Analysis
-
max time kernel
150s -
max time network
103s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
01-06-2024 23:21
Static task
static1
Behavioral task
behavioral1
Sample
0a073d7189399abd1189662499ada240_NeikiAnalytics.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
0a073d7189399abd1189662499ada240_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
0a073d7189399abd1189662499ada240_NeikiAnalytics.exe
-
Size
53KB
-
MD5
0a073d7189399abd1189662499ada240
-
SHA1
aecf2fb9088831b75d6404f8c2193a5e77ef8353
-
SHA256
ea23c8330d44284148959b8e29474f3bb313a9c97f95db31b5b2a0308e0731c6
-
SHA512
f06152fe10d84ca70ff811af1ac76fc7495428d77d7f4dee41009f79057560fd5c559024aaf78671877c99111425dcb072aa1566da0b2a080518fa12c21c2433
-
SSDEEP
1536:vNSg8r8Q4QLBNz7Kp3StjEMjmLM3ztDJWZsXy4JzxPMk:5kBNzJJjmLM3zRJWZsXy4JN
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" kueleu.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation 0a073d7189399abd1189662499ada240_NeikiAnalytics.exe -
Executes dropped EXE 1 IoCs
pid Process 224 kueleu.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\kueleu = "C:\\Users\\Admin\\kueleu.exe" kueleu.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 224 kueleu.exe 224 kueleu.exe 224 kueleu.exe 224 kueleu.exe 224 kueleu.exe 224 kueleu.exe 224 kueleu.exe 224 kueleu.exe 224 kueleu.exe 224 kueleu.exe 224 kueleu.exe 224 kueleu.exe 224 kueleu.exe 224 kueleu.exe 224 kueleu.exe 224 kueleu.exe 224 kueleu.exe 224 kueleu.exe 224 kueleu.exe 224 kueleu.exe 224 kueleu.exe 224 kueleu.exe 224 kueleu.exe 224 kueleu.exe 224 kueleu.exe 224 kueleu.exe 224 kueleu.exe 224 kueleu.exe 224 kueleu.exe 224 kueleu.exe 224 kueleu.exe 224 kueleu.exe 224 kueleu.exe 224 kueleu.exe 224 kueleu.exe 224 kueleu.exe 224 kueleu.exe 224 kueleu.exe 224 kueleu.exe 224 kueleu.exe 224 kueleu.exe 224 kueleu.exe 224 kueleu.exe 224 kueleu.exe 224 kueleu.exe 224 kueleu.exe 224 kueleu.exe 224 kueleu.exe 224 kueleu.exe 224 kueleu.exe 224 kueleu.exe 224 kueleu.exe 224 kueleu.exe 224 kueleu.exe 224 kueleu.exe 224 kueleu.exe 224 kueleu.exe 224 kueleu.exe 224 kueleu.exe 224 kueleu.exe 224 kueleu.exe 224 kueleu.exe 224 kueleu.exe 224 kueleu.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 468 0a073d7189399abd1189662499ada240_NeikiAnalytics.exe 224 kueleu.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 468 wrote to memory of 224 468 0a073d7189399abd1189662499ada240_NeikiAnalytics.exe 86 PID 468 wrote to memory of 224 468 0a073d7189399abd1189662499ada240_NeikiAnalytics.exe 86 PID 468 wrote to memory of 224 468 0a073d7189399abd1189662499ada240_NeikiAnalytics.exe 86 PID 224 wrote to memory of 468 224 kueleu.exe 82 PID 224 wrote to memory of 468 224 kueleu.exe 82 PID 224 wrote to memory of 468 224 kueleu.exe 82 PID 224 wrote to memory of 468 224 kueleu.exe 82 PID 224 wrote to memory of 468 224 kueleu.exe 82 PID 224 wrote to memory of 468 224 kueleu.exe 82 PID 224 wrote to memory of 468 224 kueleu.exe 82 PID 224 wrote to memory of 468 224 kueleu.exe 82 PID 224 wrote to memory of 468 224 kueleu.exe 82 PID 224 wrote to memory of 468 224 kueleu.exe 82 PID 224 wrote to memory of 468 224 kueleu.exe 82 PID 224 wrote to memory