Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
02/06/2024, 03:53
Static task
static1
Behavioral task
behavioral1
Sample
31ba7c41a617fa7f4f879d9ebf476120_NeikiAnalytics.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
31ba7c41a617fa7f4f879d9ebf476120_NeikiAnalytics.exe
Resource
win10v2004-20240426-en
General
-
Target
31ba7c41a617fa7f4f879d9ebf476120_NeikiAnalytics.exe
-
Size
53KB
-
MD5
31ba7c41a617fa7f4f879d9ebf476120
-
SHA1
f768026b45efdf31d7414bd48e019a7a226f431c
-
SHA256
d78384d543654bafe86cbbe43356fd2f49872b0a8a042398e92d6f72ad87f479
-
SHA512
168785181cad069d28ac10b1e6704d69e50ff92af92b36ee3467fbd7c790cb2115bc592fab3c16e2477125de76cd2072b5b371583d13244cec7d861b42eedfb4
-
SSDEEP
1536:vNcg8r8Q+Xg7Zsf7Kp3StjEMjmLM3ztDJWZsXy4JzxPM0:NXg2fJJjmLM3zRJWZsXy4Jd
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" neiheey.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\Control Panel\International\Geo\Nation 31ba7c41a617fa7f4f879d9ebf476120_NeikiAnalytics.exe -
Executes dropped EXE 1 IoCs
pid Process 3632 neiheey.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\neiheey = "C:\\Users\\Admin\\neiheey.exe" neiheey.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3632 neiheey.exe 3632 neiheey.exe 3632 neiheey.exe 3632 neiheey.exe 3632 neiheey.exe 3632 neiheey.exe 3632 neiheey.exe 3632 neiheey.exe 3632 neiheey.exe 3632 neiheey.exe 3632 neiheey.exe 3632 neiheey.exe 3632 neiheey.exe 3632 neiheey.exe 3632 neiheey.exe 3632 neiheey.exe 3632 neiheey.exe 3632 neiheey.exe 3632 neiheey.exe 3632 neiheey.exe 3632 neiheey.exe 3632 neiheey.exe 3632 neiheey.exe 3632 neiheey.exe 3632 neiheey.exe 3632 neiheey.exe 3632 neiheey.exe 3632 neiheey.exe 3632 neiheey.exe 3632 neiheey.exe 3632 neiheey.exe 3632 neiheey.exe 3632 neiheey.exe 3632 neiheey.exe 3632 neiheey.exe 3632 neiheey.exe 3632 neiheey.exe 3632 neiheey.exe 3632 neiheey.exe 3632 neiheey.exe 3632 neiheey.exe 3632 neiheey.exe 3632 neiheey.exe 3632 neiheey.exe 3632 neiheey.exe 3632 neiheey.exe 3632 neiheey.exe 3632 neiheey.exe 3632 neiheey.exe 3632 neiheey.exe 3632 neiheey.exe 3632 neiheey.exe 3632 neiheey.exe 3632 neiheey.exe 3632 neiheey.exe 3632 neiheey.exe 3632 neiheey.exe 3632 neiheey.exe 3632 neiheey.exe 3632 neiheey.exe 3632 neiheey.exe 3632 neiheey.exe 3632 neiheey.exe 3632 neiheey.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2284 31ba7c41a617fa7f4f879d9ebf476120_NeikiAnalytics.exe 3632 neiheey.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2284 wrote to memory of 3632 2284 31ba7c41a617fa7f4f879d9ebf476120_NeikiAnalytics.exe 87 PID 2284 wrote to memory of 3632 2284 31ba7c41a617fa7f4f879d9ebf476120_NeikiAnalytics.exe 87 PID 2284 wrote to memory of 3632 2284 31ba7c41a617fa7f4f879d9ebf476120_NeikiAnalytics.exe 87 PID 3632 wrote to memory of 2284 3632 neiheey.exe 81 PID 3632 wrote to memory of 2284 3632 neiheey.exe 81 PID 3632 wrote to memory of 2284 3632 neiheey.exe 81 PID 3632 wrote to memory of 2284 3632 neiheey.exe 81 PID 3632 wrote to memory of 2284 3632 neiheey.exe 81 PID 3632 wrote to memory of 2284 3632 neiheey.exe 81 PID 3632 wrote to memory of 2284 3632 neiheey.exe 81 PID 3632 wrote to memory of 2284 3632 neiheey.exe 81 PID 3632 wrote to memory of 2284 3632 neiheey.exe 81 PID 3632 wrote to memory of 2284 3632 neiheey.exe 81 PID 3632 wrote to memory of 2284 3632 neiheey.exe 81 PID 3632 wrote to memory of 2284 