Analysis
-
max time kernel
151s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
28-05-2024 07:54
Static task
static1
Behavioral task
behavioral1
Sample
39cc021ba5668c4692c4ef05563c9d10_NeikiAnalytics.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
39cc021ba5668c4692c4ef05563c9d10_NeikiAnalytics.exe
Resource
win10v2004-20240226-en
General
-
Target
39cc021ba5668c4692c4ef05563c9d10_NeikiAnalytics.exe
-
Size
31KB
-
MD5
39cc021ba5668c4692c4ef05563c9d10
-
SHA1
5b709a23c0f341f801a2c9a13c68a7489566ff4a
-
SHA256
9bcf7e45778034c902be2b489fafcabdc8790f95c67db15b91e4b2ff560c9a85
-
SHA512
6579946fd653a5e7920e8268eb4083ac45e3c9c704be750a4cbd79e19f6943f510e69c3d56f2c64f12cc98d9f5a398df004c8458d032f386615911f01649f042
-
SSDEEP
768:Qkj3dfAZfnRDVWl8zHPHXyXHCzcHHvzQBdi9vc:QkKfnVVWl4vUv4Wvc
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 39cc021ba5668c4692c4ef05563c9d10_NeikiAnalytics.exe Set value (int) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" Admin.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation 39cc021ba5668c4692c4ef05563c9d10_NeikiAnalytics.exe -
Executes dropped EXE 1 IoCs
pid Process 216 Admin.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Admin = "C:\\Users\\Admin\\Admin.exe" 39cc021ba5668c4692c4ef05563c9d10_NeikiAnalytics.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Admin = "C:\\Users\\Admin\\Admin.exe" Admin.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3176 39cc021ba5668c4692c4ef05563c9d10_NeikiAnalytics.exe 3176 39cc021ba5668c4692c4ef05563c9d10_NeikiAnalytics.exe 3176 39cc021ba5668c4692c4ef05563c9d10_NeikiAnalytics.exe 3176 39cc021ba5668c4692c4ef05563c9d10_NeikiAnalytics.exe 3176 39cc021ba5668c4692c4ef05563c9d10_NeikiAnalytics.exe 3176 39cc021ba5668c4692c4ef05563c9d10_NeikiAnalytics.exe 3176 39cc021ba5668c4692c4ef05563c9d10_NeikiAnalytics.exe 3176 39cc021ba5668c4692c4ef05563c9d10_NeikiAnalytics.exe 216 Admin.exe 216 Admin.exe 3176 39cc021ba5668c4692c4ef05563c9d10_NeikiAnalytics.exe 3176 39cc021ba5668c4692c4ef05563c9d10_NeikiAnalytics.exe 216 Admin.exe 216 Admin.exe 216 Admin.exe 216 Admin.exe 216 Admin.exe 216 Admin.exe 3176 39cc021ba5668c4692c4ef05563c9d10_NeikiAnalytics.exe 3176 39cc021ba5668c4692c4ef05563c9d10_NeikiAnalytics.exe 216 Admin.exe 216 Admin.exe 216 Admin.exe 216 Admin.exe 216 Admin.exe 216 Admin.exe 216 Admin.exe 216 Admin.exe 216 Admin.exe 216 Admin.exe 216 Admin.exe 216 Admin.exe 216 Admin.exe 216 Admin.exe 216 Admin.exe 216 Admin.exe 216 Admin.exe 216 Admin.exe 216 Admin.exe 216 Admin.exe 216 Admin.exe 216 Admin.exe 216 Admin.exe 216 Admin.exe 216 Admin.exe 216 Admin.exe 216 Admin.exe 216 Admin.exe 216 Admin.exe 216 Admin.exe 216 Admin.exe 216 Admin.exe 216 Admin.exe 216 Admin.exe 216 Admin.exe 216 Admin.exe 216 Admin.exe 216 Admin.exe 216 Admin.exe 216 Admin.exe 216 Admin.exe 216 Admin.exe 216 Admin.exe 216 Admin.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 3176 39cc021ba5668c4692c4ef05563c9d10_NeikiAnalytics.exe 216 Admin.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3176 wrote to memory of 216 3176 39cc021ba5668c4692c4ef05563c9d10_NeikiAnalytics.exe 92 PID 3176 wrote to memory of 216 3176 39cc021ba5668c4692c4ef05563c9d10_NeikiAnalytics.exe 92 PID 3176 wrote to memory of 216 3176 39cc021ba5668c4692c4ef05563c9d10_NeikiAnalytics.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\39cc021ba5668c4692c4ef05563c9d10_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\39cc021ba5668c4692c4ef05563c9d10_NeikiAnalytics.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3176 -
C:\Users\Admin\Admin.exe"C:\Users\Admin\Admin.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=2628 --field-trial-handle=3192,i,2785050981002401924,4037047756083432660,262144 --variations-seed-version /prefetch:81⤵PID:948
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
31KB
MD5e69ad52588539e9b7714d35179d4a76d
SHA17da411db0e304d07e17d36d318e5671cd8570c65
SHA2562bbc9f53f5fc247e7ae21fb2d73058c813681793770e9f31bab67a5986538aac
SHA51299f932643a27405da1d5bd42fb73c5b6c56aeda0325f8312f0dd064569f639c045d7d7c19b44873d1eb5722a875aa3f103b66c2012c27c6f05217a0f33b68b96
-
Filesize
89B
MD52bd83f0dd1740fff26d071dcdd59af56
SHA1221e9e64a79255053a9e4da65957a7bdd6bc045b
SHA25670a676e21716581858de2753ea5eec8befe6741ed299216f65a13c3853805c05
SHA512fe632b63b8b850cc83f0eb2a114de60693ec0dd8b62fe8f0938b42526557889f48357da0ca3bb06bed1ad68562280023a69b54d93cff8b7266bb8ebb63ac903c