Analysis
-
max time kernel
150s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
29-05-2024 23:42
Static task
static1
Behavioral task
behavioral1
Sample
5af1662476acf0f2c48eb894ef7e8b00_NeikiAnalytics.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
5af1662476acf0f2c48eb894ef7e8b00_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
5af1662476acf0f2c48eb894ef7e8b00_NeikiAnalytics.exe
-
Size
94KB
-
MD5
5af1662476acf0f2c48eb894ef7e8b00
-
SHA1
f3d53cd0e28606f3fc70cbd3110541edb71bc441
-
SHA256
fa3da96c0adf663ad371ce41a8b41cb0519e7e306a9ff453cb0a3a22a092491a
-
SHA512
9c6fadf28d5059ff5234ed3684eda32f9325c4dcee9869b0bee64c1ae51b66b51435d731012aae2fb36ec850a142f79b7b813921ecbe653268941c986cddb733
-
SSDEEP
1536:Udsah74bTxku0WlxDMtiJEVKH/tEzXwdt7:0ho2IfpJEVKH1KAd9
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" mfliej.exe -
Executes dropped EXE 1 IoCs
pid Process 2412 mfliej.exe -
Loads dropped DLL 2 IoCs
pid Process 2148 5af1662476acf0f2c48eb894ef7e8b00_NeikiAnalytics.exe 2148 5af1662476acf0f2c48eb894ef7e8b00_NeikiAnalytics.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Run\mfliej = "C:\\Users\\Admin\\mfliej.exe" mfliej.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2412 mfliej.exe 2412 mfliej.exe 2412 mfliej.exe 2412 mfliej.exe 2412 mfliej.exe 2412 mfliej.exe 2412 mfliej.exe 2412 mfliej.exe 2412 mfliej.exe 2412 mfliej.exe 2412 mfliej.exe 2412 mfliej.exe 2412 mfliej.exe 2412 mfliej.exe 2412 mfliej.exe 2412 mfliej.exe 2412 mfliej.exe 2412 mfliej.exe 2412 mfliej.exe 2412 mfliej.exe 2412 mfliej.exe 2412 mfliej.exe 2412 mfliej.exe 2412 mfliej.exe 2412 mfliej.exe 2412 mfliej.exe 2412 mfliej.exe 2412 mfliej.exe 2412 mfliej.exe 2412 mfliej.exe 2412 mfliej.exe 2412 mfliej.exe 2412 mfliej.exe 2412 mfliej.exe 2412 mfliej.exe 2412 mfliej.exe 2412 mfliej.exe 2412 mfliej.exe 2412 mfliej.exe 2412 mfliej.exe 2412 mfliej.exe 2412 mfliej.exe 2412 mfliej.exe 2412 mfliej.exe 2412 mfliej.exe 2412 mfliej.exe 2412 mfliej.exe 2412 mfliej.exe 2412 mfliej.exe 2412 mfliej.exe 2412 mfliej.exe 2412 mfliej.exe 2412 mfliej.exe 2412 mfliej.exe 2412 mfliej.exe 2412 mfliej.exe 2412 mfliej.exe 2412 mfliej.exe 2412 mfliej.exe 2412 mfliej.exe 2412 mfliej.exe 2412 mfliej.exe 2412 mfliej.exe 2412 mfliej.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2148 5af1662476acf0f2c48eb894ef7e8b00_NeikiAnalytics.exe 2412 mfliej.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2148 wrote to memory of 2412 2148 5af1662476acf0f2c48eb894ef7e8b00_NeikiAnalytics.exe 28 PID 2148 wrote to memory of 2412 2148 5af1662476acf0f2c48eb894ef7e8b00_NeikiAnalytics.exe 28 PID 2148 wrote to memory of 2412 2148 5af1662476acf0f2c48eb894ef7e8b00_NeikiAnalytics.exe 28 PID 2148 wrote to memory of 2412 2148 5af1662476acf0f2c48eb894ef7e8b00_NeikiAnalytics.exe 28 PID 2412 wrote to memory of 2148 2412 mfliej.exe 27 PID 2412 wrote to memory of 2148 2412 mfliej.exe 27 PID 2412 wrote to memory of 2148 2412 mfliej.exe 27 PID 2412 wrote to memory of 2148 2412 mfliej.exe 27 PID 2412 wrote to memory of 2148 2412 mfliej.exe 27 PID 2412 wrote to memory of 2148 2412 mfliej.exe 27 PID 2412 wrote to memory of 2148 2412 mfliej.exe 27 PID 2412 wrote to memory of 2148 2412 mfliej.exe 27 PID 2412 wrote to memory of 2148 2412 mfliej.exe 27 PID 2412 wrote to memory of 2148 2412 mfliej.exe 27 