3632 neiheey.exe 81 PID 3632 wrote to memory of 2284 3632 neiheey.exe 81 PID 3632 wrote to memory of 2284 3632 neiheey.exe 81 PID 3632 wrote to memory of 2284 3632 neiheey.exe 81 PID 3632 wrote to memory of 2284 3632 neiheey.exe 81 PID 3632 wrote to memory of 2284 3632 neiheey.exe 81 PID 3632 wrote to memory of 2284 3632 neiheey.exe 81 PID 3632 wrote to memory of 2284 3632 neiheey.exe 81 PID 3632 wrote to memory of 2284 3632 neiheey.exe 81 PID 3632 wrote to memory of 2284 3632 neiheey.exe 81 PID 3632 wrote to memory of 2284 3632 neiheey.exe 81 PID 3632 wrote to memory of 2284 3632 neiheey.exe 81 PID 3632 wrote to memory of 2284 3632 neiheey.exe 81 PID 3632 wrote to memory of 2284 3632 neiheey.exe 81 PID 3632 wrote to memory of 2284 3632 neiheey.exe 81 PID 3632 wrote to memory of 2284 3632 neiheey.exe 81 PID 3632 wrote to memory of 2284 3632 neiheey.exe 81 PID 3632 wrote to memory of 2284 3632 neiheey.exe 81 PID 3632 wrote to memory of 2284 3632 neiheey.exe 81 PID 3632 wrote to memory of 2284 3632 neiheey.exe 81 PID 3632 wrote to memory of 2284 3632 neiheey.exe 81 PID 3632 wrote to memory of 2284 3632 neiheey.exe 81 PID 3632 wrote to memory of 2284 3632 neiheey.exe 81 PID 3632 wrote to memory of 2284 3632 neiheey.exe 81 PID 3632 wrote to memory of 2284 3632 neiheey.exe 81 PID 3632 wrote to memory of 2284 3632 neiheey.exe 81 PID 3632 wrote to memory of 2284 3632 neiheey.exe 81 PID 3632 wrote to memory of 2284 3632 neiheey.exe 81 PID 3632 wrote to memory of 2284 3632 neiheey.exe 81 PID 3632 wrote to memory of 2284 3632 neiheey.exe 81 PID 3632 wrote to memory of 2284 3632 neiheey.exe 81 PID 3632 wrote to memory of 2284 3632 neiheey.exe 81 PID 3632 wrote to memory of 2284 3632 neiheey.exe 81 PID 3632 wrote to memory of 2284 3632 neiheey.exe 81 PID 3632 wrote to memory of 2284 3632 neiheey.exe 81 PID 3632 wrote to memory of 2284 3632 neiheey.exe 81 PID 3632 wrote to memory of 2284 3632 neiheey.exe 81 PID 3632 wrote to memory of 2284 3632 neiheey.exe 81 PID 3632 wrote to memory of 2284 3632 neiheey.exe 81 PID 3632 wrote to memory of 2284 3632 neiheey.exe 81 PID 3632 wrote to memory of 2284 3632 neiheey.exe 81 PID 3632 wrote to memory of 2284 3632 neiheey.exe 81 PID 3632 wrote to memory of 2284 3632 neiheey.exe 81 PID 3632 wrote to memory of 2284 3632 neiheey.exe 81 PID 3632 wrote to memory of 2284 3632 neiheey.exe 81 PID 3632 wrote to memory of 2284 3632 neiheey.exe 81 PID 3632 wrote to memory of 2284 3632 neiheey.exe 81 PID 3632 wrote to memory of 2284 3632 neiheey.exe 81 PID 3632 wrote to memory of 2284 3632 neiheey.exe 81 PID 3632 wrote to memory of 2284 3632 neiheey.exe 81
Processes
-
C:\Users\Admin\AppData\Local\Temp\31ba7c41a617fa7f4f879d9ebf476120_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\31ba7c41a617fa7f4f879d9ebf476120_NeikiAnalytics.exe"1⤵
- Checks computer location settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2284 -
C:\Users\Admin\neiheey.exe"C:\Users\Admin\neiheey.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3632
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
53KB
MD5173a83d1733e2310beee2409de4db8a3
SHA16df68997bb14cc66a2dfca8a8e70af8e4fc97a8e
SHA256b6ed91927872cf6edd710f6141ad78b12bc121d86d1a378c96ca2f1cdbb771ea
SHA512eb1dd90a82b8030dba92aa4d99a9620e54746a955e5e7bff2eec930ddcc8da4562d6d748b0b4ea13d49f23019df587fb4b7c63c60ab32cf71dd10927f46aeb4a