Analysis
-
max time kernel
142s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
25-05-2024 15:41
Static task
static1
Behavioral task
behavioral1
Sample
899c4174dbd82b7e72a00262a617cbc0_NeikiAnalytics.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
899c4174dbd82b7e72a00262a617cbc0_NeikiAnalytics.exe
Resource
win10v2004-20240226-en
General
-
Target
899c4174dbd82b7e72a00262a617cbc0_NeikiAnalytics.exe
-
Size
45KB
-
MD5
899c4174dbd82b7e72a00262a617cbc0
-
SHA1
2cdc4d66cb5140903945c87b3b885cdeea216e3b
-
SHA256
af815581f029893c1f65abcc8eed78f3242b9d01f75a4ad61cb2e0fc2b65f5c5
-
SHA512
5afd5cff8938bfc0ed3d349f64e322e984a229b61a4c5bde7ab0b17142c7fb7605becac1313b19b69fa42984c6944dc59687c5925cc5fb67480c77ba6caa88ff
-
SSDEEP
768:PmFQj8rM9whcqet8WfuzHVHFNNqDaG0XjqGoxhz/8szBnP7DFK+5nE4:FAwEmBGz1lNNqDaG0Poxhlzm4
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe \"C:\\Windows\\system32\\IExplorer.exe\"" 899c4174dbd82b7e72a00262a617cbc0_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\IExplorer.exe" 899c4174dbd82b7e72a00262a617cbc0_NeikiAnalytics.exe -
Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" 899c4174dbd82b7e72a00262a617cbc0_NeikiAnalytics.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 899c4174dbd82b7e72a00262a617cbc0_NeikiAnalytics.exe -
Disables RegEdit via registry modification 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" 899c4174dbd82b7e72a00262a617cbc0_NeikiAnalytics.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" 899c4174dbd82b7e72a00262a617cbc0_NeikiAnalytics.exe -
Disables use of System Restore points 1 TTPs
-
Executes dropped EXE 14 IoCs
pid Process 4892 xk.exe 1308 IExplorer.exe 1972 WINLOGON.EXE 1224 CSRSS.EXE 960 SERVICES.EXE 3020 LSASS.EXE 4928 SMSS.EXE 4896 xk.exe 2512 IExplorer.exe 2332 WINLOGON.EXE 3348 CSRSS.EXE 2972 SERVICES.EXE 4548 LSASS.EXE 3632 SMSS.EXE -
Modifies system executable filetype association 2 TTPs 13 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command 899c4174dbd82b7e72a00262a617cbc0_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\ = "File Folder" 899c4174dbd82b7e72a00262a617cbc0_NeikiAnalytics.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell 899c4174dbd82b7e72a00262a617cbc0_NeikiAnalytics.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open 899c4174dbd82b7e72a00262a617cbc0_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 899c4174dbd82b7e72a00262a617cbc0_NeikiAnalytics.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command 899c4174dbd82b7e72a00262a617cbc0_NeikiAnalytics.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command 899c4174dbd82b7e72a00262a617cbc0_NeikiAnalytics.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command 899c4174dbd82b7e72a00262a617cbc0_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 899c4174dbd82b7e72a00262a617cbc0_NeikiAnalytics.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command 899c4174dbd82b7e72a00262a617cbc0_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 899c4174dbd82b7e72a00262a617cbc0_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 899c4174dbd82b7e72a00262a617cbc0_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 899c4174dbd82b7e72a00262a617cbc0_NeikiAnalytics.exe -
