Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
27-05-2024 20:16
Static task
static1
Behavioral task
behavioral1
Sample
16d198ca2b1f719d9405e9da959dcc30_NeikiAnalytics.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
16d198ca2b1f719d9405e9da959dcc30_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
16d198ca2b1f719d9405e9da959dcc30_NeikiAnalytics.exe
-
Size
53KB
-
MD5
16d198ca2b1f719d9405e9da959dcc30
-
SHA1
ef183037f9d3c1ff4717ae16d5e67cccb2ef9c14
-
SHA256
741a05eba3488de5a1dd2ab19f88ece45ac69d3df279deca173e40414243942c
-
SHA512
9656a86c41d9c84cde06312ac29a674c1021938c9c21362b7905c4defe4478442370c7800b6f47df105a70160c912e532384f044de0f0a888636eef68ad4b3a7
-
SSDEEP
1536:vNfg8r8QEydz2Af7Kp3StjEMjmLM3ztDJWZsXy4JzxPMk:GyddJJjmLM3zRJWZsXy4JN
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" yeioki.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation 16d198ca2b1f719d9405e9da959dcc30_NeikiAnalytics.exe -
Executes dropped EXE 1 IoCs
pid Process 744 yeioki.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yeioki = "C:\\Users\\Admin\\yeioki.exe" yeioki.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 744 yeioki.exe 744 yeioki.exe 744 yeioki.exe 744 yeioki.exe 744 yeioki.exe 744 yeioki.exe 744 yeioki.exe 744 yeioki.exe 744 yeioki.exe 744 yeioki.exe 744 yeioki.exe 744 yeioki.exe 744 yeioki.exe 744 yeioki.exe 744 yeioki.exe 744 yeioki.exe 744 yeioki.exe 744 yeioki.exe 744 yeioki.exe 744 yeioki.exe 744 yeioki.exe 744 yeioki.exe 744 yeioki.exe 744 yeioki.exe 744 yeioki.exe 744 yeioki.exe 744 yeioki.exe 744 yeioki.exe 744 yeioki.exe 744 yeioki.exe 744 yeioki.exe 744 yeioki.exe 744 yeioki.exe 744 yeioki.exe 744 yeioki.exe 744 yeioki.exe 744 yeioki.exe 744 yeioki.exe 744 yeioki.exe 744 yeioki.exe 744 yeioki.exe 744 yeioki.exe 744 yeioki.exe 744 yeioki.exe 744 yeioki.exe 744 yeioki.exe 744 yeioki.exe 744 yeioki.exe 744 yeioki.exe 744 yeioki.exe 744 yeioki.exe 744 yeioki.exe 744 yeioki.exe 744 yeioki.exe 744 yeioki.exe 744 yeioki.exe 744 yeioki.exe 744 yeioki.exe 744 yeioki.exe 744 yeioki.exe 744 yeioki.exe 744 yeioki.exe 744 yeioki.exe 744 yeioki.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2744 16d198ca2b1f719d9405e9da959dcc30_NeikiAnalytics.exe 744 yeioki.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2744 wrote to memory of 744 2744 16d198ca2b1f719d9405e9da959dcc30_NeikiAnalytics.exe 82 PID 2744 wrote to memory of 744 2744 16d198ca2b1f719d9405e9da959dcc30_NeikiAnalytics.exe 82 PID 2744 wrote to memory of 744 2744 16d198ca2b1f719d9405e9da959dcc30_NeikiAnalytics.exe 82 PID 744 wrote to memory of 2744 744 yeioki.exe 81 PID 744 wrote to memory of 2744 744 yeioki.exe 81 PID 744 wrote to memory of 2744 744 yeioki.exe 81 PID 744 wrote to memory of 2744 744 yeioki.exe 81 PID 744 wrote to memory of 2744 744 yeioki.exe 81 PID 744 wrote to memory of 2744 744 yeioki.exe 81 PID 744 wrote to memory of 2744 744 yeioki.exe 81 PID 744 wrote to memory of 2744 744 yeioki.exe 81 PID 744 wrote to memory of 2744 744 yeioki.exe 81 PID 744 wrote to memory of 2744 744 yeioki.exe 81 PID 744 wrote to memory of 2744 744 yeioki.exe 81 PID 744 wrote to memory of 2744 744 yeioki.exe 81 PID 744 wrote to