Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
02-06-2024 23:59
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
876e49b613d310c5baa54d2d34cd3310_NeikiAnalytics.exe
Resource
win7-20240221-en
windows7-x64
7 signatures
150 seconds
General
-
Target
876e49b613d310c5baa54d2d34cd3310_NeikiAnalytics.exe
-
Size
738KB
-
MD5
876e49b613d310c5baa54d2d34cd3310
-
SHA1
3d36a7a7c7b4d33cbee9b1be54259402f946f647
-
SHA256
3a4fe35c90570acb2c803f43898a1c71735df5a07fbdf74f559ce7613e059896
-
SHA512
dcf53630a3fc8bdce0d066876c2727997bcfac3473110b19269625342527d771263e8499b0e305e4d1ad8a9a45f5a6f1008ffa97f3a7c6a2469bbaf1b902dd88
-
SSDEEP
12288:4aZPDEl82QMUB09HS/WkKaMNAJ8yTDfaGnAEEB9hFkHT1sUbTPi:lAlMMUBAH01MN28gyGneB9hFkHT1sU6
Malware Config
Signatures
-
Launches sc.exe 2 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 3296 sc.exe 3452 sc.exe -
Kills process with taskkill 10 IoCs
pid Process 1532 taskkill.exe 2960 taskkill.exe 4800 taskkill.exe 4808 taskkill.exe 1640 taskkill.exe 4716 taskkill.exe 588 taskkill.exe 908 taskkill.exe 3264 taskkill.exe 2056 taskkill.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2664 876e49b613d310c5baa54d2d34cd3310_NeikiAnalytics.exe 2664 876e49b613d310c5baa54d2d34cd3310_NeikiAnalytics.exe 2664 876e49b613d310c5baa54d2d34cd3310_NeikiAnalytics.exe 2664 876e49b613d310c5baa54d2d34cd3310_NeikiAnalytics.exe 2664 876e49b613d310c5baa54d2d34cd3310_NeikiAnalytics.exe 2664 876e49b613d310c5baa54d2d34cd3310_NeikiAnalytics.exe 2664 876e49b613d310c5baa54d2d34cd3310_NeikiAnalytics.exe 2664 876e49b613d310c5baa54d2d34cd3310_NeikiAnalytics.exe 2664 876e49b613d310c5baa54d2d34cd3310_NeikiAnalytics.exe 2664 876e49b613d310c5baa54d2d34cd3310_NeikiAnalytics.exe 2664 876e49b613d310c5baa54d2d34cd3310_NeikiAnalytics.exe 2664 876e49b613d310c5baa54d2d34cd3310_NeikiAnalytics.exe 2664 876e49b613d310c5baa54d2d34cd3310_NeikiAnalytics.exe 2664 876e49b613d310c5baa54d2d34cd3310_NeikiAnalytics.exe 2664 876e49b613d310c5baa54d2d34cd3310_NeikiAnalytics.exe 2664 876e49b613d310c5baa54d2d34cd3310_NeikiAnalytics.exe 2664 876e49b613d310c5baa54d2d34cd3310_NeikiAnalytics.exe 2664 876e49b613d310c5baa54d2d34cd3310_NeikiAnalytics.exe 2664 876e49b613d310c5baa54d2d34cd3310_NeikiAnalytics.exe 2664 876e49b613d310c5baa54d2d34cd3310_NeikiAnalytics.exe 2664 876e49b613d310c5baa54d2d34cd3310_NeikiAnalytics.exe 2664 876e49b613d310c5baa54d2d34cd3310_NeikiAnalytics.exe 2664 876e49b613d310c5baa54d2d34cd3310_NeikiAnalytics.exe 2664 876e49b613d310c5baa54d2d34cd3310_NeikiAnalytics.exe 2664 876e49b613d310c5baa54d2d34cd3310_NeikiAnalytics.exe 2664 876e49b613d310c5baa54d2d34cd3310_NeikiAnalytics.exe 2664 876e49b613d310c5baa54d2d34cd3310_NeikiAnalytics.exe 2664 876e49b613d310c5baa54d2d34cd3310_NeikiAnalytics.exe 2664 876e49b613d310c5baa54d2d34cd3310_NeikiAnalytics.exe 2664 876e49b613d310c5baa54d2d34cd3310_NeikiAnalytics.exe 2664 876e49b613d310c5baa54d2d34cd3310_NeikiAnalytics.exe 2664 876e49b613d310c5baa54d2d34cd3310_NeikiAnalytics.exe 2664 876e49b613d310c5baa54d2d34cd3310_NeikiAnalytics.exe 2664 876e49b613d310c5baa54d2d34cd3310_NeikiAnalytics.exe 2664 876e49b613d310c5baa54d2d34cd3310_NeikiAnalytics.exe 2664 