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\LogonAdmin = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\CSRSS.EXE" 899c4174dbd82b7e72a00262a617cbc0_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\System Monitoring = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\LSASS.EXE" 899c4174dbd82b7e72a00262a617cbc0_NeikiAnalytics.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MSMSGS = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\WINLOGON.EXE" 899c4174dbd82b7e72a00262a617cbc0_NeikiAnalytics.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ServiceAdmin = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\SERVICES.EXE" 899c4174dbd82b7e72a00262a617cbc0_NeikiAnalytics.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xk = "C:\\Windows\\xk.exe" 899c4174dbd82b7e72a00262a617cbc0_NeikiAnalytics.exe -
Drops desktop.ini file(s) 4 IoCs
description ioc Process File opened for modification C:\desktop.ini 899c4174dbd82b7e72a00262a617cbc0_NeikiAnalytics.exe File created C:\desktop.ini 899c4174dbd82b7e72a00262a617cbc0_NeikiAnalytics.exe File opened for modification F:\desktop.ini 899c4174dbd82b7e72a00262a617cbc0_NeikiAnalytics.exe File created F:\desktop.ini 899c4174dbd82b7e72a00262a617cbc0_NeikiAnalytics.exe -
Enumerates connected drives 3 TTPs 22 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\E: 899c4174dbd82b7e72a00262a617cbc0_NeikiAnalytics.exe File opened (read-only) \??\M: 899c4174dbd82b7e72a00262a617cbc0_NeikiAnalytics.exe File opened (read-only) \??\N: 899c4174dbd82b7e72a00262a617cbc0_NeikiAnalytics.exe File opened (read-only) \??\R: 899c4174dbd82b7e72a00262a617cbc0_NeikiAnalytics.exe File opened (read-only) \??\X: 899c4174dbd82b7e72a00262a617cbc0_NeikiAnalytics.exe File opened (read-only) \??\G: 899c4174dbd82b7e72a00262a617cbc0_NeikiAnalytics.exe File opened (read-only) \??\Q: 899c4174dbd82b7e72a00262a617cbc0_NeikiAnalytics.exe File opened (read-only) \??\Y: 899c4174dbd82b7e72a00262a617cbc0_NeikiAnalytics.exe File opened (read-only) \??\Z: 899c4174dbd82b7e72a00262a617cbc0_NeikiAnalytics.exe File opened (read-only) \??\H: 899c4174dbd82b7e72a00262a617cbc0_NeikiAnalytics.exe File opened (read-only) \??\L: 899c4174dbd82b7e72a00262a617cbc0_NeikiAnalytics.exe File opened (read-only) \??\O: 899c4174dbd82b7e72a00262a617cbc0_NeikiAnalytics.exe File opened (read-only) \??\W: 899c4174dbd82b7e72a00262a617cbc0_NeikiAnalytics.exe File opened (read-only) \??\T: 899c4174dbd82b7e72a00262a617cbc0_NeikiAnalytics.exe File opened (read-only) \??\U: 899c4174dbd82b7e72a00262a617cbc0_NeikiAnalytics.exe File opened (read-only) \??\B: 899c4174dbd82b7e72a00262a617cbc0_NeikiAnalytics.exe File opened (read-only) \??\I: 899c4174dbd82b7e72a00262a617cbc0_NeikiAnalytics.exe File opened (read-only) \??\J: 899c4174dbd82b7e72a00262a617cbc0_NeikiAnalytics.exe File opened (read-only) \??\K: 899c4174dbd82b7e72a00262a617cbc0_NeikiAnalytics.exe File opened (read-only) \??\P: 899c4174dbd82b7e72a00262a617cbc0_NeikiAnalytics.exe File opened (read-only) \??\S: 899c4174dbd82b7e72a00262a617cbc0_NeikiAnalytics.exe File opened (read-only) \??\V: 899c4174dbd82b7e72a00262a617cbc0_NeikiAnalytics.exe -
