Analysis Overview
SHA256
4eda528d1d83386dec0085476a4a921fc4c318b1f261af6790d70a039c266a7e
Threat Level: Shows suspicious behavior
The file 4a653ade7b35d2f04b53452d5aa2bdd0_NeikiAnalytics.exe was found to be: Shows suspicious behavior.
Malicious Activity Summary
Executes dropped EXE
Loads dropped DLL
Adds Run key to start application
Unsigned PE
Suspicious behavior: EnumeratesProcesses
Suspicious use of WriteProcessMemory
MITRE ATT&CK
Enterprise Matrix V15
Analysis: static1
Detonation Overview
Reported
2024-06-02 06:45
Signatures
Unsigned PE
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Analysis: behavioral1
Detonation Overview
Submitted
2024-06-02 06:45
Reported
2024-06-02 06:48
Platform
win7-20240221-en
Max time kernel
149s
Max time network
123s
Command Line
Signatures
Executes dropped EXE
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Files72\abodec.exe | N/A |
Loads dropped DLL
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\4a653ade7b35d2f04b53452d5aa2bdd0_NeikiAnalytics.exe | N/A |
Adds Run key to start application
| Description | Indicator | Process | Target |
| Set value (str) | \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\Parametr = "C:\\KaVBOG\\bodaec.exe" | C:\Users\Admin\AppData\Local\Temp\4a653ade7b35d2f04b53452d5aa2bdd0_NeikiAnalytics.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Run\Parametr = "C:\\Files72\\abodec.exe" | C:\Users\Admin\AppData\Local\Temp\4a653ade7b35d2f04b53452d5aa2bdd0_NeikiAnalytics.exe | N/A |
Suspicious behavior: EnumeratesProcesses
Suspicious use of WriteProcessMemory
| Description | Indicator | Process | Target |
| PID 2944 wrote to memory of 272 | N/A | C:\Users\Admin\AppData\Local\Temp\4a653ade7b35d2f04b53452d5aa2bdd0_NeikiAnalytics.exe | C:\Files72\abodec.exe |
| PID 2944 wrote to memory of 272 | N/A | C:\Users\Admin\AppData\Local\Temp\4a653ade7b35d2f04b53452d5aa2bdd0_NeikiAnalytics.exe | C:\Files72\abodec.exe |
| PID 2944 wrote to memory of 272 | N/A | C:\Users\Admin\AppData\Local\Temp\4a653ade7b35d2f04b53452d5aa2bdd0_NeikiAnalytics.exe | C:\Files72\abodec.exe |
| PID 2944 wrote to memory of 272 | N/A | C:\Users\Admin\AppData\Local\Temp\4a653ade7b35d2f04b53452d5aa2bdd0_NeikiAnalytics.exe | C:\Files72\abodec.exe |
Processes
C:\Users\Admin\AppData\Local\Temp\4a653ade7b35d2f04b53452d5aa2bdd0_NeikiAnalytics.exe
"C:\Users\Admin\AppData\Local\Temp\4a653ade7b35d2f04b53452d5aa2bdd0_NeikiAnalytics.exe"
C:\Files72\abodec.exe
C:\Files72\abodec.exe
Network
Files
\Files72\abodec.exe
| MD5 | 6a3481b0a574f1bd853c968840ad4ab3 |
| SHA1 | 2c64f2df5999a6bbb300e70c1309ef3af5e8f254 |
| SHA256 | 739a7f7a42349c82dc01e61fb9a8ec3699c4917cc3c40412f60bc82b6c3cf9b1 |
| SHA512 | 5409fff8a79a37e79529768a8a76d0647cfd9788d962a0be2486a28f08519281bafdc37cfbad319b02d28bb33a8e8d5e7b33fbb10c6bc02bda9b0483cd36af7d |
C:\Users\Admin\253086396416_6.1_Admin.ini
| MD5 | a814fdc80bd6ec33d6f34c559799fbbb |
| SHA1 | f18c5cab8a07eb18594cad1115a1272bcbb6c546 |
| SHA256 | cae6aac1f05d01eda421906de91e110a16370023397f2888ba3f45550e19c0b7 |
| SHA512 | 1e32a5fe44f75d79d85a65073affd4731026548f15899aad5311207f490448ae5dc893fab8b2f66ed3d9059706423fc515ef8abc299803cecfa8d48d94725416 |
C:\KaVBOG\bodaec.exe
| MD5 | daee974300a367d39b1d76c23c61e3ba |
| SHA1 | 03d82447f1599cd908a06cf5545b9d2d6475cce0 |
| SHA256 | 1eaa2ff217562596c0e2f5218df6a39bd678f7af20e234dda2ebdc8f68d1fadd |
| SHA512 | 7a2f262d220d5531b5cb64b402c1978d25169a45d37251e1c8cd0f6f07dd98594cfb378e958bf7f2675813e9fcca5165351a892a54823c766ace8aa13c62a4e7 |
