Malware Analysis Report

2025-08-05 16:06

Sample ID 240526-ec8cbaee75
Target 5e92d32561d04e88c358e03ce38940e0_NeikiAnalytics.exe
SHA256 864902e6be9eaa59c7d50bd55e65c1dafd641b49ad9777306238cda2934cc84f
Tags
score
7/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
7/10

SHA256

864902e6be9eaa59c7d50bd55e65c1dafd641b49ad9777306238cda2934cc84f

Threat Level: Shows suspicious behavior

The file 5e92d32561d04e88c358e03ce38940e0_NeikiAnalytics.exe was found to be: Shows suspicious behavior.

Malicious Activity Summary


Uses the VBS compiler for execution

Executes dropped EXE

Checks computer location settings

Deletes itself

Loads dropped DLL

Unsigned PE

Enumerates physical storage devices

Suspicious use of AdjustPrivilegeToken

Suspicious use of WriteProcessMemory

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-05-26 03:48

Signatures

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-05-26 03:48

Reported

2024-05-26 03:51

Platform

win7-20240508-en

Max time kernel

121s

Max time network

122s

Command Line

"C:\Users\Admin\AppData\Local\Temp\5e92d32561d04e88c358e03ce38940e0_NeikiAnalytics.exe"

Signatures

Deletes itself

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\tmp34A8.tmp.exe N/A

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\tmp34A8.tmp.exe N/A

Loads dropped DLL

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\5e92d32561d04e88c358e03ce38940e0_NeikiAnalytics.exe N/A

Uses the VBS compiler for execution

Enumerates physical storage devices

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\5e92d32561d04e88c358e03ce38940e0_NeikiAnalytics.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 2012 wrote to memory of 1676 N/A C:\Users\Admin\AppData\Local\Temp\5e92d32561d04e88c358e03ce38940e0_NeikiAnalytics.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe
PID 2012 wrote to memory of 1676 N/A C:\Users\Admin\AppData\Local\Temp\5e92d32561d04e88c358e03ce38940e0_NeikiAnalytics.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe
PID 2012 wrote to memory of 1676 N/A C:\Users\Admin\AppData\Local\Temp\5e92d32561d04e88c358e03ce38940e0_NeikiAnalytics.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe
PID 2012 wrote to memory of 1676 N/A C:\Users\Admin\AppData\Local\Temp\5e92d32561d04e88c358e03ce38940e0_NeikiAnalytics.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe
PID 1676 wrote to memory of 2320 N/A C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
PID 1676 wrote to memory of 2320 N/A C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
PID 1676 wrote to memory of 2320 N/A C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
PID 1676 wrote to memory of 2320 N/A C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
PID 2012 wrote to memory of 2740 N/A C:\Users\Admin\AppData\Local\Temp\5e92d32561d04e88c358e03ce38940e0_NeikiAnalytics.exe C:\Users\Admin\AppData\Local\Temp\tmp34A8.tmp.exe
PID 2012 wrote to memory of 2740 N/A C:\Users\Admin\AppData\Local\Temp\5e92d32561d04e88c358e03ce38940e0_NeikiAnalytics.exe C:\Users\Admin\AppData\Local\Temp\tmp34A8.tmp.exe
PID 2012 wrote to memory of 2740 N/A C:\Users\Admin\AppData\Local\Temp\5e92d32561d04e88c358e03ce38940e0_NeikiAnalytics.exe C:\Users\Admin\AppData\Local\Temp\tmp34A8.tmp.exe
PID 2012 wrote to memory of 2740 N/A C:\Users\Admin\AppData\Local\Temp\5e92d32561d04e88c358e03ce38940e0_NeikiAnalytics.exe C:\Users\Admin\AppData\Local\Temp\tmp34A8.tmp.exe

Processes

C:\Users\Admin\AppData\Local\Temp\5e92d32561d04e88c358e03ce38940e0_NeikiAnalytics.exe

"C:\Users\Admin\AppData\Local\Temp\5e92d32561d04e88c358e03ce38940e0_NeikiAnalytics.exe"

C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe

"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\v43jrqiu\v43jrqiu.cmdline"

C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe

C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES368B.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc3FEA6C9ED59643449A4C1988C0BC12D8.TMP"

