Analysis
-
max time kernel
150s -
max time network
104s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
29-05-2024 13:17
Static task
static1
Behavioral task
behavioral1
Sample
5576b41ef97652d384a05521c3940630_NeikiAnalytics.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
5576b41ef97652d384a05521c3940630_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
5576b41ef97652d384a05521c3940630_NeikiAnalytics.exe
-
Size
53KB
-
MD5
5576b41ef97652d384a05521c3940630
-
SHA1
b63da298a7ad201beaab8812f97cdc7e884af58d
-
SHA256
3d1d844f18883245c98fbf9802762d9a3090912f774ba124b475c35edb46fba3
-
SHA512
2b7926474877d3cd295c9df5b345bcb51ebd8e979fc224f2483b718217d16ee096b9095010d880b0ba89c93b0052b71ceae11c5be9e0607e28ec306fc5904b6c
-
SSDEEP
1536:vNRg8r8QFghki7Kp3StjEMjmLM3ztDJWZsXy4JzxPME:VghkiJJjmLM3zRJWZsXy4Jt
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" vaeuf.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation 5576b41ef97652d384a05521c3940630_NeikiAnalytics.exe -
Executes dropped EXE 1 IoCs
pid Process 4532 vaeuf.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vaeuf = "C:\\Users\\Admin\\vaeuf.exe" vaeuf.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4532 vaeuf.exe 4532 vaeuf.exe 4532 vaeuf.exe 4532 vaeuf.exe 4532 vaeuf.exe 4532 vaeuf.exe 4532 vaeuf.exe 4532 vaeuf.exe 4532 vaeuf.exe 4532 vaeuf.exe 4532 vaeuf.exe 4532 vaeuf.exe 4532 vaeuf.exe 4532 vaeuf.exe 4532 vaeuf.exe 4532 vaeuf.exe 4532 vaeuf.exe 4532 vaeuf.exe 4532 vaeuf.exe 4532 vaeuf.exe 4532 vaeuf.exe 4532 vaeuf.exe 4532 vaeuf.exe 4532 vaeuf.exe 4532 vaeuf.exe 4532 vaeuf.exe 4532 vaeuf.exe 4532 vaeuf.exe 4532 vaeuf.exe 4532 vaeuf.exe 4532 vaeuf.exe 4532 vaeuf.exe 4532 vaeuf.exe 4532 vaeuf.exe 4532 vaeuf.exe 4532 vaeuf.exe 4532 vaeuf.exe 4532 vaeuf.exe 4532 vaeuf.exe 4532 vaeuf.exe 4532 vaeuf.exe 4532 vaeuf.exe 4532 vaeuf.exe 4532 vaeuf.exe 4532 vaeuf.exe 4532 vaeuf.exe 4532 vaeuf.exe 4532 vaeuf.exe 4532 vaeuf.exe 4532 vaeuf.exe 4532 vaeuf.exe 4532 vaeuf.exe 4532 vaeuf.exe 4532 vaeuf.exe 4532 vaeuf.exe 4532 vaeuf.exe 4532 vaeuf.exe 4532 vaeuf.exe 4532 vaeuf.exe 4532 vaeuf.exe 4532 vaeuf.exe 4532 vaeuf.exe 4532 vaeuf.exe 4532 vaeuf.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 3152 5576b41ef97652d384a05521c3940630_NeikiAnalytics.exe 4532 vaeuf.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3152 wrote to memory of 4532 3152 5576b41ef97652d384a05521c3940630_NeikiAnalytics.exe 86 PID 3152 wrote to memory of 4532 3152 5576b41ef97652d384a05521c3940630_NeikiAnalytics.exe 86 PID 3152 wrote to memory of 4532 3152 5576b41ef97652d384a05521c3940630_NeikiAnalytics.exe 86 PID 4532 wrote to memory of 3152 4532 vaeuf.exe 82 PID 4532 wrote to memory of 3152 4532 vaeuf.exe 82 PID 4532 wrote to memory of 3152 4532 vaeuf.exe 82 PID 4532 wrote to memory of 3152 4532 vaeuf.exe 82 PID 4532 wrote to memory of 3152 4532 vaeuf.exe 82 PID 4532 wrote to memory of 3152 4532 vaeuf.exe 82 PID 4532 wrote to memory of 3152 4532 vaeuf.exe 82 PID 4532 wrote to memory of 3152 4532 vaeuf.exe 82 PID 4532 wrote to memory of 3152 4532 vaeuf.exe 82 PID 4532 wrote to memory of 3152 4532 vaeuf.exe 82 PID 4532 wrote to memory of 3152 4532 vaeuf.exe 82 PID 4532 wrote to memory of 3152 4532 vaeuf.exe 82 PID 4532 