Drops file in System32 directory 6 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\shell.exe 899c4174dbd82b7e72a00262a617cbc0_NeikiAnalytics.exe File created C:\Windows\SysWOW64\shell.exe 899c4174dbd82b7e72a00262a617cbc0_NeikiAnalytics.exe File created C:\Windows\SysWOW64\Mig2.scr 899c4174dbd82b7e72a00262a617cbc0_NeikiAnalytics.exe File created C:\Windows\SysWOW64\IExplorer.exe 899c4174dbd82b7e72a00262a617cbc0_NeikiAnalytics.exe File opened for modification C:\Windows\SysWOW64\IExplorer.exe 899c4174dbd82b7e72a00262a617cbc0_NeikiAnalytics.exe File opened for modification C:\Windows\SysWOW64\Mig2.scr 899c4174dbd82b7e72a00262a617cbc0_NeikiAnalytics.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\xk.exe 899c4174dbd82b7e72a00262a617cbc0_NeikiAnalytics.exe File created C:\Windows\xk.exe 899c4174dbd82b7e72a00262a617cbc0_NeikiAnalytics.exe -
Modifies Control Panel 4 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\Desktop\ 899c4174dbd82b7e72a00262a617cbc0_NeikiAnalytics.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\Desktop\SCRNSAVE.EXE = "C:\\Windows\\system32\\Mig~mig.SCR" 899c4174dbd82b7e72a00262a617cbc0_NeikiAnalytics.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\Desktop\ScreenSaverIsSecure = "0" 899c4174dbd82b7e72a00262a617cbc0_NeikiAnalytics.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\Desktop\ScreenSaveTimeOut = "600" 899c4174dbd82b7e72a00262a617cbc0_NeikiAnalytics.exe -
Modifies registry class 15 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open 899c4174dbd82b7e72a00262a617cbc0_NeikiAnalytics.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command 899c4174dbd82b7e72a00262a617cbc0_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 899c4174dbd82b7e72a00262a617cbc0_NeikiAnalytics.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command 899c4174dbd82b7e72a00262a617cbc0_NeikiAnalytics.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command 899c4174dbd82b7e72a00262a617cbc0_NeikiAnalytics.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command 899c4174dbd82b7e72a00262a617cbc0_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 899c4174dbd82b7e72a00262a617cbc0_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 899c4174dbd82b7e72a00262a617cbc0_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 899c4174dbd82b7e72a00262a617cbc0_NeikiAnalytics.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile 899c4174dbd82b7e72a00262a617cbc0_NeikiAnalytics.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell 899c4174dbd82b7e72a00262a617cbc0_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 899c4174dbd82b7e72a00262a617cbc0_NeikiAnalytics.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile 899c4174dbd82b7e72a00262a617cbc0_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\ = "File Folder" 899c4174dbd82b7e72a00262a617cbc0_NeikiAnalytics.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command 899c4174dbd82b7e72a00262a617cbc0_NeikiAnalytics.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1572 899c4174dbd82b7e72a00262a617cbc0_NeikiAnalytics.exe 1572 899c4174dbd82b7e72a00262a617cbc0_NeikiAnalytics.exe -
