Analysis
-
max time kernel
150s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
04/06/2024, 05:58
Static task
static1
Behavioral task
behavioral1
Sample
35233a314deba2c4b9d932047fb909f0_NeikiAnalytics.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
35233a314deba2c4b9d932047fb909f0_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
35233a314deba2c4b9d932047fb909f0_NeikiAnalytics.exe
-
Size
760KB
-
MD5
35233a314deba2c4b9d932047fb909f0
-
SHA1
1afbb6871100ee6fc762db17a7a087139dd8b0c7
-
SHA256
3ae58e138e5053dcb25014f025d2eb9f94c0b9119f6e967ee7de6a974d846052
-
SHA512
ea8b7eac0c3a49e6c8d76f117ea6cd5553135a4430df690f75e51856d477eeea4d9483a97ac2daa5661d8e5dc4197f2abd4e6bfcdcc79a2b26807d3510df1a61
-
SSDEEP
12288:1/J/m71432pBsHMZ3tJnojSl27rLzqN8OUEeMT1TkcCDx4ZMr4Q0:1/A6GTVnojg2yNRXTkcCCZM8b
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3036 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 2208 Logo1_.exe 2644 35233a314deba2c4b9d932047fb909f0_NeikiAnalytics.exe -
Loads dropped DLL 1 IoCs
pid Process 3036 cmd.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Java\jre7\bin\javacpl.exe Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Minesweeper\MineSweeper.exe Logo1_.exe File opened for modification C:\Program Files\Mozilla Firefox\minidump-analyzer.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Source Engine\OSE.EXE Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\idlj.exe Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jabswitch.exe Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\unpack200.exe Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\lib\nbexec64.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\IEContentService.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\MSPUB.EXE Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\MSTORDB.EXE Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\GROOVEMN.EXE Logo1_.exe File opened for modification C:\Program Files (x86)\Internet Explorer\iexplore.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\POWERPNT.EXE Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jarsigner.exe Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\ktab.exe Logo1_.exe File opened for modification C:\Program Files\Windows Journal\Journal.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\LICLUA.EXE Logo1_.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateCore.exe Logo1_.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\setup.exe Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\ktab.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\ink\mip.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleCrashHandler.exe Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jdb.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Setup Files\{AC76BA86-7AD7-1033-7B44-A90000000001}\Setup.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\ink\pipanel.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\VSTA\8.0\x86\vsta_ep32.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Internet Explorer\ExtExport.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\SETLANG.EXE Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\XLICONS.EXE Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jinfo.exe Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jsadebugd.exe Logo1_.exe File opened for modification C:\Program Files\Mozilla Firefox\crashreporter.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateBroker.exe Logo1_.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\notification_helper.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\ONELEV.EXE Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\serialver.exe Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\wsimport.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\MSInfo\msinfo32.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\OIS.EXE Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\apt.exe Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jstat.exe Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\sidebar.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\ink\TabTip32.exe Logo1_.exe File opened for modification C:\Program Files\Java\jre7\bin\unpack200.exe Logo1_.exe File opened for modification C:\Program Files\Windows Photo Viewer\ImagingDevices.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\OUTLOOK.EXE Logo1_.exe File opened for modification C:\Program Files\Mozilla Firefox\uninstall\helper.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Eula.