C:\Users\Admin\AppData\Local\Temp\tmp34A8.tmp.exe

"C:\Users\Admin\AppData\Local\Temp\tmp34A8.tmp.exe" C:\Users\Admin\AppData\Local\Temp\5e92d32561d04e88c358e03ce38940e0_NeikiAnalytics.exe

Network

N/A

Files

memory/2012-0-0x0000000074E9E000-0x0000000074E9F000-memory.dmp

memory/2012-1-0x0000000001200000-0x000000000120A000-memory.dmp

memory/2012-7-0x0000000074E90000-0x000000007557E000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\v43jrqiu\v43jrqiu.cmdline

MD5 f4c4d58fd7435978b657091e192fd760
SHA1 40f10f9bbf97fddccf9cf77e8e478838e53265e0
SHA256 b42cdd66cbd406b598a5d048c020d10f6aa91926ba51f160e3215f831412ab20
SHA512 82c6dd921268bcd70400eb7c17ae48d23a0210e7d7237910a4942bf1bf3a64a6ad9112ab979f9e3bfcee850ec884c28ede0dfe6103b73f52ac72043861090a14

C:\Users\Admin\AppData\Local\Temp\v43jrqiu\v43jrqiu.0.vb

MD5 598a8aee654dbc235bbcc6ffaeee5cec
SHA1 bfeafbdd1a230ae15cb234ab0eb63dedc2defd87
SHA256 dec355d12171cf6bae6463d12786f764c4ad8d4617a7621a2ec6908710eea29b
SHA512 aa2259cb0368d532d795f67c1c302889c9ca8a1bcb2bdeb6b40ebc2853c1be54eb96765ba582576d222e0dcbb99404cecad36140c4cffa2ce0dd25607a3a926c

C:\Users\Admin\AppData\Local\Temp\RE.resources

MD5 defc0502ec6976c2d42b3ac9216997b8
SHA1 8de623d41896e45d337509320380d652fdbae2b2
SHA256 6c79ea502e5e9142ac53178d5660758f1a912d8ebd8ac1cc3dc46bb34038eafc
SHA512 a8581075dc75f5f4a62460b829b87ff1721ea8264eebddb0a9c27eca88c703c2e17099c5d81f4b21f0e53b31b54d39a8b747addb36052aa38ee05c51445ac523

C:\Users\Admin\AppData\Local\Temp\vbc3FEA6C9ED59643449A4C1988C0BC12D8.TMP

MD5 7a5447a388664dac03afa932d8d9e980
SHA1 6c42e381f2670716b32011e9a8604084d2942a75
SHA256 eb3c3612782c12308b60f2f6282df837d8c52a6e38a2f639d9d6574e50f03045
SHA512 d7cd7640cf392f4010c9da6c99d27fab85cc8f46581047b02251d027962d62d07f68265586f8682c21ccda9876163cfe4a2c1cf46c77d4d6357aa6cdcb1e3276

C:\Users\Admin\AppData\Local\Temp\RES368B.tmp

MD5 0f8d478d75c1dcce511fdb287abdd24b
SHA1 3e63265a7b298e87e5d1bb20a3a93be15137dd6c
SHA256 bf2c53aa0ec98cd97c698c89c074dbdf2c8714c9cdadcc65fc8142c45870b063
SHA512 2c1124460f3f769671d3c9f88c5eabab1d95f565307e86bade8034cae2a543b7a3dd0f75ce37b2dfcd6cf8e85efab4b12bf61cbe2b47e2a152bdd3d68d272663

C:\Users\Admin\AppData\Local\Temp\tmp34A8.tmp.exe

MD5 64e9329200542086fde8b4f5ba3fbce6
SHA1 90727b46389c3979b381c77004574424cde96f33
SHA256 f3c5fbcabd2c010f0974ccb4571a8d2188ed2cfc0d8b4549098f52442d7b784f
SHA512 75c0f5b6de27dc18b538c866d588d45c3b0278289ce75f20295e95737e8b294e052f2c01b50896e50205fc48141d7a265f9a6b921b6d7060d2aba38793f625ea

memory/2012-23-0x0000000074E90000-0x000000007557E000-memory.dmp

memory/2740-24-0x0000000000880000-0x000000000088A000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2024-05-26 03:48

