Analysis Overview
SHA256
96b2e8e02bda2ac3205a6275ff8d0ed6afc70916e829e2a9b5288af96368a0a4
Threat Level: Shows suspicious behavior
The file 4b4d7bd12e6298526586bdef7e46c080_NeikiAnalytics.exe was found to be: Shows suspicious behavior.
Malicious Activity Summary
Executes dropped EXE
Loads dropped DLL
Adds Run key to start application
Unsigned PE
Suspicious behavior: EnumeratesProcesses
Suspicious use of WriteProcessMemory
MITRE ATT&CK
Enterprise Matrix V15
Analysis: static1
Detonation Overview
Reported
2024-05-29 07:45
Signatures
Unsigned PE
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Analysis: behavioral1
Detonation Overview
Submitted
2024-05-29 07:45
Reported
2024-05-29 07:48
Platform
win7-20231129-en
Max time kernel
149s
Max time network
120s
Command Line
Signatures
Executes dropped EXE
| Description | Indicator | Process | Target |
| N/A | N/A | C:\UserDotBP\devdobec.exe | N/A |
Loads dropped DLL
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\4b4d7bd12e6298526586bdef7e46c080_NeikiAnalytics.exe | N/A |
Adds Run key to start application
| Description | Indicator | Process | Target |
| Set value (str) | \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\Parametr = "C:\\UserDotBP\\devdobec.exe" | C:\Users\Admin\AppData\Local\Temp\4b4d7bd12e6298526586bdef7e46c080_NeikiAnalytics.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\Parametr = "C:\\VidD5\\optixec.exe" | C:\Users\Admin\AppData\Local\Temp\4b4d7bd12e6298526586bdef7e46c080_NeikiAnalytics.exe | N/A |
Suspicious behavior: EnumeratesProcesses
Suspicious use of WriteProcessMemory
| Description | Indicator | Process | Target |
| PID 2848 wrote to memory of 2240 | N/A | C:\Users\Admin\AppData\Local\Temp\4b4d7bd12e6298526586bdef7e46c080_NeikiAnalytics.exe | C:\UserDotBP\devdobec.exe |
| PID 2848 wrote to memory of 2240 | N/A | C:\Users\Admin\AppData\Local\Temp\4b4d7bd12e6298526586bdef7e46c080_NeikiAnalytics.exe | C:\UserDotBP\devdobec.exe |
| PID 2848 wrote to memory of 2240 | N/A | C:\Users\Admin\AppData\Local\Temp\4b4d7bd12e6298526586bdef7e46c080_NeikiAnalytics.exe | C:\UserDotBP\devdobec.exe |
| PID 2848 wrote to memory of 2240 | N/A | C:\Users\Admin\AppData\Local\Temp\4b4d7bd12e6298526586bdef7e46c080_NeikiAnalytics.exe | C:\UserDotBP\devdobec.exe |
Processes
C:\Users\Admin\AppData\Local\Temp\4b4d7bd12e6298526586bdef7e46c080_NeikiAnalytics.exe
"C:\Users\Admin\AppData\Local\Temp\4b4d7bd12e6298526586bdef7e46c080_NeikiAnalytics.exe"
C:\UserDotBP\devdobec.exe
C:\UserDotBP\devdobec.exe
Network
Files
\UserDotBP\devdobec.exe
| MD5 | 3b123f9131d670c0d484fec9c93e4169 |
| SHA1 | 3fa55a4bf0ba0739e10d8a09ba07b4594b4f7441 |
| SHA256 | 30e8e394c573f2f5760b446f0997946d957dd30480fda8365f6024d43b794400 |
| SHA512 | 92bcb2ce0123e0918b9e53659846b4e2eba5690f86813f2af840039a057582d65a8336a73ef99b26eb27323925552302f453e106b82d58b8731fe50e7e17985e |
C:\Users\Admin\253086396416_6.1_Admin.ini
| MD5 | a0e2d114d8f017c0ba83b5b93dc24995 |
| SHA1 | 2b841af345aa3fa81e77d6bead8544c42dca5fe7 |
| SHA256 | a4a2b290a04a03c1d15e159768d2681bc40127735fcaa15f7101bc615bdce46f |
| SHA512 | d6a5b739d35846ce39e4bbc9ef8ae60b2514b78f0575f0a4a6ed3375a78dcd1fc74af1c689651ef5cd8c085d6b5d5f1b6a1532600bd8a3f133c1ea4e7665ec34 |
C:\VidD5\optixec.exe
| MD5 | 5a6d00bbd2f7663173c034fb53b03b0d |
| SHA1 | 807536ad20b9aa9412db9f1d05119e1331e0bd47 |
| SHA256 | 2ffad4af46ce59249717e89a619a1ee33946a1f6e70cded39b32128719d98299 |
| SHA512 | 3cfff9fb286d3be46b5920435929f0f0cfe777bf53a42ab58b53b7fd01b71ebc21dfa8e4b00638dabccbe330b0dae6f6bbec3fa41c39ca4a85d061839fc54001 |
Analysis: behavioral2
Detonation Overview
Submitted
2024-05-29 07:45
Reported
2024-05-29 07:48
Platform
win10v2004-20240508-en