Suspicious use of SetWindowsHookEx 15 IoCs
pid Process 1572 899c4174dbd82b7e72a00262a617cbc0_NeikiAnalytics.exe 4892 xk.exe 1308 IExplorer.exe 1972 WINLOGON.EXE 1224 CSRSS.EXE 960 SERVICES.EXE 3020 LSASS.EXE 4928 SMSS.EXE 4896 xk.exe 2512 IExplorer.exe 2332 WINLOGON.EXE 3348 CSRSS.EXE 2972 SERVICES.EXE 4548 LSASS.EXE 3632 SMSS.EXE -
Suspicious use of WriteProcessMemory 42 IoCs
description pid Process procid_target PID 1572 wrote to memory of 4892 1572 899c4174dbd82b7e72a00262a617cbc0_NeikiAnalytics.exe 91 PID 1572 wrote to memory of 4892 1572 899c4174dbd82b7e72a00262a617cbc0_NeikiAnalytics.exe 91 PID 1572 wrote to memory of 4892 1572 899c4174dbd82b7e72a00262a617cbc0_NeikiAnalytics.exe 91 PID 1572 wrote to memory of 1308 1572 899c4174dbd82b7e72a00262a617cbc0_NeikiAnalytics.exe 92 PID 1572 wrote to memory of 1308 1572 899c4174dbd82b7e72a00262a617cbc0_NeikiAnalytics.exe 92 PID 1572 wrote to memory of 1308 1572 899c4174dbd82b7e72a00262a617cbc0_NeikiAnalytics.exe 92 PID 1572 wrote to memory of 1972 1572 899c4174dbd82b7e72a00262a617cbc0_NeikiAnalytics.exe 93 PID 1572 wrote to memory of 1972 1572 899c4174dbd82b7e72a00262a617cbc0_NeikiAnalytics.exe 93 PID 1572 wrote to memory of 1972 1572 899c4174dbd82b7e72a00262a617cbc0_NeikiAnalytics.exe 93 PID 1572 wrote to memory of 1224 1572 899c4174dbd82b7e72a00262a617cbc0_NeikiAnalytics.exe 94 PID 1572 wrote to memory of 1224 1572 899c4174dbd82b7e72a00262a617cbc0_NeikiAnalytics.exe 94 PID 1572 wrote to memory of 1224 1572 899c4174dbd82b7e72a00262a617cbc0_NeikiAnalytics.exe 94 PID 1572 wrote to memory of 960 1572 899c4174dbd82b7e72a00262a617cbc0_NeikiAnalytics.exe 95 PID 1572 wrote to memory of 960 1572 899c4174dbd82b7e72a00262a617cbc0_NeikiAnalytics.exe 95 PID 1572 wrote to memory of 960 1572 899c4174dbd82b7e72a00262a617cbc0_NeikiAnalytics.exe 95 PID 1572 wrote to memory of 3020 1572 899c4174dbd82b7e72a00262a617cbc0_NeikiAnalytics.exe 96 PID 1572 wrote to memory of 3020 1572 899c4174dbd82b7e72a00262a617cbc0_NeikiAnalytics.exe 96 PID 1572 wrote to memory of 3020 1572 899c4174dbd82b7e72a00262a617cbc0_NeikiAnalytics.exe 96 PID 1572 wrote to memory of 4928 1572 899c4174dbd82b7e72a00262a617cbc0_NeikiAnalytics.exe 97 PID 1572 wrote to memory of 4928 1572 899c4174dbd82b7e72a00262a617cbc0_NeikiAnalytics.exe 97 PID 1572 wrote to memory of 4928 1572 899c4174dbd82b7e72a00262a617cbc0_NeikiAnalytics.exe 97 PID 1572 wrote to memory of 4896 1572 899c4174dbd82b7e72a00262a617cbc0_NeikiAnalytics.exe 106 PID 1572 wrote to memory of 4896 1572 899c4174dbd82b7e72a00262a617cbc0_NeikiAnalytics.exe 106 PID 1572 wrote to memory of 4896 1572 899c4174dbd82b7e72a00262a617cbc0_NeikiAnalytics.exe 106 PID 1572 wrote to memory of 2512 1572 899c4174dbd82b7e72a00262a617cbc0_NeikiAnalytics.exe 107 PID 1572 wrote to memory of 2512 1572 899c4174dbd82b7e72a00262a617cbc0_NeikiAnalytics.exe 