Analysis
-
max time kernel
149s -
max time network
126s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
02-06-2024 07:57
Static task
static1
Behavioral task
behavioral1
Sample
562df3f5c371fdd39ae342de085d3d90_NeikiAnalytics.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
562df3f5c371fdd39ae342de085d3d90_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
562df3f5c371fdd39ae342de085d3d90_NeikiAnalytics.exe
-
Size
2.7MB
-
MD5
562df3f5c371fdd39ae342de085d3d90
-
SHA1
5076656ceeaf986d80f875891ef443362878d2a7
-
SHA256
9de1661bb924d9c89d2c53f19a75b3f26db6aa4f34ff67ed062e4680228ceae6
-
SHA512
484c53b7a5445cd7fdb727afabff33c12d5a1de855482542b916ed8b7bb13291ef56a1b5feaee6387a7b7a55ff513bb339084e913f1ef8ba43adfdff47da25db
-
SSDEEP
49152:+R0p8xHycIq+GI27nGroMPTJPer1c2HSjpjK3LBw9w4Sx:+R0pI/IQlUoMPdmpSpi4
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2996 aoptiec.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Parametr = "C:\\IntelprocA8\\aoptiec.exe" 562df3f5c371fdd39ae342de085d3d90_NeikiAnalytics.exe Set value (str) \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Parametr = "C:\\KaVB7M\\bodxsys.exe" 562df3f5c371fdd39ae342de085d3d90_NeikiAnalytics.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4236 562df3f5c371fdd39ae342de085d3d90_NeikiAnalytics.exe 4236 562df3f5c371fdd39ae342de085d3d90_NeikiAnalytics.exe 4236 562df3f5c371fdd39ae342de085d3d90_NeikiAnalytics.exe 4236 562df3f5c371fdd39ae342de085d3d90_NeikiAnalytics.exe 2996 aoptiec.exe 2996 aoptiec.exe 4236 562df3f5c371fdd39ae342de085d3d90_NeikiAnalytics.exe 4236 562df3f5c371fdd39ae342de085d3d90_NeikiAnalytics.exe 2996 aoptiec.exe 2996 aoptiec.exe 4236 562df3f5c371fdd39ae342de085d3d90_NeikiAnalytics.exe 4236 562df3f5c371fdd39ae342de085d3d90_NeikiAnalytics.exe 2996 aoptiec.exe 2996 aoptiec.exe 4236 562df3f5c371fdd39ae342de085d3d90_NeikiAnalytics.exe 4236 562df3f5c371fdd39ae342de085d3d90_NeikiAnalytics.exe 2996 aoptiec.exe 2996 aoptiec.exe 4236 562df3f5c371fdd39ae342de085d3d90_NeikiAnalytics.exe 4236 562df3f5c371fdd39ae342de085d3d90_NeikiAnalytics.exe 2996 aoptiec.exe 2996 aoptiec.exe 4236 562df3f5c371fdd39ae342de085d3d90_NeikiAnalytics.exe 4236 562df3f5c371fdd39ae342de085d3d90_NeikiAnalytics.exe 2996 aoptiec.exe 2996 aoptiec.exe 4236 562df3f5c371fdd39ae342de085d3d90_NeikiAnalytics.exe 4236 562df3f5c371fdd39ae342de085d3d90_NeikiAnalytics.exe 2996 aoptiec.exe 2996 aoptiec.exe 4236 562df3f5c371fdd39ae342de085d3d90_NeikiAnalytics.exe 4236 562df3f5c371fdd39ae342de085d3d90_NeikiAnalytics.exe 2996 aoptiec.exe 2996 aoptiec.exe 4236 562df3f5c371fdd39ae342de085d3d90_NeikiAnalytics.exe 4236 562df3f5c371fdd39ae342de085d3d90_NeikiAnalytics.exe 2996 aoptiec.exe 2996 aoptiec.exe 4236 562df3f5c371fdd39ae342de085d3d90_NeikiAnalytics.exe 4236 