wrote to memory of 3152 4532 vaeuf.exe 82 PID 4532 wrote to memory of 3152 4532 vaeuf.exe 82 PID 4532 wrote to memory of 3152 4532 vaeuf.exe 82 PID 4532 wrote to memory of 3152 4532 vaeuf.exe 82 PID 4532 wrote to memory of 3152 4532 vaeuf.exe 82 PID 4532 wrote to memory of 3152 4532 vaeuf.exe 82 PID 4532 wrote to memory of 3152 4532 vaeuf.exe 82 PID 4532 wrote to memory of 3152 4532 vaeuf.exe 82 PID 4532 wrote to memory of 3152 4532 vaeuf.exe 82 PID 4532 wrote to memory of 3152 4532 vaeuf.exe 82 PID 4532 wrote to memory of 3152 4532 vaeuf.exe 82 PID 4532 wrote to memory of 3152 4532 vaeuf.exe 82 PID 4532 wrote to memory of 3152 4532 vaeuf.exe 82 PID 4532 wrote to memory of 3152 4532 vaeuf.exe 82 PID 4532 wrote to memory of 3152 4532 vaeuf.exe 82 PID 4532 wrote to memory of 3152 4532 vaeuf.exe 82 PID 4532 wrote to memory of 3152 4532 vaeuf.exe 82 PID 4532 wrote to memory of 3152 4532 vaeuf.exe 82 PID 4532 wrote to memory of 3152 4532 vaeuf.exe 82 PID 4532 wrote to memory of 3152 4532 vaeuf.exe 82 PID 4532 wrote to memory of 3152 4532 vaeuf.exe 82 PID 4532 wrote to memory of 3152 4532 vaeuf.exe 82 PID 4532 wrote to memory of 3152 4532 vaeuf.exe 82 PID 4532 wrote to memory of 3152 4532 vaeuf.exe 82 PID 4532 wrote to memory of 3152 4532 vaeuf.exe 82 PID 4532 wrote to memory of 3152 4532 vaeuf.exe 82 PID 4532 wrote to memory of 3152 4532 vaeuf.exe 82 PID 4532 wrote to memory of 3152 4532 vaeuf.exe 82 PID 4532 wrote to memory of 3152 4532 vaeuf.exe 82 PID 4532 wrote to memory of 3152 4532 vaeuf.exe 82 PID 4532 wrote to memory of 3152 4532 vaeuf.exe 82 PID 4532 wrote to memory of 3152 4532 vaeuf.exe 82 PID 4532 wrote to memory of 3152 4532 vaeuf.exe 82 PID 4532 wrote to memory of 3152 4532 vaeuf.exe 82 PID 4532 wrote to memory of 3152 4532 vaeuf.exe 82 PID 4532 wrote to memory of 3152 4532 vaeuf.exe 82 PID 4532 wrote to memory of 3152 4532 vaeuf.exe 82 PID 4532 wrote to memory of 3152 4532 vaeuf.exe 82 PID 4532 wrote to memory of 3152 4532 vaeuf.exe 82 PID 4532 wrote to memory of 3152 4532 vaeuf.exe 82 PID 4532 wrote to memory of 3152 4532 vaeuf.exe 82 PID 4532 wrote to memory of 3152 4532 vaeuf.exe 82 PID 4532 wrote to memory of 3152 4532 vaeuf.exe 82 PID 4532 wrote to memory of 3152 4532 vaeuf.exe 82 PID 4532 wrote to memory of 3152 4532 vaeuf.exe 82 PID 4532 wrote to memory of 3152 4532 vaeuf.exe 82 PID 4532 wrote to memory of 3152 4532 vaeuf.exe 82 PID 4532 wrote to memory of 3152 4532 vaeuf.exe 82 PID 4532 wrote to memory of 3152 4532 vaeuf.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\5576b41ef97652d384a05521c3940630_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\5576b41ef97652d384a05521c3940630_NeikiAnalytics.exe"1⤵
- Checks computer location settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3152 -
C:\Users\Admin\vaeuf.exe"C:\Users\Admin\vaeuf.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4532
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
53KB
MD53b8ec4e9bc5d94f799113f7e54ae99f5
SHA13018636707e4e5f70c016e131551afd18cdbcdb4
SHA2563111f139e83ba8d045133fad2c77db3138c08eefbde842a5f9feec19cb086ea7
SHA5126c36478086ea53dcbc87ffef372d34412f08bc92bdb2bc823b834ef4f274f4229d2ac38e8aa435bdc0271a2f8618b3047810f5a811722d29b19ce445aa33cb48