Max time kernel
149s
Max time network
150s
Command Line
Signatures
Executes dropped EXE
| Description | Indicator | Process | Target |
| N/A | N/A | C:\FilesVX\abodloc.exe | N/A |
Adds Run key to start application
| Description | Indicator | Process | Target |
| Set value (str) | \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Parametr = "C:\\FilesVX\\abodloc.exe" | C:\Users\Admin\AppData\Local\Temp\4b4d7bd12e6298526586bdef7e46c080_NeikiAnalytics.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Parametr = "C:\\MintQ3\\optidevloc.exe" | C:\Users\Admin\AppData\Local\Temp\4b4d7bd12e6298526586bdef7e46c080_NeikiAnalytics.exe | N/A |
Suspicious behavior: EnumeratesProcesses
Suspicious use of WriteProcessMemory
| Description | Indicator | Process | Target |
| PID 4580 wrote to memory of 1096 | N/A | C:\Users\Admin\AppData\Local\Temp\4b4d7bd12e6298526586bdef7e46c080_NeikiAnalytics.exe | C:\FilesVX\abodloc.exe |
| PID 4580 wrote to memory of 1096 | N/A | C:\Users\Admin\AppData\Local\Temp\4b4d7bd12e6298526586bdef7e46c080_NeikiAnalytics.exe | C:\FilesVX\abodloc.exe |
| PID 4580 wrote to memory of 1096 | N/A | C:\Users\Admin\AppData\Local\Temp\4b4d7bd12e6298526586bdef7e46c080_NeikiAnalytics.exe | C:\FilesVX\abodloc.exe |
Processes
C:\Users\Admin\AppData\Local\Temp\4b4d7bd12e6298526586bdef7e46c080_NeikiAnalytics.exe
"C:\Users\Admin\AppData\Local\Temp\4b4d7bd12e6298526586bdef7e46c080_NeikiAnalytics.exe"
C:\FilesVX\abodloc.exe
C:\FilesVX\abodloc.exe
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | 209.205.72.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 0.205.248.87.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 72.32.126.40.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 26.35.223.20.in-addr.arpa | udp |
| NL | 23.62.61.138:443 | www.bing.com | tcp |
| US | 8.8.8.8:53 | 138.61.62.23.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 232.168.11.51.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 157.123.68.40.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 171.39.242.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 150.144.22.2.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 172.210.232.199.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 21.236.111.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | tse1.mm.bing.net | udp |
| US | 204.79.197.200:443 | tse1.mm.bing.net | tcp |
| US | 204.79.197.200:443 | tse1.mm.bing.net | tcp |
| US | 8.8.8.8:53 | 55.36.223.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 200.197.79.204.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 18.173.189.20.in-addr.arpa | udp |
Files
C:\FilesVX\abodloc.exe
| MD5 | c3f3d354488910db575630159cd16dd0 |
| SHA1 | 7d6ef3fbea8cc7433bc0db39aca19aeb935af42e |
| SHA256 | 8de203729e2a57833bf547b5dd477c7e05b47037ee3656c8f2abc4a78d88b298 |
| SHA512 | 1d23bf981feef5eb1f611c20e5bce27ba2ad26dfa1f6c05d66191d124969eb09201cc9eea76e441a9dcaa9c47423690cd09354451e185052c675a5c3df72a508 |
C:\Users\Admin\253086396416_10.0_Admin.ini
| MD5 | 1bd13d10026e220f0b538a2d3cde7c55 |
| SHA1 | a446e0088ecbe9613dcabf0fe3f1d0faba56bd36 |
| SHA256 | 4cac00a1d9d16318e436fcec4bbab935509ccac6b116e2d2811c021038fa2b99 |
| SHA512 | a1117281569acc06b1aa5c84a7601a2784e5a5b6609d441d60dcefbc9900a1dc5d7528b30a3f6ea91d0558915e7246fe41d29ed92b03bbf29406f2dbedbe9f34 |
C:\MintQ3\optidevloc.exe
| MD5 | e5861cd542a4896de66d59b4db100eb0 |
| SHA1 | ff5ce80aa900da03518e7a5682b791885e76771c |
| SHA256 | c8955dd569ff3a19531163fbf8c5f1f992cfcd4ed4ff0b1c97b3ab2fba861454 |
| SHA512 | f9805a8a7090e6711d13e410d785b22e6225dd38e9d519db89d3c8ca96bdc89e03d7449a3bc0b4d197658c81e788877b5cb92bd02b5c597380456d84e3114a40 |