Analysis: behavioral2
Detonation Overview
Submitted
2024-06-02 06:45
Reported
2024-06-02 06:48
Platform
win10v2004-20240508-en
Max time kernel
149s
Max time network
150s
Command Line
Signatures
Executes dropped EXE
| Description | Indicator | Process | Target |
| N/A | N/A | C:\FilesO6\abodloc.exe | N/A |
Adds Run key to start application
| Description | Indicator | Process | Target |
| Set value (str) | \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Parametr = "C:\\FilesO6\\abodloc.exe" | C:\Users\Admin\AppData\Local\Temp\4a653ade7b35d2f04b53452d5aa2bdd0_NeikiAnalytics.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Parametr = "C:\\MintLD\\dobdevloc.exe" | C:\Users\Admin\AppData\Local\Temp\4a653ade7b35d2f04b53452d5aa2bdd0_NeikiAnalytics.exe | N/A |
Suspicious behavior: EnumeratesProcesses
Suspicious use of WriteProcessMemory
| Description | Indicator | Process | Target |
| PID 1468 wrote to memory of 4168 | N/A | C:\Users\Admin\AppData\Local\Temp\4a653ade7b35d2f04b53452d5aa2bdd0_NeikiAnalytics.exe | C:\FilesO6\abodloc.exe |
| PID 1468 wrote to memory of 4168 | N/A | C:\Users\Admin\AppData\Local\Temp\4a653ade7b35d2f04b53452d5aa2bdd0_NeikiAnalytics.exe | C:\FilesO6\abodloc.exe |
| PID 1468 wrote to memory of 4168 | N/A | C:\Users\Admin\AppData\Local\Temp\4a653ade7b35d2f04b53452d5aa2bdd0_NeikiAnalytics.exe | C:\FilesO6\abodloc.exe |
Processes
C:\Users\Admin\AppData\Local\Temp\4a653ade7b35d2f04b53452d5aa2bdd0_NeikiAnalytics.exe
"C:\Users\Admin\AppData\Local\Temp\4a653ade7b35d2f04b53452d5aa2bdd0_NeikiAnalytics.exe"
C:\FilesO6\abodloc.exe
C:\FilesO6\abodloc.exe
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | 91.90.14.23.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 104.219.191.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 0.159.190.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 26.35.223.20.in-addr.arpa | udp |
| NL | 23.62.61.171:443 | www.bing.com | tcp |
| US | 8.8.8.8:53 | 171.61.62.23.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 103.169.127.40.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 198.187.3.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 134.71.91.104.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 13.227.111.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | tse1.mm.bing.net | udp |
| US | 204.79.197.200:443 | tse1.mm.bing.net | tcp |
| US | 204.79.197.200:443 | tse1.mm.bing.net | tcp |
| US | 8.8.8.8:53 | 252.15.104.51.in-addr.arpa | udp |
Files
C:\FilesO6\abodloc.exe
| MD5 | f22ae3de747bd2233c5fb2806a5ca11d |
| SHA1 | 77a6761027668f7558695aa9e8830d95927fe58e |
| SHA256 | e6dfecd124361f55e54f461676d697d606a3ba68972574b0b590d4a5619c4d8e |
| SHA512 | ce447b1d7bd62898864a4e0f374e0ac6c0baa5e85a5e1e4005f3d1eaceb9e870057c1ce242e60a6b32dea6b80d896b5f89e7e6363b27915f9d4c0fd4d18dede7 |
C:\Users\Admin\253086396416_10.0_Admin.ini
| MD5 | 706f081dc65c61dc1101304ab78bb0f9 |
| SHA1 | cd73f7f0b5e6814c154fed6522cfbdea39a6c2e9 |
| SHA256 | e312822ab2f0ecf405d173259c66f65606cf35503aedc79ed93d9216a22d9f9b |
| SHA512 | 664fd9aa4268bfcc4c7c03fcffaf576a8cc96f30c2963ccaac643986fa0158223e5a816bc2a776228b0858c16dbda73c8d0a50c4f8efaa867e5226f022e43ea1 |
C:\MintLD\dobdevloc.exe
| MD5 | 41bd27423f83f4eb59bfeef3f8e7b849 |
| SHA1 | c32d1f1421abaa30a42667ffebab912f75780cdc |
| SHA256 | bed95e18bb0ed39da8d74c12ea0d10ecbd9a03c9c3e84e63d09f8759dd629533 |
| SHA512 | f9715f19434a632dfe21ba10189f0ff5cf409f2b170f39f87949c1b18b691a464c150d950d49d45850b37709b1953b2198d102ae5a9d926ae46366d43d54273d |