Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
03/06/2024, 17:56
Static task
static1
Behavioral task
behavioral1
Sample
e9c77ff857afd14fe12e4ba6067a3b60_NeikiAnalytics.dll
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
e9c77ff857afd14fe12e4ba6067a3b60_NeikiAnalytics.dll
Resource
win10v2004-20240508-en
General
-
Target
e9c77ff857afd14fe12e4ba6067a3b60_NeikiAnalytics.dll
-
Size
540KB
-
MD5
e9c77ff857afd14fe12e4ba6067a3b60
-
SHA1
6ab740ea7f433a7bbbcf9bf2210c0c6178696540
-
SHA256
7727cfd67763fc7715091d501c592054d94e4714b02338d394b4aadc63ad538d
-
SHA512
21a1a685103b861996b0c1f1b8c98ab8b64c8136286d2357338bdb504baaa6c12a4534077d4f1eb9a731446a66eece54a9b5aca82b1763bad30933e66ce38ce6
-
SSDEEP
6144:Bi05kH9OyU2uv5SRf/FWgFgt0gqIRAUW9kVYeVprU4wfhTv5xD2ZP0GVGdXcukT4:ErHGPv5SmptZDmUWuVZkxikdXcq
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Bhelxfhv = "\"C:\\Users\\Admin\\AppData\\Roaming\\9L5P\\MusNotifyIcon.exe\"" Process not Found -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\system32\4454\MDMAppInstaller.exe cmd.exe File opened for modification C:\Windows\system32\4454\MDMAppInstaller.exe cmd.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1544 schtasks.exe -
Modifies registry class 10 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000_Classes\ms-settings Process not Found Key deleted \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000_Classes\ms-settings\shell\open\command Process not Found Key deleted \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000_Classes\ms-settings\shell\open Process not Found Key created \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000_Classes\ms-settings\shell\open\command Process not Found Key created \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000_Classes\ms-settings\shell Process not Found Key created \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000_Classes\ms-settings\shell\open Process not Found Set value (str) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000_Classes\ms-settings\shell\open\command\ = "C:\\Windows\\system32\\cmd.exe /c C:\\Users\\Admin\\AppData\\Local\\Temp\\3kQdbK2.cmd" Process not Found Set value (str) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000_Classes\ms-settings\shell\open\command\DelegateExecute Process not Found Key deleted \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000_Classes\ms-settings\shell Process not Found Key deleted \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000_Classes\ms-settings Process not Found -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2252 rundll32.exe 2252 rundll32.exe 2252 rundll32.exe 2252 rundll32.exe 3476 Process not Found 3476 Process not Found 3476 Process not Found 3476 Process not Found 3476 Process not Found 3476 Process not Found 3476 Process not Found 3476 Process not Found 3476 Process not Found 3476 Process not Found 3476 Process not Found 3476 Process not Found 3476 Process not Found 3476 Process not Found 3476 Process not Found 3476 Process not Found 3476 Process not Found 3476 Process not Found 3476 Process not Found 3476 Process not Found 3476 Process not Found 3476 Process not Found 3476 Process not Found 3476 Process not Found 3476 Process not Found 3476 Process not Found 3476 Process not Found 3476 Process not Found 3476 Process not Found 3476 Process not Found 3476 Process not Found 3476 Process not Found 3476 Process not Found 3476 Process not Found 3476 Process not Found 3476 Process not Found 3476 Process not Found 3476 Process not Found 3476 Process not Found 3476 Process not Found 3476 Process not Found 3476 Process not Found 3476 Process not Found 3476 Process not Found 3476 Process not Found 3476 Process not Found 3476 Process not Found 3476 Process not Found 3476 Process not Found 3476 Process not Found 3476 Process not Found 3476 Process not Found 3476 Process not Found 3476 Process not Found 3476 Process not Found 3476 Process not Found 3476 Process not Found 3476 Process not Found 3476 Process not Found 3476 Process not Found -
Suspicious use of AdjustPrivilegeToken 14 IoCs
description pid Process Token: SeShutdownPrivilege 3476 Process not Found Token: SeCreatePagefilePrivilege 3476 Process not Found Token: SeShutdownPrivilege 3476 Process not Found Token: SeCreatePagefilePrivilege 3476 Process not Found Token: SeShutdownPrivilege 3476 Process not Found Token: SeCreatePagefilePrivilege 3476 Process not Found Token: SeShutdownPrivilege 3476 Process not Found Token: SeCreatePagefilePrivilege 3476 Process not Found Token: SeShutdownPrivilege 3476 Process not Found Token: SeCreatePagefilePrivilege 3476 Process not Found Token: SeShutdownPrivilege 3476 Process not Found Token: SeCreatePagefilePrivilege 3476 Process not Found Token: SeShutdownPrivilege 3476 Process not Found Token: SeCreatePagefilePrivilege 3476 