Analysis
-
max time kernel
149s -
max time network
123s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
01/06/2024, 08:29
Static task
static1
Behavioral task
behavioral1
Sample
947448ca3511110fa5ef54066118a070_NeikiAnalytics.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
947448ca3511110fa5ef54066118a070_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
947448ca3511110fa5ef54066118a070_NeikiAnalytics.exe
-
Size
208KB
-
MD5
947448ca3511110fa5ef54066118a070
-
SHA1
a14c33932c68776e29a6544bc979c10e0880a915
-
SHA256
a30428c1f0a83b7e055e43a1bd107103367680cc0a1f8cbdd4babae9c54361c2
-
SHA512
95b33d72a1fa8b38e76f5359560a4928766e639b688806bb556780e5411f74775d6b0a891cb449fed4dd2733dd4cf4db256dd8ac59481150bcd6bb7b2ebba221
-
SSDEEP
3072:puta3pTWor5J20AisM/8jp6tdlWbRVslWQifgO4F0llD:pjTWqJ3RsM/8E/IbRuLifI0l
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 947448ca3511110fa5ef54066118a070_NeikiAnalytics.exe Set value (int) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" yianuuf.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation 947448ca3511110fa5ef54066118a070_NeikiAnalytics.exe -
Executes dropped EXE 1 IoCs
pid Process 3088 yianuuf.exe -
Adds Run key to start application 2 TTPs 53 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yianuuf = "C:\\Users\\Admin\\yianuuf.exe /U" yianuuf.exe Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yianuuf = "C:\\Users\\Admin\\yianuuf.exe /a" yianuuf.exe Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yianuuf = "C:\\Users\\Admin\\yianuuf.exe /D" yianuuf.exe Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yianuuf = "C:\\Users\\Admin\\yianuuf.exe /e" yianuuf.exe Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yianuuf = "C:\\Users\\Admin\\yianuuf.exe /t" yianuuf.exe Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yianuuf = "C:\\Users\\Admin\\yianuuf.exe /h" yianuuf.exe Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yianuuf = "C:\\Users\\Admin\\yianuuf.exe /Z" yianuuf.exe Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yianuuf = "C:\\Users\\Admin\\yianuuf.exe /R" yianuuf.exe Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yianuuf = "C:\\Users\\Admin\\yianuuf.exe /j" yianuuf.exe Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yianuuf = "C:\\Users\\Admin\\yianuuf.exe /i" yianuuf.exe Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yianuuf = "C:\\Users\\Admin\\yianuuf.exe /N" yianuuf.exe Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yianuuf = "C:\\Users\\Admin\\yianuuf.exe /W" yianuuf.exe Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yianuuf = "C:\\Users\\Admin\\yianuuf.exe /F" yianuuf.exe Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yianuuf = "C:\\Users\\Admin\\yianuuf.exe /p" yianuuf.exe Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yianuuf = "C:\\Users\\Admin\\yianuuf.exe /J" yianuuf.exe Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yianuuf = "C:\\Users\\Admin\\yianuuf.exe /P" yianuuf.exe Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yianuuf = "C:\\Users\\Admin\\yianuuf.exe /T" yianuuf.exe Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yianuuf = "C:\\Users\\Admin\\yianuuf.exe /o" yianuuf.exe Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yianuuf = "C:\\Users\\Admin\\yianuuf.exe /Q" yianuuf.exe Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yianuuf = "C:\\Users\\Admin\\yianuuf.exe /K" yianuuf.exe Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yianuuf = "C:\\Users\\Admin\\yianuuf.exe /A" yianuuf.exe Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yianuuf = "C:\\Users\\Admin\\yianuuf.exe /V" yianuuf.exe Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yianuuf = "C:\\Users\\Admin\\yianuuf.exe /X" yianuuf.exe Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yianuuf = "C:\\Users\\Admin\\yianuuf.exe /l" yianuuf.exe Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yianuuf = "C:\\Users\\Admin\\yianuuf.exe /G" yianuuf.exe Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yianuuf = "C:\\Users\\Admin\\yianuuf.exe /E" yianuuf.exe Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yianuuf = "C:\\Users\\Admin\\yianuuf.exe /m" yianuuf.exe Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yianuuf = "C:\\Users\\Admin\\yianuuf.exe /H" yianuuf.exe Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yianuuf = "C:\\Users\\Admin\\yianuuf.exe /q" yianuuf.exe Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yianuuf = "C:\\Users\\Admin\\yianuuf.exe /y" yianuuf.exe Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yianuuf = "C:\\Users\\Admin\\yianuuf.exe /d" yianuuf.exe Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yianuuf = "C:\\Users\\Admin\\yianuuf.exe /c" yianuuf.exe Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yianuuf = "C:\\Users\\Admin\\yianuuf.exe /s" yianuuf.exe Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yianuuf = "C:\\Users\\Admin\\yianuuf.exe /C" yianuuf.exe Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yianuuf = "C:\\Users\\Admin\\yianuuf.exe /z" yianuuf.exe Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yianuuf = "C:\\Users\\Admin\\yianuuf.exe /x" yianuuf.exe Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yianuuf = "C:\\Users\\Admin\\yianuuf.exe /I" yianuuf.exe Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yianuuf = "C:\\Users\\Admin\\yianuuf.exe /v" yianuuf.exe Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yianuuf = "C:\\Users\\Admin\\yianuuf.exe /S" yianuuf.exe Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yianuuf = "C:\\Users\\Admin\\yianuuf.exe /b" yianuuf.exe Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yianuuf = "C:\\Users\\Admin\\yianuuf.exe /r" yianuuf.exe Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yianuuf = "C:\\Users\\Admin\\yianuuf.exe /Z" 947448ca3511110fa5ef54066118a070_NeikiAnalytics.exe Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yianuuf = "C:\\Users\\Admin\\yianuuf.exe /w" yianuuf.exe Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yianuuf = "C:\\Users\\Admin\\yianuuf.exe /u" yianuuf.exe Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yianuuf = "C:\\Users\\Admin\\yianuuf.exe /B" yianuuf.exe Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yianuuf = "C:\\Users\\Admin\\yianuuf.exe /g" yianuuf.exe Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yianuuf = "C:\\Users\\Admin\\yianuuf.exe /M" yianuuf.exe Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yianuuf = "C:\\Users\\Admin\\yianuuf.exe /n" yianuuf.exe Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yianuuf = "C:\\Users\\Admin\\yianuuf.exe /L" yianuuf.exe Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yianuuf = "C:\\Users\\Admin\\yianuuf.exe /O" yianuuf.exe Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yianuuf = "C:\\Users\\Admin\\yianuuf.exe /Y" yianuuf.exe Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yianuuf = "C:\\Users\\Admin\\yianuuf.exe /f" yianuuf.exe Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yianuuf = "C:\\Users\\Admin\\yianuuf.exe /k" yianuuf.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2648 947448ca3511110fa5ef54066118a070_NeikiAnalytics.exe 2648 947448ca3511110fa5ef54066118a070_NeikiAnalytics.exe 3088 yianuuf.exe 3088 yianuuf.exe 3088 yianuuf.exe 3088 yianuuf.exe 3088 yianuuf.exe 3088 yianuuf.exe 3088 yianuuf.exe 3088 yianuuf.exe 3088 yianuuf.exe 3088 yianuuf.exe 3088 yianuuf.exe 3088 yianuuf.exe 3088 yianuuf.exe 3088 yianuuf.exe 3088 yianuuf.exe 3088 yianuuf.exe 3088 yianuuf.exe 3088 yianuuf.exe 3088 yianuuf.exe 3088 yianuuf.exe 3088 yianuuf.exe 3088 yianuuf.exe 3088 yianuuf.exe 3088 yianuuf.exe 3088 yianuuf.exe 3088 yianuuf.exe 3088 yianuuf.exe 3088 yianuuf.exe 3088 yianuuf.exe 3088 yianuuf.exe 3088 yianuuf.exe 3088 yianuuf.exe 3088 yianuuf.exe 3088 yianuuf.exe 3088 yianuuf.exe 3088 yianuuf.exe 3088 yianuuf.exe 3088 yianuuf.exe 3088 yianuuf.exe 3088 yianuuf.exe 3088 yianuuf.exe 3088 yianuuf.exe 3088 yianuuf.exe 3088 yianuuf.exe 3088 yianuuf.exe 3088 yianuuf.exe 3088 yianuuf.exe 3088 yianuuf.exe 3088 yianuuf.exe 3088 yianuuf.exe 3088 yianuuf.exe 3088 yianuuf.exe 3088 yianuuf.exe 3088 yianuuf.exe 3088 yianuuf.exe 3088 yianuuf.exe 3088 yianuuf.exe 3088 yianuuf.exe 3088 yianuuf.exe 3088 yianuuf.exe 3088 yianuuf.exe 3088 yianuuf.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2648 947448ca3511110fa5ef54066118a070_NeikiAnalytics.exe 3088 yianuuf.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2648 wrote to memory of 3088 2648 947448ca3511110fa5ef54066118a070_NeikiAnalytics.exe 92 PID 2648 wrote to memory of 3088 2648 947448ca3511110fa5ef54066118a070_NeikiAnalytics.exe 92 PID 2648 wrote to memory of 3088 2648 947448ca3511110fa5ef54066118a070_NeikiAnalytics.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\947448ca3511110fa5ef54066118a070_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\947448ca3511110fa5ef54066118a070_NeikiAnalytics.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2648 -
C:\Users\Admin\yianuuf.exe"C:\Users\Admin\yianuuf.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3088
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
208KB
MD5ebebde2887c5284b49fe36896edea6c5
SHA14391babf213c6253425ce043117cd3b59b71388f
SHA256f611f1cbcb6df8da120f4b7859b1ad0a7da3357e666b0b0495bb52eb099f6ca9
SHA512c44a890ad562473a15eca4d0cb4e6ad217f9fa0d594900c7c0d0c3220c1fba366e46468e29820dd56f7ebe7332336da64b3e436eef44b455e5c17db3923ba038