107 PID 1572 wrote to memory of 2512 1572 899c4174dbd82b7e72a00262a617cbc0_NeikiAnalytics.exe 107 PID 1572 wrote to memory of 2332 1572 899c4174dbd82b7e72a00262a617cbc0_NeikiAnalytics.exe 108 PID 1572 wrote to memory of 2332 1572 899c4174dbd82b7e72a00262a617cbc0_NeikiAnalytics.exe 108 PID 1572 wrote to memory of 2332 1572 899c4174dbd82b7e72a00262a617cbc0_NeikiAnalytics.exe 108 PID 1572 wrote to memory of 3348 1572 899c4174dbd82b7e72a00262a617cbc0_NeikiAnalytics.exe 109 PID 1572 wrote to memory of 3348 1572 899c4174dbd82b7e72a00262a617cbc0_NeikiAnalytics.exe 109 PID 1572 wrote to memory of 3348 1572 899c4174dbd82b7e72a00262a617cbc0_NeikiAnalytics.exe 109 PID 1572 wrote to memory of 2972 1572 899c4174dbd82b7e72a00262a617cbc0_NeikiAnalytics.exe 111 PID 1572 wrote to memory of 2972 1572 899c4174dbd82b7e72a00262a617cbc0_NeikiAnalytics.exe 111 PID 1572 wrote to memory of 2972 1572 899c4174dbd82b7e72a00262a617cbc0_NeikiAnalytics.exe 111 PID 1572 wrote to memory of 4548 1572 899c4174dbd82b7e72a00262a617cbc0_NeikiAnalytics.exe 112 PID 1572 wrote to memory of 4548 1572 899c4174dbd82b7e72a00262a617cbc0_NeikiAnalytics.exe 112 PID 1572 wrote to memory of 4548 1572 899c4174dbd82b7e72a00262a617cbc0_NeikiAnalytics.exe 112 PID 1572 wrote to memory of 3632 1572 899c4174dbd82b7e72a00262a617cbc0_NeikiAnalytics.exe 113 PID 1572 wrote to memory of 3632 1572 899c4174dbd82b7e72a00262a617cbc0_NeikiAnalytics.exe 113 PID 1572 wrote to memory of 3632 1572 899c4174dbd82b7e72a00262a617cbc0_NeikiAnalytics.exe 113 -
System policy modification 1 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System 899c4174dbd82b7e72a00262a617cbc0_NeikiAnalytics.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" 899c4174dbd82b7e72a00262a617cbc0_NeikiAnalytics.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer 899c4174dbd82b7e72a00262a617cbc0_NeikiAnalytics.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" 899c4174dbd82b7e72a00262a617cbc0_NeikiAnalytics.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\899c4174dbd82b7e72a00262a617cbc0_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\899c4174dbd82b7e72a00262a617cbc0_NeikiAnalytics.exe"1⤵
- Modifies WinLogon for persistence
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Disables RegEdit via registry modification
- Modifies system executable filetype association
- Adds Run key to start application
- Drops desktop.ini file(s)
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies Control Panel
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1572 -
C:\Windows\xk.exeC:\Windows\xk.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4892
-
-
C:\Windows\SysWOW64\IExplorer.exeC:\Windows\system32\IExplorer.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1308
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1972
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1224
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:960
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3020
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4928
-
-
