Analysis
-
max time kernel
150s -
max time network
97s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
30/05/2024, 02:13
Static task
static1
Behavioral task
behavioral1
Sample
5ffe7a06d4cc9d586ca467352ba33bd0_NeikiAnalytics.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
5ffe7a06d4cc9d586ca467352ba33bd0_NeikiAnalytics.exe
Resource
win10v2004-20240426-en
General
-
Target
5ffe7a06d4cc9d586ca467352ba33bd0_NeikiAnalytics.exe
-
Size
135KB
-
MD5
5ffe7a06d4cc9d586ca467352ba33bd0
-
SHA1
801949e50eace50cb6597cf2035116ec465ddac2
-
SHA256
73d5a2ebd786528030509ecf9c9035f88296828483a53cef4272450e90c00246
-
SHA512
25623e5a62a6384aaaee91f7695156f1d8dc4c70539c7a1992ee95fa0dfee180d78c4d4e06edea02bd393fc2d101da4cb3614865b2a03f863a8beadd527890b4
-
SSDEEP
1536:4fsEqouTRcG/Mzvgf7xEuvnXNTRdUzwTekUOisZ1yDDajtXbVwRH:4VqoCl/YgjxEufVU0TbTyDDalu9
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" svchost.exe -
Executes dropped EXE 4 IoCs
pid Process 1132 explorer.exe 3168 spoolsv.exe 2572 svchost.exe 1332 spoolsv.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\resources\\themes\\explorer.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\resources\\svchost.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\resources\\themes\\explorer.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\resources\\svchost.exe RO" svchost.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\explorer.exe explorer.exe File opened for modification C:\Windows\SysWOW64\explorer.exe svchost.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification \??\c:\windows\resources\svchost.exe spoolsv.exe File opened for modification C:\Windows\Resources\tjud.exe explorer.exe File opened for modification \??\c:\windows\resources\themes\explorer.exe 5ffe7a06d4cc9d586ca467352ba33bd0_NeikiAnalytics.exe File opened for modification \??\c:\windows\resources\spoolsv.exe explorer.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 812 5ffe7a06d4cc9d586ca467352ba33bd0_NeikiAnalytics.exe 812 5ffe7a06d4cc9d586ca467352ba33bd0_NeikiAnalytics.exe 812 5ffe7a06d4cc9d586ca467352ba33bd0_NeikiAnalytics.exe 812 5ffe7a06d4cc9d586ca467352ba33bd0_NeikiAnalytics.exe 812 5ffe7a06d4cc9d586ca467352ba33bd0_NeikiAnalytics.exe 812 5ffe7a06d4cc9d586ca467352ba33bd0_NeikiAnalytics.exe 812 5ffe7a06d4cc9d586ca467352ba33bd0_NeikiAnalytics.exe 812 5ffe7a06d4cc9d586ca467352ba33bd0_NeikiAnalytics.exe 812 5ffe7a06d4cc9d586ca467352ba33bd0_NeikiAnalytics.exe 812 5ffe7a06d4cc9d586ca467352ba33bd0_NeikiAnalytics.exe 812 5ffe7a06d4cc9d586ca467352ba33bd0_NeikiAnalytics.exe 812 5ffe7a06d4cc9d586ca467352ba33bd0_NeikiAnalytics.exe 812 5ffe7a06d4cc9d586ca467352ba33bd0_NeikiAnalytics.exe 812 5ffe7a06d4cc9d586ca467352ba33bd0_NeikiAnalytics.exe 812 5ffe7a06d4cc9d586ca467352ba33bd0_NeikiAnalytics.exe 812 5ffe7a06d4cc9d586ca467352ba33bd0_NeikiAnalytics.exe 812 5ffe7a06d4cc9d586ca467352ba33bd0_NeikiAnalytics.exe 812 5ffe7a06d4cc9d586ca467352ba33bd0_NeikiAnalytics.exe 812 5ffe7a06d4cc9d586ca467352ba33bd0_NeikiAnalytics.exe 812 5ffe7a06d4cc9d586ca467352ba33bd0_NeikiAnalytics.exe 812 5ffe7a06d4cc9d586ca467352ba33bd0_NeikiAnalytics.exe 812 5ffe7a06d4cc9d586ca467352ba33bd0_NeikiAnalytics.exe 812 5ffe7a06d4cc9d586ca467352ba33bd0_NeikiAnalytics.exe 812 5ffe7a06d4cc9d586ca467352ba33bd0_NeikiAnalytics.exe 812 5ffe7a06d4cc9d586ca467352ba33bd0_NeikiAnalytics.exe 812 5ffe7a06d4cc9d586ca467352ba33bd0_NeikiAnalytics.exe 812 5ffe7a06d4cc9d586ca467352ba33bd0_NeikiAnalytics.exe 812 5ffe7a06d4cc9d586ca467352ba33bd0_NeikiAnalytics.exe 812 5ffe7a06d4cc9d586ca467352ba33bd0_NeikiAnalytics.exe 812 5ffe7a06d4cc9d586ca467352ba33bd0_NeikiAnalytics.exe 812 5ffe7a06d4cc9d586ca467352ba33bd0_NeikiAnalytics.exe 