Reported

2024-05-26 03:51

Platform

win10v2004-20240426-en

Max time kernel

135s

Max time network

105s

Command Line

"C:\Users\Admin\AppData\Local\Temp\5e92d32561d04e88c358e03ce38940e0_NeikiAnalytics.exe"

Signatures

Checks computer location settings

Description Indicator Process Target
Key value queried \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\Control Panel\International\Geo\Nation C:\Users\Admin\AppData\Local\Temp\5e92d32561d04e88c358e03ce38940e0_NeikiAnalytics.exe N/A

Deletes itself

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\tmp4FD6.tmp.exe N/A

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\tmp4FD6.tmp.exe N/A

Uses the VBS compiler for execution

Enumerates physical storage devices

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\5e92d32561d04e88c358e03ce38940e0_NeikiAnalytics.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 212 wrote to memory of 4152 N/A C:\Users\Admin\AppData\Local\Temp\5e92d32561d04e88c358e03ce38940e0_NeikiAnalytics.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe
PID 212 wrote to memory of 4152 N/A C:\Users\Admin\AppData\Local\Temp\5e92d32561d04e88c358e03ce38940e0_NeikiAnalytics.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe
PID 212 wrote to memory of 4152 N/A C:\Users\Admin\AppData\Local\Temp\5e92d32561d04e88c358e03ce38940e0_NeikiAnalytics.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe
PID 4152 wrote to memory of 2396 N/A C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
PID 4152 wrote to memory of 2396 N/A C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
PID 4152 wrote to memory of 2396 N/A C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
PID 212 wrote to memory of 4432 N/A C:\Users\Admin\AppData\Local\Temp\5e92d32561d04e88c358e03ce38940e0_NeikiAnalytics.exe C:\Users\Admin\AppData\Local\Temp\tmp4FD6.tmp.exe
PID 212 wrote to memory of 4432 N/A C:\Users\Admin\AppData\Local\Temp\5e92d32561d04e88c358e03ce38940e0_NeikiAnalytics.exe C:\Users\Admin\AppData\Local\Temp\tmp4FD6.tmp.exe
PID 212 wrote to memory of 4432 N/A C:\Users\Admin\AppData\Local\Temp\5e92d32561d04e88c358e03ce38940e0_NeikiAnalytics.exe C:\Users\Admin\AppData\Local\Temp\tmp4FD6.tmp.exe

Processes

C:\Users\Admin\AppData\Local\Temp\5e92d32561d04e88c358e03ce38940e0_NeikiAnalytics.exe

"C:\Users\Admin\AppData\Local\Temp\5e92d32561d04e88c358e03ce38940e0_NeikiAnalytics.exe"

C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe

"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\1jrtguti\1jrtguti.cmdline"

C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe

C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES5246.tmp" "C:\Users\Admin\AppData\Local\Temp\vbcA9D6C4F31E94079AE81221488467B3B.TMP"

C:\Users\Admin\AppData\Local\Temp\tmp4FD6.tmp.exe

"C:\Users\Admin\AppData\Local\Temp\tmp4FD6.tmp.exe" C:\Users\Admin\AppData\Local\Temp\5e92d32561d04e88c358e03ce38940e0_NeikiAnalytics.exe

Network

Country Destination Domain Proto
US 8.8.8.8:53 8.8.8.8.in-addr.arpa udp
US 8.8.8.8:53 196.249.167.52.in-addr.arpa udp
US 8.8.8.8:53 240.221.184.93.in-addr.arpa udp
US 8.8.8.8:53 73.31.126.40.in-addr.arpa udp
US 8.8.8.8:53 26.35.223.20.in-addr.arpa udp
NL 23.62.61.194:443 www.bing.com tcp
US 8.8.8.8:53 194.61.62.23.in-addr.arpa udp
US 8.8.8.8:53 232.168.11.51.in-addr.arpa udp
US 8.8.8.8:53 50.23.12.20.in-addr.arpa udp
US 8.8.8.8:53 198.187.3.20.in-addr.arpa udp
US 8.8.8.8:53 43.58.199.20.in-addr.arpa udp
US 8.8.8.8:53 23.236.111.52.in-addr.arpa udp
US 8.8.8.8:53 tse1.mm.bing.net udp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 8.8.8.8:53 88.156.103.20.in-addr.arpa udp