C:\Windows\xk.exeC:\Windows\xk.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4896
-
-
C:\Windows\SysWOW64\IExplorer.exeC:\Windows\system32\IExplorer.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2512
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2332
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3348
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2972
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4548
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3632
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3820 --field-trial-handle=2248,i,10247514684337323751,15511974759131734137,262144 --variations-seed-version /prefetch:81⤵PID:4624
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Event Triggered Execution
1Change Default File Association
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Event Triggered Execution
1Change Default File Association
1Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Modify Registry
6Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
45KB
MD5bdbd9684fb3d2bba104d0d0cc1b7e748
SHA1338899c20f86c7680d4b7a02574730477545aa41
SHA2564d115f75a0a2f7e8c202e979d25853bf2beae5edb85cdabd954481df488abac9
SHA51298f58d5732fb665cc0333ce94ac9cc85e957c1897ec8c9f83782d05019bad1306c63b1c69e7aa9ddf63e76df9e234857f258db5432db09a7b39770d6b0b3797f
-
Filesize
45KB
MD5c436585332ea185d04f7195fc0d2df61
SHA1e59edce0b830c95856d4f323c558b8b2d878b748
SHA256c1d1c14a6f229a496c7fc1facc3cccc96b86437166dec1128e7a561eca581396
SHA512b6a13a1980cfcfcbb1964f53778aac310a5c50c3313e8ad91022197da07ea9184a614bbe2ccb79c06e3fc9cf0ddfc2f1b077a314e8b87b9d8ec530e7335149f9
-
Filesize
45KB
MD57e089ff14800986f626bf11580f9c64d
SHA1dcd7dfe3d847a27eff588039e508986f0357e28c
SHA25653efb5060640111e8f33773f6adca2244ec3bd560bd46306404fbe23204546f6
SHA512514256472dba000ae09d97f964e0a8169a3a37812fea31181a2c54a791bc1e168db5a59a371637f9077469f800e59ba815ec34d3fff7c1ef6883456dee334a98
-
Filesize
45KB
MD5a13872b52d28733082980676e5150f5c
SHA1449a271691194b01d3c58961f2dbed11279d1e7a
SHA25601aa1d6c287a7466998ba064d3e6e8202d58df2d1c29fd10058480a4a40ccae5
SHA512e2f3d2dd2c39586a5d2eeaa194ee0b291c973a8cbc867c113a443986799490661dc6bec1bbd8288239e1cacf9a27c8d036c2d98c9e3e1595df28a4a1def6d55a
-
Filesize
45KB
MD5c08703dd08f82566753d9802f45c6520
SHA1e5308cc131db52602f12b22335c026ee31190f5a
SHA256d91686299a4bab99b06c77272b7af553db46a8ed2498c372e861b2548d9b4c4e
SHA512a6e5d2e881e0a2602391c95eb726d88baea8135f0e321bb2cde63c24c5e6172ce2ed5eead275da064b3794089f7bf7ddb2ba114d1dad91cd7a3329b0958531cd
-
Filesize
45KB
MD5017108e168a34a3b0b1ab5e038dad13f
SHA162760a3420f508d93f04f77f9f742afa7cc7df8c
SHA2564a7b0ebf8bb8a3296384d9f57d099f75af44695c15eba31e328471dedca9e6b3
SHA512cb955b66bf40bc469a844dc8cb3ced5a0334c9631d7c2307372e904f7b17fe3f2db14753646eef13fc30bd6c7ea4118c154fae79b2a1dd17e8f81a17735cc1be
-
Filesize
45KB
MD5ed94ff20a62c8509f7a5a969836bb47f
SHA1d6d6beeafd3068346823d5ea32b13e7fcb2b2f1f
SHA256695b38d00323e7e02294a635a9d424ae60f54d1e39067e6507719da4240d95c1
SHA512b72321f82904426af61ffa8f2cae3537d9e5775460cb5ffaf9444f81a3f3c0f6788f287a478b3619fa35850b2e2f3f922f39f4185dbda6c89310bf593dcf53b7