memory of 2744 744 yeioki.exe 81 PID 744 wrote to memory of 2744 744 yeioki.exe 81 PID 744 wrote to memory of 2744 744 yeioki.exe 81 PID 744 wrote to memory of 2744 744 yeioki.exe 81 PID 744 wrote to memory of 2744 744 yeioki.exe 81 PID 744 wrote to memory of 2744 744 yeioki.exe 81 PID 744 wrote to memory of 2744 744 yeioki.exe 81 PID 744 wrote to memory of 2744 744 yeioki.exe 81 PID 744 wrote to memory of 2744 744 yeioki.exe 81 PID 744 wrote to memory of 2744 744 yeioki.exe 81 PID 744 wrote to memory of 2744 744 yeioki.exe 81 PID 744 wrote to memory of 2744 744 yeioki.exe 81 PID 744 wrote to memory of 2744 744 yeioki.exe 81 PID 744 wrote to memory of 2744 744 yeioki.exe 81 PID 744 wrote to memory of 2744 744 yeioki.exe 81 PID 744 wrote to memory of 2744 744 yeioki.exe 81 PID 744 wrote to memory of 2744 744 yeioki.exe 81 PID 744 wrote to memory of 2744 744 yeioki.exe 81 PID 744 wrote to memory of 2744 744 yeioki.exe 81 PID 744 wrote to memory of 2744 744 yeioki.exe 81 PID 744 wrote to memory of 2744 744 yeioki.exe 81 PID 744 wrote to memory of 2744 744 yeioki.exe 81 PID 744 wrote to memory of 2744 744 yeioki.exe 81 PID 744 wrote to memory of 2744 744 yeioki.exe 81 PID 744 wrote to memory of 2744 744 yeioki.exe 81 PID 744 wrote to memory of 2744 744 yeioki.exe 81 PID 744 wrote to memory of 2744 744 yeioki.exe 81 PID 744 wrote to memory of 2744 744 yeioki.exe 81 PID 744 wrote to memory of 2744 744 yeioki.exe 81 PID 744 wrote to memory of 2744 744 yeioki.exe 81 PID 744 wrote to memory of 2744 744 yeioki.exe 81 PID 744 wrote to memory of 2744 744 yeioki.exe 81 PID 744 wrote to memory of 2744 744 yeioki.exe 81 PID 744 wrote to memory of 2744 744 yeioki.exe 81 PID 744 wrote to memory of 2744 744 yeioki.exe 81 PID 744 wrote to memory of 2744 744 yeioki.exe 81 PID 744 wrote to memory of 2744 744 yeioki.exe 81 PID 744 wrote to memory of 2744 744 yeioki.exe 81 PID 744 wrote to memory of 2744 744 yeioki.exe 81 PID 744 wrote to memory of 2744 744 yeioki.exe 81 PID 744 wrote to memory of 2744 744 yeioki.exe 81 PID 744 wrote to memory of 2744 744 yeioki.exe 81 PID 744 wrote to memory of 2744 744 yeioki.exe 81 PID 744 wrote to memory of 2744 744 yeioki.exe 81 PID 744 wrote to memory of 2744 744 yeioki.exe 81 PID 744 wrote to memory of 2744 744 yeioki.exe 81 PID 744 wrote to memory of 2744 744 yeioki.exe 81 PID 744 wrote to memory of 2744 744 yeioki.exe 81 PID 744 wrote to memory of 2744 744 yeioki.exe 81
Processes
-
C:\Users\Admin\AppData\Local\Temp\16d198ca2b1f719d9405e9da959dcc30_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\16d198ca2b1f719d9405e9da959dcc30_NeikiAnalytics.exe"1⤵
- Checks computer location settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2744 -
C:\Users\Admin\yeioki.exe"C:\Users\Admin\yeioki.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:744
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
53KB
MD5bfeeaaa4d88cc1307a580a9098888e76
SHA10adae96c815ac88643cfbc6c65ed6235b524bb13
SHA256159b7915528850ed2dfe31990282d803d3a918a60ab8fd9d4ccbe3582ec298b5
SHA512044af93808475b50696570edd5b4fed97880b13acd10e646baea424f575a863dce486bb87c18b74c2e5c41b2ab92166403de30d3eae6f74c0596dbe09db09bf1