812 5ffe7a06d4cc9d586ca467352ba33bd0_NeikiAnalytics.exe 812 5ffe7a06d4cc9d586ca467352ba33bd0_NeikiAnalytics.exe 812 5ffe7a06d4cc9d586ca467352ba33bd0_NeikiAnalytics.exe 1132 explorer.exe 1132 explorer.exe 1132 explorer.exe 1132 explorer.exe 1132 explorer.exe 1132 explorer.exe 1132 explorer.exe 1132 explorer.exe 1132 explorer.exe 1132 explorer.exe 1132 explorer.exe 1132 explorer.exe 1132 explorer.exe 1132 explorer.exe 1132 explorer.exe 1132 explorer.exe 1132 explorer.exe 1132 explorer.exe 1132 explorer.exe 1132 explorer.exe 1132 explorer.exe 1132 explorer.exe 1132 explorer.exe 1132 explorer.exe 1132 explorer.exe 1132 explorer.exe 1132 explorer.exe 1132 explorer.exe 1132 explorer.exe 1132 explorer.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 1132 explorer.exe 2572 svchost.exe -
Suspicious use of SetWindowsHookEx 10 IoCs
pid Process 812 5ffe7a06d4cc9d586ca467352ba33bd0_NeikiAnalytics.exe 812 5ffe7a06d4cc9d586ca467352ba33bd0_NeikiAnalytics.exe 1132 explorer.exe 1132 explorer.exe 3168 spoolsv.exe 3168 spoolsv.exe 2572 svchost.exe 2572 svchost.exe 1332 spoolsv.exe 1332 spoolsv.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 812 wrote to memory of 1132 812 5ffe7a06d4cc9d586ca467352ba33bd0_NeikiAnalytics.exe 83 PID 812 wrote to memory of 1132 812 5ffe7a06d4cc9d586ca467352ba33bd0_NeikiAnalytics.exe 83 PID 812 wrote to memory of 1132 812 5ffe7a06d4cc9d586ca467352ba33bd0_NeikiAnalytics.exe 83 PID 1132 wrote to memory of 3168 1132 explorer.exe 84 PID 1132 wrote to memory of 3168 1132 explorer.exe 84 PID 1132 wrote to memory of 3168 1132 explorer.exe 84 PID 3168 wrote to memory of 2572 3168 spoolsv.exe 85 PID 3168 wrote to memory of 2572 3168 spoolsv.exe 85 PID 3168 wrote to memory of 2572 3168 spoolsv.exe 85 PID 2572 wrote to memory of 1332 2572 svchost.exe 86 PID 2572 wrote to memory of 1332 2572 svchost.exe 86 PID 2572 wrote to memory of 1332 2572 svchost.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\5ffe7a06d4cc9d586ca467352ba33bd0_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\5ffe7a06d4cc9d586ca467352ba33bd0_NeikiAnalytics.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:812 -
\??\c:\windows\resources\themes\explorer.exec:\windows\resources\themes\explorer.exe2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1132 -
\??\c:\windows\resources\spoolsv.exec:\windows\resources\spoolsv.exe SE3⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3168 -
\??\c:\windows\resources\svchost.exec:\windows\resources\svchost.exe4⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2572 -
\??\c:\windows\resources\spoolsv.exec:\windows\resources\spoolsv.exe PR5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1332
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
135KB
MD5e0b7be040f6baf7c5d42763836f15583
SHA1a3a5eb0efe4b21b0a109abc25d87338d67e27fad
SHA2563aea04b4413e0018c1a0c171153acf4ead1e00cb64ac8d8507636716deb4487e
SHA5122ce8a6337b5f5507b4960b350dae29bd7a0438c8ec62a3a30907e8074b8778e8f9603f653cc2b339be7d43b29622fb4909996a853bf1721d877a2ae622e4031a
-
Filesize
135KB
MD5dd96bd4a6c84179bea6f9aca06a20e14
SHA1515e310633c02bd5b2da51729f026fa09a3edcde
SHA256d8302ee3e96cba30e8237563ad6396d169cb4b123f6041a4a8a2242ec29b5446
SHA5127a7b7f8fb33a3dca9022447d47f90ac7a0f7648d944e0f1dd81185d430e75ec320bc2e56466f8b75d2891137121e174d8ce42184baebdd29312baae3e1cd3d3d
-
Filesize
135KB
MD5aee5fc384f3999729a22337e828f2806
SHA15e9156bfe163f00690b703149452f56ed173aaf8
SHA256476a84997ebfae55d4989e75dee03fac3de5594a440dd0a67e4ddbd471facd94
SHA512710d0946a01cbffc429e99dbb46e38df6f0c2a1c0a2e4c0b6bbe69eb07cfb1c6c1789a4c7415c70079daa42a32f64461409b63af49b5a77403adf7c8bd477588