Analysis
-
max time kernel
150s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
07/06/2024, 05:19
Static task
static1
Behavioral task
behavioral1
Sample
3ae9b7c24748ed0e9afcf50bdd5f4d00_NeikiAnalytics.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
3ae9b7c24748ed0e9afcf50bdd5f4d00_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
3ae9b7c24748ed0e9afcf50bdd5f4d00_NeikiAnalytics.exe
-
Size
135KB
-
MD5
3ae9b7c24748ed0e9afcf50bdd5f4d00
-
SHA1
97c294fc50a9d61298bb5a1bea4b6aae06549c06
-
SHA256
6f2a637c20bce16a189f62fc122a8d55793cf01535e7f750634a2106205a2398
-
SHA512
ed305c45dba1c6e721f466c623c3058b337d90e46984f403fb9ef529b9f57e8648904194cae838890e600dca484224fc3193f025acb82598b37372b09c843ad0
-
SSDEEP
1536:UfsEqouTRcG/Mzvgf7xEuvnXNTRdUzwTekUOisZ1yDDajtXbV0hY/:UVqoCl/YgjxEufVU0TbTyDDalh/
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" svchost.exe -
Executes dropped EXE 4 IoCs
pid Process 944 explorer.exe 1000 spoolsv.exe 4268 svchost.exe 3044 spoolsv.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\resources\\svchost.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\resources\\themes\\explorer.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\resources\\svchost.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\resources\\themes\\explorer.exe RO" explorer.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\explorer.exe explorer.exe File opened for modification C:\Windows\SysWOW64\explorer.exe svchost.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification \??\c:\windows\resources\themes\explorer.exe 3ae9b7c24748ed0e9afcf50bdd5f4d00_NeikiAnalytics.exe File opened for modification \??\c:\windows\resources\spoolsv.exe explorer.exe File opened for modification \??\c:\windows\resources\svchost.exe spoolsv.exe File opened for modification C:\Windows\Resources\tjud.exe explorer.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1700 3ae9b7c24748ed0e9afcf50bdd5f4d00_NeikiAnalytics.exe 1700 3ae9b7c24748ed0e9afcf50bdd5f4d00_NeikiAnalytics.exe 1700 3ae9b7c24748ed0e9afcf50bdd5f4d00_NeikiAnalytics.exe 1700 3ae9b7c24748ed0e9afcf50bdd5f4d00_NeikiAnalytics.exe 1700 3ae9b7c24748ed0e9afcf50bdd5f4d00_NeikiAnalytics.exe 1700 3ae9b7c24748ed0e9afcf50bdd5f4d00_NeikiAnalytics.exe 1700 3ae9b7c24748ed0e9afcf50bdd5f4d00_NeikiAnalytics.exe 1700 3ae9b7c24748ed0e9afcf50bdd5f4d00_NeikiAnalytics.exe 1700 3ae9b7c24748ed0e9afcf50bdd5f4d00_NeikiAnalytics.exe 1700 3ae9b7c24748ed0e9afcf50bdd5f4d00_NeikiAnalytics.exe 1700 3ae9b7c24748ed0e9afcf50bdd5f4d00_NeikiAnalytics.exe 1700 3ae9b7c24748ed0e9afcf50bdd5f4d00_NeikiAnalytics.exe 1700 3ae9b7c24748ed0e9afcf50bdd5f4d00_NeikiAnalytics.exe 1700 3ae9b7c24748ed0e9afcf50bdd5f4d00_NeikiAnalytics.exe 1700 3ae9b7c24748ed0e9afcf50bdd5f4d00_NeikiAnalytics.exe 1700 3ae9b7c24748ed0e9afcf50bdd5f4d00_NeikiAnalytics.exe 1700 3ae9b7c24748ed0e9afcf50bdd5f4d00_NeikiAnalytics.exe 1700 3ae9b7c24748ed0e9afcf50bdd5f4d00_NeikiAnalytics.exe 1700 3ae9b7c24748ed0e9afcf50bdd5f4d00_NeikiAnalytics.exe 1700 3ae9b7c24748ed0e9afcf50bdd5f4d00_NeikiAnalytics.exe 1700 3ae9b7c24748ed0e9afcf50bdd5f4d00_NeikiAnalytics.exe 1700 3ae9b7c24748ed0e9afcf50bdd5f4d00_NeikiAnalytics.exe 1700 3ae9b7c24748ed0e9afcf50bdd5f4d00_NeikiAnalytics.exe 1700 3ae9b7c24748ed0e9afcf50bdd5f4d00_NeikiAnalytics.exe 1700 3ae9b7c24748ed0e9afcf50bdd5f4d00_NeikiAnalytics.exe 1700 3ae9b7c24748ed0e9afcf50bdd5f4d00_NeikiAnalytics.exe 