinde-warringholz.com
bancamarch-web-avisos.com
bionischeswasser.com
aiquqiu10.com
66hkw.top
yepvs.online
gashtsafir.com
fox-investor.net
fingerbib.net
showyourself-fotokurse.com
63-ace.com
liveemffree.com
acessofacil.click
spencecollegeconsulting.com
l5r5f.us
ogmpconsulting.com
drlathian.net
et788.com
eternal.media
alloures.com
marcosmk.cloud
gameratez.com
aestheticgallery.net
renali.shop
pin-up-casino-scn8.top
wellwisenz.com
jl777-web.com
tlkatelier.com
nyxendesign.com
d89qrbh865r.shop
labyrinthsouthjordan.com
sdfntyowiop.com
foodsvisions.com
invitecmo.com
05557.vip
skinsoothesolutionscorner.com
trusdwallet.com
aegismasterseriesiceland.com
postadira.online
nolimit77gacor.site
warehouse-services-73488.bond
hzmzd.com
aviole.xyz
detensorprotocolio.network
1hjxz.top
bio-carwash.com
manoarquitetura.com
Signatures
-
Formbook payload 3 IoCs
Processes:
resource yara_rule behavioral1/memory/3040-11-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/3040-16-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/3056-21-0x00000000000C0000-0x00000000000EF000-memory.dmp formbook -
Suspicious use of SetThreadContext 3 IoCs
Processes:
8490814de7e8c28c7bd10ff26417fbe0_NeikiAnalytics.exesvchost.exenetsh.exedescription pid process target process PID 2884 set thread context of 3040 2884 8490814de7e8c28c7bd10ff26417fbe0_NeikiAnalytics.exe svchost.exe PID 3040 set thread context of 1200 3040 svchost.exe Explorer.EXE PID 3056 set thread context of 1200 3056 netsh.exe Explorer.EXE -
Suspicious behavior: EnumeratesProcesses 31 IoCs
Processes:
svchost.exenetsh.exepid process 3040 svchost.exe 3040 svchost.exe 3056 netsh.exe 3056 netsh.exe 3056 netsh.exe 3056 netsh.exe 3056 netsh.exe 3056 netsh.exe 3056 netsh.exe 3056 netsh.exe 3056 netsh.exe 3056 netsh.exe 3056 netsh.exe 3056 netsh.exe 3056 netsh.exe 3056 netsh.exe 3056 netsh.exe 3056 netsh.exe 3056 netsh.exe 3056 netsh.exe 3056 netsh.exe 3056 netsh.exe 3056 netsh.exe 3056 netsh.exe 3056 netsh.exe 3056 netsh.exe 3056 netsh.exe 3056 netsh.exe 3056 netsh.exe 3056 netsh.exe 3056 netsh.exe -
Suspicious behavior: MapViewOfSection 6 IoCs
Processes:
8490814de7e8c28c7bd10ff26417fbe0_NeikiAnalytics.exesvchost.exenetsh.exepid process 2884 8490814de7e8c28c7bd10ff26417fbe0_NeikiAnalytics.exe 3040 svchost.exe 3040 svchost.exe 3040 svchost.exe 3056 netsh.exe 3056 netsh.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
svchost.exenetsh.exedescription pid process Token: SeDebugPrivilege 3040 svchost.exe Token: SeDebugPrivilege 3056 netsh.exe -
Suspicious use of FindShellTrayWindow 4 IoCs
Processes:
8490814de7e8c28c7bd10ff26417fbe0_NeikiAnalytics.exeExplorer.EXEpid process 2884 8490814de7e8c28c7bd10ff26417fbe0_NeikiAnalytics.exe 2884 8490814de7e8c28c7bd10ff26417fbe0_NeikiAnalytics.exe 1200 Explorer.EXE 1200 Explorer.EXE -
Suspicious use of SendNotifyMessage 2 IoCs
Processes:
8490814de7e8c28c7bd10ff26417fbe0_NeikiAnalytics.exepid process 2884 8490814de7e8c28c7bd10ff26417fbe0_NeikiAnalytics.exe 2884 8490814de7e8c28c7bd10ff26417fbe0_NeikiAnalytics.exe -
Suspicious use of WriteProcessMemory 13 IoCs
Processes:
8490814de7e8c28c7bd10ff26417fbe0_NeikiAnalytics.exeExplorer.EXEnetsh.exedescription pid process target process PID 2884 wrote to memory of 3040 2884 8490814de7e8c28c7bd10ff26417fbe0_NeikiAnalytics.exe svchost.exe PID 2884 wrote to memory of 3040 2884 8490814de7e8c28c7bd10ff26417fbe0_NeikiAnalytics.exe svchost.exe PID 2884 wrote to memory of 3040 2884 8490814de7e8c28c7bd10ff26417fbe0_NeikiAnalytics.exe svchost.exe PID 2884 wrote to memory of 3040 2884 8490814de7e8c28c7bd10ff26417fbe0_NeikiAnalytics.exe svchost.exe PID 2884 wrote to memory of 3040 2884 8490814de7e8c28c7bd10ff26417fbe0_NeikiAnalytics.exe svchost.exe PID 1200 wrote to memory of 3056 1200 Explorer.EXE netsh.exe PID 1200 wrote to memory of 3056 1200 Explorer.EXE netsh.exe PID 1200 wrote to memory of 3056 1200 Explorer.EXE netsh.exe PID 1200 wrote to memory of 3056 1200 Explorer.EXE netsh.exe PID 3056 wrote to memory of 2688 3056 netsh.exe cmd.exe PID 3056 wrote to memory of 2688 3056 netsh.exe cmd.exe PID 3056 wrote to memory of 2688 3056 netsh.exe cmd.exe PID 3056 wrote to memory of 2688 3056 netsh.exe cmd.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1200 -
C:\Users\Admin\AppData\Local\Temp\8490814de7e8c28c7bd10ff26417fbe0_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\8490814de7e8c28c7bd10ff26417fbe0_NeikiAnalytics.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2884 -
C:\Windows\SysWOW64\svchost.exe"C:\Users\Admin\AppData\Local\Temp\8490814de7e8c28c7bd10ff26417fbe0_NeikiAnalytics.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:3040
-
-
-
C:\Windows\SysWOW64\netsh.exe"C:\Windows\SysWOW64\netsh.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3056 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Windows\SysWOW64\svchost.exe"3⤵PID:2688
-
-