Process not Found -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 3476 Process not Found 3476 Process not Found -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 3476 Process not Found -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 3476 wrote to memory of 2788 3476 Process not Found 92 PID 3476 wrote to memory of 2788 3476 Process not Found 92 PID 3476 wrote to memory of 1352 3476 Process not Found 93 PID 3476 wrote to memory of 1352 3476 Process not Found 93 PID 3476 wrote to memory of 4848 3476 Process not Found 95 PID 3476 wrote to memory of 4848 3476 Process not Found 95 PID 4848 wrote to memory of 1076 4848 cmd.exe 97 PID 4848 wrote to memory of 1076 4848 cmd.exe 97 PID 3476 wrote to memory of 3760 3476 Process not Found 98 PID 3476 wrote to memory of 3760 3476 Process not Found 98 PID 3476 wrote to memory of 3532 3476 Process not Found 99 PID 3476 wrote to memory of 3532 3476 Process not Found 99 PID 3476 wrote to memory of 3692 3476 Process not Found 101 PID 3476 wrote to memory of 3692 3476 Process not Found 101 PID 3692 wrote to memory of 440 3692 fodhelper.exe 102 PID 3692 wrote to memory of 440 3692 fodhelper.exe 102 PID 440 wrote to memory of 1544 440 cmd.exe 104 PID 440 wrote to memory of 1544 440 cmd.exe 104 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e9c77ff857afd14fe12e4ba6067a3b60_NeikiAnalytics.dll,#11⤵
- Suspicious behavior: EnumeratesProcesses
PID:2252
-
C:\Windows\system32\MusNotifyIcon.exeC:\Windows\system32\MusNotifyIcon.exe1⤵PID:2788
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c C:\Users\Admin\AppData\Local\Temp\vGqvw.cmd1⤵PID:1352
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks.exe /Delete /F /TN "User_Feed_Synchronization-{efcc2aac-e689-e8e3-2066-d8bb45569766}"1⤵
- Suspicious use of WriteProcessMemory
PID:4848 -
C:\Windows\system32\schtasks.exeschtasks.exe /Delete /F /TN "User_Feed_Synchronization-{efcc2aac-e689-e8e3-2066-d8bb45569766}"2⤵PID:1076
-
-
C:\Windows\system32\MDMAppInstaller.exeC:\Windows\system32\MDMAppInstaller.exe1⤵PID:3760
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c C:\Users\Admin\AppData\Local\Temp\jRPHWM.cmd1⤵
- Drops file in System32 directory
PID:3532
-
C:\Windows\System32\fodhelper.exe"C:\Windows\System32\fodhelper.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3692 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c C:\Users\Admin\AppData\Local\Temp\3kQdbK2.cmd2⤵
- Suspicious use of WriteProcessMemory
PID:440 -
C:\Windows\system32\schtasks.exeschtasks.exe /Create /F /TN "Jsuawhgxxu" /SC minute /MO 60 /TR "C:\Windows\system32\4454\MDMAppInstaller.exe" /RL highest3⤵
- Creates scheduled task(s)
PID:1544
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
544KB
MD519ff03830241bf58e6d0e1bd940a83fa
SHA1bf1323aba8701923762fd8ed34a1546fe82b561b
SHA256efbd29f42d69c007b1b3d3af930080cc0aa82991015784f57af6b1c96c6baa7a
SHA512cf2ea56956eb240fee43c141cfaffea2c5d32317dc90189235eebdb7a32a4c8c04fc055a12801a7d22232dfbd9549e1739922ee7480b00a15b9f0292ad4a4adc
-
Filesize
136B
MD5ebfc723844f1d03c69a6343470a6a761
SHA156f9b02c3a20a8cc0850bfcf957986067e3866bf
SHA256ab21ad1a96d3a0c3082a99926b786953834d5b36c5fa5e4c2ab668491886a7c6
SHA512343bbaed8c59a7669916db258a41f2f790c7fdfa3cabf4fdcf41a4c6d2eb34fe2f5e6bad6e995d069f67114e5af1309ce4ede4b63e50ab1c547bca21c15d2275
-
Filesize
201B
MD5d671c406bdd876a15486f1360277d659
SHA1ff6532493f9df32eece20a96d732715685a0f1cf
SHA2564ccadc10826f24c5e0f6d14b728a1550d0a8d7515b6a762a21d634321fd07446
SHA5120713609ac990a3803d883c308baad5e4bc8d582c1f52e24cb32b2eea1eba7d97a2c05a05f94826dc5c5c81e10cd297def2b07d783570a4f85971e99d2e2a04bd
-
Filesize
544KB
MD5f38b7c187a49a006af5f797c7f36cc98
SHA1af3cadd6a6bb8bae84a845eac9e9a65c8c4469cc
SHA256b5c96a455d3007aa2c2735f8e2e446259364c4f5ff5817040d80150ea8cbbaf3
SHA5126478e3891d57f1dd77bbb0b004ba4cbd70f74ef6d6f209950484aebe09ea1a8dc8736c489eab33acab62cd9f819f8a6642f79e969430b5342f55044379cf6f38
-
Filesize
232B
MD56f5aefae919594cbaeb68ef0ee684d71
SHA1b6920f2294fbb365e0bdb691efc355316dc4aeb2
SHA256f266eaa5652f571fbbdb4bd7371601e3edc724ae11edb75c913b2772f4bc649a
SHA512ed95ad8cb5ce9a043b5b546970f039565aacb68bb25133a3b50b078adafb728c95fd773c69689545d4152a6675ad5c804b454799e2bbd97ac28a3aff250683fb
-
Filesize
629KB
MD5c54b1a69a21e03b83ebb0aeb3758b6f7
SHA1b32ee7e5b813554c4b8e8f96f176570e0f6e8b6c
SHA256ac3e12011b70144cc84539bbccacdfae35bd4ea3ee61b4a9fca5f082d044d8bf
SHA5122680ab501ffe7d40fed28eb207d812880c8a71d71a29d59ba3da27c0bae98c74893e04807d93fba7b5e673c3e13a1ad21bfaab10bdb871d83349ff4e7c614b19
-
Filesize
928B
MD512dc19f964e91e4ec3e5a1d3571ad24d
SHA1186b64f37eba40c41bbe7d8ad29d4e2d945af522
SHA25672f41e01c2777a214fe91f31c4acc8a13e4cb1bcd0d69456139cb173c476a0f3
SHA5128d2f2a530e0bffb2a73d18744d55766738b2c0eccb8046ac228953ca7c8b063234a3f7002dffeb013e0905f28564d43dee51ed60da1d937d3f5b98f6bad3ecd0