of 468 224 kueleu.exe 82 PID 224 wrote to memory of 468 224 kueleu.exe 82 PID 224 wrote to memory of 468 224 kueleu.exe 82 PID 224 wrote to memory of 468 224 kueleu.exe 82 PID 224 wrote to memory of 468 224 kueleu.exe 82 PID 224 wrote to memory of 468 224 kueleu.exe 82 PID 224 wrote to memory of 468 224 kueleu.exe 82 PID 224 wrote to memory of 468 224 kueleu.exe 82 PID 224 wrote to memory of 468 224 kueleu.exe 82 PID 224 wrote to memory of 468 224 kueleu.exe 82 PID 224 wrote to memory of 468 224 kueleu.exe 82 PID 224 wrote to memory of 468 224 kueleu.exe 82 PID 224 wrote to memory of 468 224 kueleu.exe 82 PID 224 wrote to memory of 468 224 kueleu.exe 82 PID 224 wrote to memory of 468 224 kueleu.exe 82 PID 224 wrote to memory of 468 224 kueleu.exe 82 PID 224 wrote to memory of 468 224 kueleu.exe 82 PID 224 wrote to memory of 468 224 kueleu.exe 82 PID 224 wrote to memory of 468 224 kueleu.exe 82 PID 224 wrote to memory of 468 224 kueleu.exe 82 PID 224 wrote to memory of 468 224 kueleu.exe 82 PID 224 wrote to memory of 468 224 kueleu.exe 82 PID 224 wrote to memory of 468 224 kueleu.exe 82 PID 224 wrote to memory of 468 224 kueleu.exe 82 PID 224 wrote to memory of 468 224 kueleu.exe 82 PID 224 wrote to memory of 468 224 kueleu.exe 82 PID 224 wrote to memory of 468 224 kueleu.exe 82 PID 224 wrote to memory of 468 224 kueleu.exe 82 PID 224 wrote to memory of 468 224 kueleu.exe 82 PID 224 wrote to memory of 468 224 kueleu.exe 82 PID 224 wrote to memory of 468 224 kueleu.exe 82 PID 224 wrote to memory of 468 224 kueleu.exe 82 PID 224 wrote to memory of 468 224 kueleu.exe 82 PID 224 wrote to memory of 468 224 kueleu.exe 82 PID 224 wrote to memory of 468 224 kueleu.exe 82 PID 224 wrote to memory of 468 224 kueleu.exe 82 PID 224 wrote to memory of 468 224 kueleu.exe 82 PID 224 wrote to memory of 468 224 kueleu.exe 82 PID 224 wrote to memory of 468 224 kueleu.exe 82 PID 224 wrote to memory of 468 224 kueleu.exe 82 PID 224 wrote to memory of 468 224 kueleu.exe 82 PID 224 wrote to memory of 468 224 kueleu.exe 82 PID 224 wrote to memory of 468 224 kueleu.exe 82 PID 224 wrote to memory of 468 224 kueleu.exe 82 PID 224 wrote to memory of 468 224 kueleu.exe 82 PID 224 wrote to memory of 468 224 kueleu.exe 82 PID 224 wrote to memory of 468 224 kueleu.exe 82 PID 224 wrote to memory of 468 224 kueleu.exe 82 PID 224 wrote to memory of 468 224 kueleu.exe 82 PID 224 wrote to memory of 468 224 kueleu.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\0a073d7189399abd1189662499ada240_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\0a073d7189399abd1189662499ada240_NeikiAnalytics.exe"1⤵
- Checks computer location settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:468 -
C:\Users\Admin\kueleu.exe"C:\Users\Admin\kueleu.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:224
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
53KB
MD507ba9baf6c3e87618bb183148641ef9d
SHA10b19428e7115679e7557a92222575248e7255aa7
SHA256a427ee28c8f9f48ded36713c8b718f8e758e37ea220c64f684fa21a2ca260117
SHA5121ae66d8bf4ec7de1aaf2c83144e5c5c9a549f582d9fa22b59e0c10f41cb344717a2126a7f9e8a8caf68c378c65d36b8865dc2ed860fe4e7e9a926ffb91b5b35f