Files

memory/212-0-0x0000000074A9E000-0x0000000074A9F000-memory.dmp

memory/212-1-0x0000000000C40000-0x0000000000C4A000-memory.dmp

memory/212-2-0x0000000005460000-0x00000000054FC000-memory.dmp

memory/212-8-0x0000000074A90000-0x0000000075240000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\1jrtguti\1jrtguti.cmdline

MD5 2507fad8dd41b051b36e200c602459cf
SHA1 c17e5d5ebb177fd5ef2eebb6f362ba2714706829
SHA256 aaf1a8540705566af8992a0f7f908e6172d129646a92829af3b9c9da68cab285
SHA512 23bc4adf35247bcd3e293208f199ee220771937792518ad3a93040c6712a986a403bef73343e62c0faaeb1052a0fbe764103990f66448c83dd32d57a1bbdcea4

C:\Users\Admin\AppData\Local\Temp\1jrtguti\1jrtguti.0.vb

MD5 4382cd50ac59a470cb40ee5555592c1c
SHA1 aa8f9cdd673936e67602c8067bdcfc025e9a90de
SHA256 3b9eab729c36e6e54ed14e3c4e353e3c8c1523fe282c6d5ab15b8dd921c982af
SHA512 e34dcc37d6f40c53d5043ffc4b7bc35a917da6c6b171b38eb8266509eadd357f48d2445b8b3280725c727f56839664da5288de10f9d27b6d3d05f2fdb65e8b60

C:\Users\Admin\AppData\Local\Temp\RE.resources

MD5 e63e238eeddb3961fb78b4e95c1b5645
SHA1 bdbf5f4b87cb9e36370996be6785f0ff46a8ccb6
SHA256 a647cec5d60c4fddb413cf5071d09e4bdf444363a8feb769abe20f00a9301efe
SHA512 02cbba335c8e6c66a29c21679c38e6601c1cd93e3da224166d68c356348ab78b1f28b839a37514b0874a9efbef65159a3b1333e03fa4dfd1cf10d3262ad6cfff

C:\Users\Admin\AppData\Local\Temp\vbcA9D6C4F31E94079AE81221488467B3B.TMP

MD5 8dcbbecc3e6f6595d9febd0e0bc7b7a7
SHA1 6da6318e43983337358ef1dee7be5e8f2fdf4686
SHA256 bcad27e8aeee4f9e7dfda5a9d1c65150663f754b228d7e03335568250dd16e4a
SHA512 492904190570eefdac16b2d12c654f30c900276ac7f94334014240e0164ac6eb5ca3057d411b249a747a3c7a43a03c4cdfb94e29eecfa7581fe348b6e50bcc5f

C:\Users\Admin\AppData\Local\Temp\RES5246.tmp

MD5 11641942bdc71d4574315de80cdb8c65
SHA1 a8737ef1bc19c69bea9336a06515c5df7428d1c7
SHA256 c651e737acb068bfe905062fc992ae1b6b56b4d9f3f013252c667842fd416c57
SHA512 6db0cf3b701f5f463093f1c70dcc9ad2088bc15d0669c2177152f839b06972c560cb69af5e799c902eb7106812c472630233fb58551e4a468391d18ae070d3da

C:\Users\Admin\AppData\Local\Temp\tmp4FD6.tmp.exe

MD5 aba50393f68b1def02d060beda985250
SHA1 fb884a5d51fb9d7693f485a486cb92e7501741d0
SHA256 93ee809adcea4754c128a71004b017a4f8567d0a93fb6249206a75921fd53c8d
SHA512 c226990a31dbfb41224ea9eca8226e2f1d78c933dcb1d2707916b71ae85df94589dbfc9dc3c69ec17541380684564d9a15c2b62ad39592e67414d8317893075b

memory/212-24-0x0000000074A90000-0x0000000075240000-memory.dmp

memory/4432-25-0x0000000000C30000-0x0000000000C3A000-memory.dmp

memory/4432-26-0x0000000074A90000-0x0000000075240000-memory.dmp

memory/4432-27-0x0000000005B20000-0x00000000060C4000-memory.dmp

memory/4432-28-0x0000000005610000-0x00000000056A2000-memory.dmp

memory/4432-30-0x0000000074A90000-0x0000000075240000-memory.dmp