PID 2412 wrote to memory of 2148 2412 mfliej.exe 27 PID 2412 wrote to memory of 2148 2412 mfliej.exe 27 PID 2412 wrote to memory of 2148 2412 mfliej.exe 27 PID 2412 wrote to memory of 2148 2412 mfliej.exe 27 PID 2412 wrote to memory of 2148 2412 mfliej.exe 27 PID 2412 wrote to memory of 2148 2412 mfliej.exe 27 PID 2412 wrote to memory of 2148 2412 mfliej.exe 27 PID 2412 wrote to memory of 2148 2412 mfliej.exe 27 PID 2412 wrote to memory of 2148 2412 mfliej.exe 27 PID 2412 wrote to memory of 2148 2412 mfliej.exe 27 PID 2412 wrote to memory of 2148 2412 mfliej.exe 27 PID 2412 wrote to memory of 2148 2412 mfliej.exe 27 PID 2412 wrote to memory of 2148 2412 mfliej.exe 27 PID 2412 wrote to memory of 2148 2412 mfliej.exe 27 PID 2412 wrote to memory of 2148 2412 mfliej.exe 27 PID 2412 wrote to memory of 2148 2412 mfliej.exe 27 PID 2412 wrote to memory of 2148 2412 mfliej.exe 27 PID 2412 wrote to memory of 2148 2412 mfliej.exe 27 PID 2412 wrote to memory of 2148 2412 mfliej.exe 27 PID 2412 wrote to memory of 2148 2412 mfliej.exe 27 PID 2412 wrote to memory of 2148 2412 mfliej.exe 27 PID 2412 wrote to memory of 2148 2412 mfliej.exe 27 PID 2412 wrote to memory of 2148 2412 mfliej.exe 27 PID 2412 wrote to memory of 2148 2412 mfliej.exe 27 PID 2412 wrote to memory of 2148 2412 mfliej.exe 27 PID 2412 wrote to memory of 2148 2412 mfliej.exe 27 PID 2412 wrote to memory of 2148 2412 mfliej.exe 27 PID 2412 wrote to memory of 2148 2412 mfliej.exe 27 PID 2412 wrote to memory of 2148 2412 mfliej.exe 27 PID 2412 wrote to memory of 2148 2412 mfliej.exe 27 PID 2412 wrote to memory of 2148 2412 mfliej.exe 27 PID 2412 wrote to memory of 2148 2412 mfliej.exe 27 PID 2412 wrote to memory of 2148 2412 mfliej.exe 27 PID 2412 wrote to memory of 2148 2412 mfliej.exe 27 PID 2412 wrote to memory of 2148 2412 mfliej.exe 27 PID 2412 wrote to memory of 2148 2412 mfliej.exe 27 PID 2412 wrote to memory of 2148 2412 mfliej.exe 27 PID 2412 wrote to memory of 2148 2412 mfliej.exe 27 PID 2412 wrote to memory of 2148 2412 mfliej.exe 27 PID 2412 wrote to memory of 2148 2412 mfliej.exe 27 PID 2412 wrote to memory of 2148 2412 mfliej.exe 27 PID 2412 wrote to memory of 2148 2412 mfliej.exe 27 PID 2412 wrote to memory of 2148 2412 mfliej.exe 27 PID 2412 wrote to memory of 2148 2412 mfliej.exe 27 PID 2412 wrote to memory of 2148 2412 mfliej.exe 27 PID 2412 wrote to memory of 2148 2412 mfliej.exe 27 PID 2412 wrote to memory of 2148 2412 mfliej.exe 27 PID 2412 wrote to memory of 2148 2412 mfliej.exe 27 PID 2412 wrote to memory of 2148 2412 mfliej.exe 27 PID 2412 wrote to memory of 2148 2412 mfliej.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\5af1662476acf0f2c48eb894ef7e8b00_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\5af1662476acf0f2c48eb894ef7e8b00_NeikiAnalytics.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2148 -
C:\Users\Admin\mfliej.exe"C:\Users\Admin\mfliej.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2412
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
94KB
MD5b5d857f6305eb81482742f049b73f0b3
SHA12e5afe90d208ab2c799a21132b06b2aac6929588
SHA2568819b2d44bd9d55b10349b26730029a86ecb5410fb31d707dda374b26186d73a
SHA512d0c0388701e767bd471e551528d6e7b72441744a017ea853bdc2f7b3427233831bb95f2c65e3ba10fdc60ce972f5882042fe900e53ca82dbd7c6ff19822eca87