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe\Updater6\AdobeUpdaterInstallMgr.exe Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\xjc.exe Logo1_.exe File opened for modification C:\Program Files\Java\jre7\bin\java-rmi.exe Logo1_.exe File opened for modification C:\Program Files\Java\jre7\bin\javaw.exe Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\extcheck.exe Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\ssvagent.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateOnDemand.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Media Player\wmpconfig.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Media Player\wmprph.exe Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jmc.exe Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\vlc-cache-gen.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Icons\SC_Reader.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\DW\DWTRIG20.EXE Logo1_.exe File opened for modification C:\Program Files (x86)\Google\Update\Download\{8A69D345-D564-463C-AFF1-A69D9E530F96}\106.0.5249.119\chrome_installer.exe Logo1_.exe File opened for modification C:\Program Files\Java\jre7\bin\javaws.exe Logo1_.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\Logo1_.exe 35233a314deba2c4b9d932047fb909f0_NeikiAnalytics.exe File created C:\Windows\vDll.dll Logo1_.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 2208 Logo1_.exe 2208 Logo1_.exe 2208 Logo1_.exe 2208 Logo1_.exe 2208 Logo1_.exe 2208 Logo1_.exe 2208 Logo1_.exe 2208 Logo1_.exe -
Suspicious use of WriteProcessMemory 23 IoCs
description pid Process procid_target PID 2204 wrote to memory of 3036 2204 35233a314deba2c4b9d932047fb909f0_NeikiAnalytics.exe 28 PID 2204 wrote to memory of 3036 2204 35233a314deba2c4b9d932047fb909f0_NeikiAnalytics.exe 28 PID 2204 wrote to memory of 3036 2204 35233a314deba2c4b9d932047fb909f0_NeikiAnalytics.exe 28 PID 2204 wrote to memory of 3036 2204 35233a314deba2c4b9d932047fb909f0_NeikiAnalytics.exe 28 PID 2204 wrote to memory of 2208 2204 35233a314deba2c4b9d932047fb909f0_NeikiAnalytics.exe 29 PID 2204 wrote to memory of 2208 2204 35233a314deba2c4b9d932047fb909f0_NeikiAnalytics.exe 29 PID 2204 wrote to memory of 2208 2204 35233a314deba2c4b9d932047fb909f0_NeikiAnalytics.exe 29 PID 2204 wrote to memory of 2208 2204 35233a314deba2c4b9d932047fb909f0_NeikiAnalytics.exe 29 PID 2208 wrote to memory of 2580 2208 Logo1_.exe 31 PID 2208 wrote to memory of 2580 2208 Logo1_.exe 31 PID 2208 wrote to memory of 2580 2208 Logo1_.exe 31 PID 2208 wrote to memory of 2580 2208 Logo1_.exe 31 PID 3036 wrote to memory of 2644 3036 cmd.exe 32 PID 3036 wrote to memory of 2644 3036 cmd.exe 32 PID 3036 wrote to memory of 2644 3036 cmd.exe 32 PID 3036 wrote to memory of 2644 3036 cmd.exe 32 PID 3036 wrote to memory of 2644 3036 cmd.exe 32 PID 3036 wrote to memory of 2644 3036 cmd.exe 32 PID 3036 wrote to memory of 2644 3036 cmd.exe 32 PID 2580 wrote to memory of 2600 2580 net.exe 34 PID 2580 wrote to memory of 2600 2580 net.exe 34 PID 2580 wrote to memory of 2600 2580 net.exe 34 PID 2580 wrote to memory of 2600 2580 net.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\35233a314deba2c4b9d932047fb909f0_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\35233a314deba2c4b9d932047fb909f0_NeikiAnalytics.exe"1⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2204 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$$aE72.bat2⤵
- Deletes itself
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:3036 -
C:\Users\Admin\AppData\Local\Temp\35233a314deba2c4b9d932047fb909f0_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\35233a314deba2c4b9d932047fb909f0_NeikiAnalytics.exe"3⤵
- Executes dropped EXE
PID:2644
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe2⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2208 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"3⤵
- Suspicious use of WriteProcessMemory
PID:2580 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"4⤵PID:2600
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
619B
MD57968912836a0e2f8f4aaa2793096db2e
SHA118c0ba13059cc614b14251ceefdf45b875f7885a
SHA2565b6f3973e7344437f24da6138fbdc04692f77b5b1ea1da99aa26fa9b5bb90c36
SHA512e6041450bdc9271b5cfeff5d3ff448be7eff37381b00dc38c9d84487c8f6916b7107c8125d34893d702fa4cec5a9a8865ae7afa568853366d0c855be7eb5750d
-
Filesize
694KB
MD5b0de85a29c0c43921883f2572f24042e
SHA10d1b0c04072035a595a96b87a7d9016392eb0484
SHA25606d0b436d252a6913cf444c968f4d8575818edc9ea4b03d949e1e09be47baacb
SHA512095638e3a65ef8f0b26d1d568d9de27ea3ecc992063b316bb04990d3155a906ac4f93eb1d7d1ee9935321d77de309cd1be31931293cc96da57118dc1de8a55e8
-
Filesize
66KB
MD5d5ce6e9a0095d2407a515cbb43bc623f
SHA1365caa12850a5db53dd6226b45883021d6622da0
SHA25639eac222b016827c94ac668e61aec5169d36202cb5dc23e014a1cdf43d838834
SHA5124af761ecea5b6b4738ab5d0542410e7a78e3f4d57a4e9660d94d8fd7130111277610bd672bd85204b8ca42aed06c953d5fbd9f2be7e67e19a9ade1944d40e122