876e49b613d310c5baa54d2d34cd3310_NeikiAnalytics.exe 2664 876e49b613d310c5baa54d2d34cd3310_NeikiAnalytics.exe 2664 876e49b613d310c5baa54d2d34cd3310_NeikiAnalytics.exe 2664 876e49b613d310c5baa54d2d34cd3310_NeikiAnalytics.exe 2664 876e49b613d310c5baa54d2d34cd3310_NeikiAnalytics.exe 2664 876e49b613d310c5baa54d2d34cd3310_NeikiAnalytics.exe 2664 876e49b613d310c5baa54d2d34cd3310_NeikiAnalytics.exe 2664 876e49b613d310c5baa54d2d34cd3310_NeikiAnalytics.exe 2664 876e49b613d310c5baa54d2d34cd3310_NeikiAnalytics.exe 2664 876e49b613d310c5baa54d2d34cd3310_NeikiAnalytics.exe 2664 876e49b613d310c5baa54d2d34cd3310_NeikiAnalytics.exe 2664 876e49b613d310c5baa54d2d34cd3310_NeikiAnalytics.exe 2664 876e49b613d310c5baa54d2d34cd3310_NeikiAnalytics.exe 2664 876e49b613d310c5baa54d2d34cd3310_NeikiAnalytics.exe 2664 876e49b613d310c5baa54d2d34cd3310_NeikiAnalytics.exe 2664 876e49b613d310c5baa54d2d34cd3310_NeikiAnalytics.exe 2664 876e49b613d310c5baa54d2d34cd3310_NeikiAnalytics.exe 2664 876e49b613d310c5baa54d2d34cd3310_NeikiAnalytics.exe 2664 876e49b613d310c5baa54d2d34cd3310_NeikiAnalytics.exe 2664 876e49b613d310c5baa54d2d34cd3310_NeikiAnalytics.exe 2664 876e49b613d310c5baa54d2d34cd3310_NeikiAnalytics.exe 2664 876e49b613d310c5baa54d2d34cd3310_NeikiAnalytics.exe 2664 876e49b613d310c5baa54d2d34cd3310_NeikiAnalytics.exe 2664 876e49b613d310c5baa54d2d34cd3310_NeikiAnalytics.exe 2664 876e49b613d310c5baa54d2d34cd3310_NeikiAnalytics.exe 2664 876e49b613d310c5baa54d2d34cd3310_NeikiAnalytics.exe 2664 876e49b613d310c5baa54d2d34cd3310_NeikiAnalytics.exe 2664 876e49b613d310c5baa54d2d34cd3310_NeikiAnalytics.exe 2664 876e49b613d310c5baa54d2d34cd3310_NeikiAnalytics.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2664 876e49b613d310c5baa54d2d34cd3310_NeikiAnalytics.exe -
Suspicious use of AdjustPrivilegeToken 10 IoCs
description pid Process Token: SeDebugPrivilege 3264 taskkill.exe Token: SeDebugPrivilege 4808 taskkill.exe Token: SeDebugPrivilege 1640 taskkill.exe Token: SeDebugPrivilege 2056 taskkill.exe Token: SeDebugPrivilege 1532 taskkill.exe Token: SeDebugPrivilege 2960 taskkill.exe Token: SeDebugPrivilege 4800 taskkill.exe Token: SeDebugPrivilege 4716 taskkill.exe Token: SeDebugPrivilege 588 taskkill.exe Token: SeDebugPrivilege 908 taskkill.exe -
Suspicious use of WriteProcessMemory 52 IoCs
description pid Process procid_target PID 2664 wrote to memory of 2884 2664 876e49b613d310c5baa54d2d34cd3310_NeikiAnalytics.exe 85 PID 2664 wrote to memory of 2884 2664 876e49b613d310c5baa54d2d34cd3310_NeikiAnalytics.exe 85 PID 2664 wrote to memory of 3256 2664 876e49b613d310c5baa54d2d34cd3310_NeikiAnalytics.exe 86 PID 2664 wrote to memory of 3256 2664 876e49b613d310c5baa54d2d34cd3310_NeikiAnalytics.exe 86 PID 2884 wrote to memory of 3300 2884 cmd.exe 87 PID 2884 wrote to memory of 3300 2884 cmd.exe 87 PID 3256 wrote to memory of 3264 3256 cmd.exe 88 PID 3256 wrote to memory of 3264 3256 cmd.exe 88 PID 2664 wrote to memory of 2560 2664 876e49b613d310c5baa54d2d34cd3310_NeikiAnalytics.exe 90 PID 2664 wrote to memory of 2560 2664 876e49b613d310c5baa54d2d34cd3310_NeikiAnalytics.exe 90 PID 2560 wrote to memory of 4808 2560 cmd.exe 91 PID 2560 wrote to memory of 4808 2560 