562df3f5c371fdd39ae342de085d3d90_NeikiAnalytics.exe 2996 aoptiec.exe 2996 aoptiec.exe 4236 562df3f5c371fdd39ae342de085d3d90_NeikiAnalytics.exe 4236 562df3f5c371fdd39ae342de085d3d90_NeikiAnalytics.exe 2996 aoptiec.exe 2996 aoptiec.exe 4236 562df3f5c371fdd39ae342de085d3d90_NeikiAnalytics.exe 4236 562df3f5c371fdd39ae342de085d3d90_NeikiAnalytics.exe 2996 aoptiec.exe 2996 aoptiec.exe 4236 562df3f5c371fdd39ae342de085d3d90_NeikiAnalytics.exe 4236 562df3f5c371fdd39ae342de085d3d90_NeikiAnalytics.exe 2996 aoptiec.exe 2996 aoptiec.exe 4236 562df3f5c371fdd39ae342de085d3d90_NeikiAnalytics.exe 4236 562df3f5c371fdd39ae342de085d3d90_NeikiAnalytics.exe 2996 aoptiec.exe 2996 aoptiec.exe 4236 562df3f5c371fdd39ae342de085d3d90_NeikiAnalytics.exe 4236 562df3f5c371fdd39ae342de085d3d90_NeikiAnalytics.exe 2996 aoptiec.exe 2996 aoptiec.exe 4236 562df3f5c371fdd39ae342de085d3d90_NeikiAnalytics.exe 4236 562df3f5c371fdd39ae342de085d3d90_NeikiAnalytics.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4236 wrote to memory of 2996 4236 562df3f5c371fdd39ae342de085d3d90_NeikiAnalytics.exe 95 PID 4236 wrote to memory of 2996 4236 562df3f5c371fdd39ae342de085d3d90_NeikiAnalytics.exe 95 PID 4236 wrote to memory of 2996 4236 562df3f5c371fdd39ae342de085d3d90_NeikiAnalytics.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\562df3f5c371fdd39ae342de085d3d90_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\562df3f5c371fdd39ae342de085d3d90_NeikiAnalytics.exe"1⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4236 -
C:\IntelprocA8\aoptiec.exeC:\IntelprocA8\aoptiec.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2996
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --field-trial-handle=4200,i,10373433614523925616,13586256558317053467,262144 --variations-seed-version --mojo-platform-channel-handle=4264 /prefetch:81⤵PID:1460
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.7MB
MD5859fa6b9bfc779e7cdaf2a7784e61da1
SHA1a32226abf6e7dbcee23e5ecc4fe00eca2cf3635b
SHA256fe72306d6d6b9e0b8503343c1e540a1b4eb6c6147ee39fcc043b5003f8f0c976
SHA5128aed7a4824bc30fdd763bbce1b21ab2f259087c9027f4090eae8b09ec16f0d6b401118c0a833edd911bd92636ca18b76e2cb0c2e6db827e29737a3b1829f6e21
-
Filesize
2.7MB
MD5a7ebc48a647a14dc261f7090d07cbcf4
SHA18842083043cac9a0dc44beb9f5c2b7f3044d7faa
SHA25684a3f23dd46b7606a52ed20f6b8a01ff706b228d6a59dad532c8009f3c994ce0
SHA512fa92abbe522bdf91254bbc80056472800c1de55ff2193082855875d606e5fc081bade5359d961179b9d8e3ca326474e62e2d9d090c317038e90d35be59d63d90
-
Filesize
205B
MD5b22c3f95e098adc29e9dcff98129c248
SHA161e900cf7ec7a3c97e57da1c9eb07b9240a2b9c9
SHA256889a3f7481597d6f82bd856251e6971a73da210f2987910ceb9cbcd880c02392
SHA5129642a08afac0932a5c24422874952707e01851b7af69b7059bbf36283785aac0697715edf7696ce892f4e3e5603228e21b485208464d179f3e469a7ff5b90984