-
Filesize
45KB
MD5ab97cc82828a1e0d0e35a43dbb10d087
SHA1a4d27cd4bbe9c47c9fc66f23ad448d67436e6a5c
SHA2569b0b98dacd789a2677aa8de581a752cfb05368f177c6bb8ee420ae9e79ecc406
SHA512d9198fcc54c7611a699ab515b073e038f7cb7977745d210d52c9fe6629828469de07f3b95f1401a9f5e0967f0757f1d12644fcf4602f027640e2e7877728168f
-
Filesize
45KB
MD504ba3b7ff589e72b18fd5c6a6523813e
SHA11247cb307bbbc4c2c0473d0da4ef6be45f3614df
SHA256f0a94cb3ce52607432eaf0a1132476862f7622f424c1f783ee52749c1f9f9823
SHA51262f2639e869d78a16cc00f841646d15537fadeeb0fbb6f638a0c3021ae46d5205e3a7a1cd1a8ef1e19a610d290a7dd9fc2713d7449a010c8ce62c072336a540e
-
Filesize
45KB
MD511a545630bbd3db0751ea1241a8d7e5b
SHA1e011010ef96a112468e2bf4277f45903115a300d
SHA2565e82b649835eb14fad81f79ace2b345485595f9f6feb9781c0bf9a6d4c10caf9
SHA51283e63b0380c2aed61f9070d5105756dbf6dba9f40de1e491909a47eefefd1a542fa1be4751feb59a822d38dc3e873aeda9c83d05e08310a91345015c898d0379
-
Filesize
45KB
MD5e2c21a7f925ae0e742f6cc457e5f5e58
SHA14fd2aee70b56668a222a2564d2ee3cec6ca7d0b8
SHA256833b92055c74c02273144cb301a59cb08fcf771ffbbf31f6fd6bc748b44239d0
SHA512b7d71c45c9ae1ed472493598c7d2525f2c2229539fd9817d422654d89585b2c30196473719c221bafb61bc08f278c456cf15881c73fd030f011e60c1738eec05
-
Filesize
45KB
MD56f2e674ac752be66e601d6e82a50736b
SHA1fff94c0785cd4034cfb782369edd914fb9afa47d
SHA256fdfc57720f229a3faf53dc4c0e58eb6349652169af6c8f8d1eb95ba3127fda3e
SHA512ad7f733cd71bf28e5f445c64c6f2831e6de8772aee6a4b1968adbc8f98714e3337eb837403f253dc96ebe9e19e8793649abb076b0876514fc7a856e21035d601
-
Filesize
45KB
MD5899c4174dbd82b7e72a00262a617cbc0
SHA12cdc4d66cb5140903945c87b3b885cdeea216e3b
SHA256af815581f029893c1f65abcc8eed78f3242b9d01f75a4ad61cb2e0fc2b65f5c5
SHA5125afd5cff8938bfc0ed3d349f64e322e984a229b61a4c5bde7ab0b17142c7fb7605becac1313b19b69fa42984c6944dc59687c5925cc5fb67480c77ba6caa88ff
-
Filesize
45KB
MD5205a326bfe26fb5417cdd38ab2b42d20
SHA1bb9ebcd450a2c790d93a5270b3609c4f522811ef
SHA25675e6203aad1d779bc72ec184db3ede601f2923d82f09cac860d1f4c9e8e23e1b
SHA512a32822456070ae305ebc7e1f76fdaa8799aa0f51ec8f3c85b95e69cb975c405a59f48240c73bd73c2716ba4c316679cd4bd16d4e900151eccddaf88719709108
-
Filesize
45KB
MD50a459863b11d1292729bf3a7b898f371
SHA1ec745b6ef4e0c3a3711f45c3cea9d01f8df598da
SHA2568de43c93f8c6a8154d2db8d0585b3b9a4317e5715f353bf390470013309de9da
SHA512e692fa6ff01eae5c54d0fc226292c05672a1165192eac8af499f1ebf6e1837eb2c9ef7904a183b0fa418a1d9645176ce2e0bbb3603d3244d1c91f52c3022b943
-
Filesize
640B
MD55d142e7978321fde49abd9a068b64d97
SHA170020fcf7f3d6dafb6c8cd7a55395196a487bef4
SHA256fe222b08327bbfb35cbd627c0526ba7b5755b02ce0a95823a4c0bf58e601d061
SHA5122351284652a9a1b35006baf4727a85199406e464ac33cb4701a6182e1076aaff022c227dbe4ad6e916eba15ebad08b10719a8e86d5a0f89844a163a7d4a7bbf9
-
Filesize
217B
MD5c00d8433fe598abff197e690231531e0
SHA14f6b87a4327ff5343e9e87275d505b9f145a7e42
SHA25652fb776a91b260bf196016ecb195550cdd9084058fe7b4dd3fe2d4fda1b6470e
SHA512a71523ec2bd711e381a37baabd89517dff6c6530a435f4382b7f4056f98aff5d6014e85ce3b79bd1f02fdd6adc925cd3fc051752c1069e9eb511a465cd9908e1