cmd.exe 91 PID 2664 wrote to memory of 4776 2664 876e49b613d310c5baa54d2d34cd3310_NeikiAnalytics.exe 92 PID 2664 wrote to memory of 4776 2664 876e49b613d310c5baa54d2d34cd3310_NeikiAnalytics.exe 92 PID 4776 wrote to memory of 3296 4776 cmd.exe 93 PID 4776 wrote to memory of 3296 4776 cmd.exe 93 PID 2664 wrote to memory of 744 2664 876e49b613d310c5baa54d2d34cd3310_NeikiAnalytics.exe 94 PID 2664 wrote to memory of 744 2664 876e49b613d310c5baa54d2d34cd3310_NeikiAnalytics.exe 94 PID 744 wrote to memory of 1640 744 cmd.exe 95 PID 744 wrote to memory of 1640 744 cmd.exe 95 PID 2664 wrote to memory of 3836 2664 876e49b613d310c5baa54d2d34cd3310_NeikiAnalytics.exe 96 PID 2664 wrote to memory of 3836 2664 876e49b613d310c5baa54d2d34cd3310_NeikiAnalytics.exe 96 PID 3836 wrote to memory of 2056 3836 cmd.exe 97 PID 3836 wrote to memory of 2056 3836 cmd.exe 97 PID 2664 wrote to memory of 5056 2664 876e49b613d310c5baa54d2d34cd3310_NeikiAnalytics.exe 98 PID 2664 wrote to memory of 5056 2664 876e49b613d310c5baa54d2d34cd3310_NeikiAnalytics.exe 98 PID 5056 wrote to memory of 1532 5056 cmd.exe 99 PID 5056 wrote to memory of 1532 5056 cmd.exe 99 PID 2664 wrote to memory of 4056 2664 876e49b613d310c5baa54d2d34cd3310_NeikiAnalytics.exe 102 PID 2664 wrote to memory of 4056 2664 876e49b613d310c5baa54d2d34cd3310_NeikiAnalytics.exe 102 PID 4056 wrote to memory of 2960 4056 cmd.exe 103 PID 4056 wrote to memory of 2960 4056 cmd.exe 103 PID 2664 wrote to memory of 2804 2664 876e49b613d310c5baa54d2d34cd3310_NeikiAnalytics.exe 104 PID 2664 wrote to memory of 2804 2664 876e49b613d310c5baa54d2d34cd3310_NeikiAnalytics.exe 104 PID 2804 wrote to memory of 4800 2804 cmd.exe 105 PID 2804 wrote to memory of 4800 2804 cmd.exe 105 PID 2664 wrote to memory of 1240 2664 876e49b613d310c5baa54d2d34cd3310_NeikiAnalytics.exe 106 PID 2664 wrote to memory of 1240 2664 876e49b613d310c5baa54d2d34cd3310_NeikiAnalytics.exe 106 PID 1240 wrote to memory of 3452 1240 cmd.exe 107 PID 1240 wrote to memory of 3452 1240 cmd.exe 107 PID 2664 wrote to memory of 1880 2664 876e49b613d310c5baa54d2d34cd3310_NeikiAnalytics.exe 108 PID 2664 wrote to memory of 1880 2664 876e49b613d310c5baa54d2d34cd3310_NeikiAnalytics.exe 108 PID 1880 wrote to memory of 4716 1880 cmd.exe 109 PID 1880 wrote to memory of 4716 1880 cmd.exe 109 PID 2664 wrote to memory of 996 2664 876e49b613d310c5baa54d2d34cd3310_NeikiAnalytics.exe 110 PID 2664 wrote to memory of 996 2664 876e49b613d310c5baa54d2d34cd3310_NeikiAnalytics.exe 110 PID 996 wrote to memory of 588 996 cmd.exe 111 PID 996 wrote to memory of 588 996 cmd.exe 111 PID 2664 wrote to memory of 2112 2664 876e49b613d310c5baa54d2d34cd3310_NeikiAnalytics.exe 112 PID 2664 wrote to memory of 2112 2664 876e49b613d310c5baa54d2d34cd3310_NeikiAnalytics.exe 112 PID 2112 wrote to memory of 908 2112 cmd.exe 113 PID 2112 wrote to memory of 908 2112 cmd.exe 113
Processes
-
C:\Users\Admin\AppData\Local\Temp\876e49b613d310c5baa54d2d34cd3310_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\876e49b613d310c5baa54d2d34cd3310_NeikiAnalytics.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:2664 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c mode 90,202⤵
