Analysis
-
max time kernel
134s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
25-05-2024 13:21
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
8bb6f34c507d6cfea5554b746cdc5e70_NeikiAnalytics.exe
Resource
win7-20240215-en
windows7-x64
6 signatures
150 seconds
General
-
Target
8bb6f34c507d6cfea5554b746cdc5e70_NeikiAnalytics.exe
-
Size
197KB
-
MD5
8bb6f34c507d6cfea5554b746cdc5e70
-
SHA1
426f3fa9ca4b4816fada366a3f3232ac75d8d22c
-
SHA256
13a8dbfff38f004675bf2b26cc6396a9a554acd341bd5390d08b651466245d8b
-
SHA512
3f12580aee83211d75247a63a677e0f184351ef359053fc595929b971e89026dcdcf704fc343f46cb92bfb1e6b184a00284f90443beee0002da0f44234daa1fa
-
SSDEEP
3072:ILiDZUSV5XPJ0X6W6pdx5AL+LgPXRzIahXpWRFNgyDLNaeu+QJ6tR:VtTV5R0X6W6pdxSLM8phXpeFX2+f
Malware Config
Signatures
-
Detects Healer an antivirus disabler dropper 1 IoCs
resource yara_rule behavioral2/memory/4520-1-0x00000000001C0000-0x00000000001CA000-memory.dmp healer -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 8bb6f34c507d6cfea5554b746cdc5e70_NeikiAnalytics.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 8bb6f34c507d6cfea5554b746cdc5e70_NeikiAnalytics.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 8bb6f34c507d6cfea5554b746cdc5e70_NeikiAnalytics.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 8bb6f34c507d6cfea5554b746cdc5e70_NeikiAnalytics.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 8bb6f34c507d6cfea5554b746cdc5e70_NeikiAnalytics.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 8bb6f34c507d6cfea5554b746cdc5e70_NeikiAnalytics.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 8bb6f34c507d6cfea5554b746cdc5e70_NeikiAnalytics.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 8bb6f34c507d6cfea5554b746cdc5e70_NeikiAnalytics.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4520 8bb6f34c507d6cfea5554b746cdc5e70_NeikiAnalytics.exe 4520 8bb6f34c507d6cfea5554b746cdc5e70_NeikiAnalytics.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4520 8bb6f34c507d6cfea5554b746cdc5e70_NeikiAnalytics.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\8bb6f34c507d6cfea5554b746cdc5e70_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\8bb6f34c507d6cfea5554b746cdc5e70_NeikiAnalytics.exe"1⤵
- Modifies Windows Defender Real-time Protection settings
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4520
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --field-trial-handle=4356,i,15142778360084620907,1763097090506261076,262144 --variations-seed-version --mojo-platform-channel-handle=3940 /prefetch:81⤵PID:3176