Analysis
-
max time kernel
148s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
26-05-2024 14:17
Static task
static1
Behavioral task
behavioral1
Sample
080d1485cfbd03b271340e725881da60_NeikiAnalytics.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
080d1485cfbd03b271340e725881da60_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
080d1485cfbd03b271340e725881da60_NeikiAnalytics.exe
-
Size
2.2MB
-
MD5
080d1485cfbd03b271340e725881da60
-
SHA1
2806467db3e45e071dd66ef2bf9f1307cd349399
-
SHA256
4f780492c9a8a825f7c259aae31d0a9f00b435d7f87e297390c8386c63f32769
-
SHA512
34c57614e5255355fae7bf73e71a2c6266c2b2d6fbd02c7d4fabe61b7af2e2054b8d4b799aa42917d21ba0eb39dc77b1e324b91f82c42f21925432aa62b90ae9
-
SSDEEP
24576:n2dJqwaZs9a8fbKmIwlDSIerahovRCVCWWO0BubzQ0Rj3jtK+a++K+jNd1RzVCEL:n7n7pNXheQc3Fg7g3vYXg
Malware Config
Signatures
-
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
Processes:
080d1485cfbd03b271340e725881da60_NeikiAnalytics.exedescription ioc process File opened for modification \??\PhysicalDrive0 080d1485cfbd03b271340e725881da60_NeikiAnalytics.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
080d1485cfbd03b271340e725881da60_NeikiAnalytics.exedescription pid process Token: SeDebugPrivilege 4272 080d1485cfbd03b271340e725881da60_NeikiAnalytics.exe Token: SeDebugPrivilege 4272 080d1485cfbd03b271340e725881da60_NeikiAnalytics.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
Processes:
080d1485cfbd03b271340e725881da60_NeikiAnalytics.exepid process 4272 080d1485cfbd03b271340e725881da60_NeikiAnalytics.exe 4272 080d1485cfbd03b271340e725881da60_NeikiAnalytics.exe 4272 080d1485cfbd03b271340e725881da60_NeikiAnalytics.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\080d1485cfbd03b271340e725881da60_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\080d1485cfbd03b271340e725881da60_NeikiAnalytics.exe"1⤵
- Writes to the Master Boot Record (MBR)
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\e574934.tmpFilesize
1.6MB
MD54f3387277ccbd6d1f21ac5c07fe4ca68
SHA1e16506f662dc92023bf82def1d621497c8ab5890
SHA256767a3fc4a7a6818cdc3f0b99aaa95db694f6bcde719d2057a88b3d4df3d74fac
SHA5129da199ac69e3c0d4e0c6307e0ab8178f12cc25cb2f14c3511f6b64e6e60a925c860f3263cb38353a97b55a71ef4d27f8cb7fa3cfc08e7c1a349fd8d209dfa219
-
C:\Users\Admin\AppData\Local\Temp\e574954.tmpFilesize
1.6MB
MD55870ea0d6ba8dd6e2008466bdd00e0f4
SHA1d41bf60d0dedff90e3cfc1b41b7e1a73df39a7d5
SHA2565a7dac8c8b5d7cf1115246dfaf994e7f50e16a7eac1488642396f5e23fddfe0d
SHA5120c620d5e7383adcf979feccc3b1bad584a5cec8b3d74d0ace8bb786f1f04ba87fa70d59d041dc3833977d44a75f2070181d4054c7c0b9c4ce2d66249b4b3c837
-
C:\Users\Admin\AppData\Local\Temp\e574955.tmpFilesize
137KB
MD5f6b847a54cfb804a25b8842b45fd1d50
SHA1bb22fef07ce1577c8a7fa057d8cf05502c013bfc
SHA2565dd2f5a957946e0b6f63660ebd897851aad4795d4c847396c47ddbb647715583
SHA512dd08a55f538e2a33e6a0c496dc97ae9045594cbbf62f7894ae8ded63f4dc0b2e89c5935269adfd1c19607b1d2474bddc49f6acb955e6dc53a55560663ca2137a
-
C:\Users\Admin\Favorites\Íâ¹Ò×÷·»¹Ù·½Õ¾ [www.zuowg.com].urlFilesize
110B
MD5f9fc3e4f710ea6068eccca29ed784970
SHA1eb6f961e7102e3aef227b204ff4dd9563f745812
SHA2561c12badabe490d7c3d63bb0187965344ce0ed923eab707e446900a9b98913fcb
SHA512b2d0db7a2c4b4d4e53a8daf2caff6a0ea826133038380e5dcf8c6493417f2884ecd61f047798189a3cff13cca3b9dbe99e5a501ce5de10488b2a337389b019ed
-
C:\Users\Admin\Favorites\Íâ¹Ò×÷·»×ÊÔ´Õ¾ [42724920.ys168.com].urlFilesize
115B
MD5514d1b59ae8925c5edea3c446ce588dd
SHA160dd675b65c7ffaac6ca731dba265a6f316a6f75
SHA2566bbfe9e113e075b646ae49400657b8bb20cbab06854b38bf007ac6e15cd7b773
SHA5125bf3d0f1715b445852ad184907d2161967d51cb8fe9673330438d8705502bc63e263222c43839140c613a427b0b58b297e522b3953c2543453625e01b8017253