- Suspicious use of WriteProcessMemory
PID:2884 -
C:\Windows\system32\mode.commode 90,203⤵PID:3300
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /f /im HTTPDebuggerUI.exe >nul 2>&12⤵
- Suspicious use of WriteProcessMemory
PID:3256 -
C:\Windows\system32\taskkill.exetaskkill /f /im HTTPDebuggerUI.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3264
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /f /im HTTPDebuggerSvc.exe >nul 2>&12⤵
- Suspicious use of WriteProcessMemory
PID:2560 -
C:\Windows\system32\taskkill.exetaskkill /f /im HTTPDebuggerSvc.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4808
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerPro >nul 2>&12⤵
- Suspicious use of WriteProcessMemory
PID:4776 -
C:\Windows\system32\sc.exesc stop HTTPDebuggerPro3⤵
- Launches sc.exe
PID:3296
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq cheatengine*" /IM * /F /T >nul 2>&12⤵
- Suspicious use of WriteProcessMemory
PID:744 -
C:\Windows\system32\taskkill.exetaskkill /FI "IMAGENAME eq cheatengine*" /IM * /F /T3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1640
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T >nul 2>&12⤵
- Suspicious use of WriteProcessMemory
PID:3836 -
C:\Windows\system32\taskkill.exetaskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2056
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq processhacker*" /IM * /F /T >nul 2>&12⤵
- Suspicious use of WriteProcessMemory
PID:5056 -
C:\Windows\system32\taskkill.exetaskkill /FI "IMAGENAME eq processhacker*" /IM * /F /T3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1532
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /f /im HTTPDebuggerUI.exe >nul 2>&12⤵
- Suspicious use of WriteProcessMemory
PID:4056 -
C:\Windows\system32\taskkill.exetaskkill /f /im HTTPDebuggerUI.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2960
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /f /im HTTPDebuggerSvc.exe >nul 2>&12⤵
- Suspicious use of WriteProcessMemory
PID:2804 -
C:\Windows\system32\taskkill.exetaskkill /f /im HTTPDebuggerSvc.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4800
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerPro >nul 2>&12⤵
- Suspicious use of WriteProcessMemory
PID:1240 -
C:\Windows\system32\sc.exesc stop HTTPDebuggerPro3⤵
- Launches sc.exe
PID:3452
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq cheatengine*" /IM * /F /T >nul 2>&12⤵
- Suspicious use of WriteProcessMemory
PID:1880 -
C:\Windows\system32\taskkill.exetaskkill /FI "IMAGENAME eq cheatengine*" /IM * /F /T3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4716
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T >nul 2>&12⤵
- Suspicious use of WriteProcessMemory
PID:996 -
C:\Windows\system32\taskkill.exetaskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:588
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq processhacker*" /IM * /F /T >nul 2>&12⤵
- Suspicious use of WriteProcessMemory
PID:2112 -
C:\Windows\system32\taskkill.exetaskkill /FI "IMAGENAME eq processhacker*" /IM * /F /T3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:908
-
-