1700 3ae9b7c24748ed0e9afcf50bdd5f4d00_NeikiAnalytics.exe 1700 3ae9b7c24748ed0e9afcf50bdd5f4d00_NeikiAnalytics.exe 1700 3ae9b7c24748ed0e9afcf50bdd5f4d00_NeikiAnalytics.exe 1700 3ae9b7c24748ed0e9afcf50bdd5f4d00_NeikiAnalytics.exe 1700 3ae9b7c24748ed0e9afcf50bdd5f4d00_NeikiAnalytics.exe 1700 3ae9b7c24748ed0e9afcf50bdd5f4d00_NeikiAnalytics.exe 1700 3ae9b7c24748ed0e9afcf50bdd5f4d00_NeikiAnalytics.exe 1700 3ae9b7c24748ed0e9afcf50bdd5f4d00_NeikiAnalytics.exe 944 explorer.exe 944 explorer.exe 944 explorer.exe 944 explorer.exe 944 explorer.exe 944 explorer.exe 944 explorer.exe 944 explorer.exe 944 explorer.exe 944 explorer.exe 944 explorer.exe 944 explorer.exe 944 explorer.exe 944 explorer.exe 944 explorer.exe 944 explorer.exe 944 explorer.exe 944 explorer.exe 944 explorer.exe 944 explorer.exe 944 explorer.exe 944 explorer.exe 944 explorer.exe 944 explorer.exe 944 explorer.exe 944 explorer.exe 944 explorer.exe 944 explorer.exe 944 explorer.exe 944 explorer.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 944 explorer.exe 4268 svchost.exe -
Suspicious use of SetWindowsHookEx 10 IoCs
pid Process 1700 3ae9b7c24748ed0e9afcf50bdd5f4d00_NeikiAnalytics.exe 1700 3ae9b7c24748ed0e9afcf50bdd5f4d00_NeikiAnalytics.exe 944 explorer.exe 944 explorer.exe 1000 spoolsv.exe 1000 spoolsv.exe 4268 svchost.exe 4268 svchost.exe 3044 spoolsv.exe 3044 spoolsv.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1700 wrote to memory of 944 1700 3ae9b7c24748ed0e9afcf50bdd5f4d00_NeikiAnalytics.exe 83 PID 1700 wrote to memory of 944 1700 3ae9b7c24748ed0e9afcf50bdd5f4d00_NeikiAnalytics.exe 83 PID 1700 wrote to memory of 944 1700 3ae9b7c24748ed0e9afcf50bdd5f4d00_NeikiAnalytics.exe 83 PID 944 wrote to memory of 1000 944 explorer.exe 84 PID 944 wrote to memory of 1000 944 explorer.exe 84 PID 944 wrote to memory of 1000 944 explorer.exe 84 PID 1000 wrote to memory of 4268 1000 spoolsv.exe 85 PID 1000 wrote to memory of 4268 1000 spoolsv.exe 85 PID 1000 wrote to memory of 4268 1000 spoolsv.exe 85 PID 4268 wrote to memory of 3044 4268 svchost.exe 86 PID 4268 wrote to memory of 3044 4268 svchost.exe 86 PID 4268 wrote to memory of 3044 4268 svchost.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\3ae9b7c24748ed0e9afcf50bdd5f4d00_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\3ae9b7c24748ed0e9afcf50bdd5f4d00_NeikiAnalytics.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1700 -
\??\c:\windows\resources\themes\explorer.exec:\windows\resources\themes\explorer.exe2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:944 -
\??\c:\windows\resources\spoolsv.exec:\windows\resources\spoolsv.exe SE3⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1000 -
\??\c:\windows\resources\svchost.exec:\windows\resources\svchost.exe4⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4268 -
\??\c:\windows\resources\spoolsv.exec:\windows\resources\spoolsv.exe PR5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3044
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
135KB
MD5b4567829aa19856bfc51960ad309e992
SHA1846c6213fff8e8d6df0168b3d36e53454b4e09cb
SHA256e8df0823ac642db8615046c674d2aceee80ddf07108d6cc72047015b2dd31047
SHA51217b84edbccbece34546cfd17191a00b88c69420bd4cf48c9fef39f9632f52ab81c6ee320f52b0bbabe396f817c3cd826ae0c9f6b6a8571e16b324a3635c2442e
-
Filesize
135KB
MD54da82e7e37022d5410ba1d4c772b58cd
SHA1ab01a030d1ca0c1c19a5a44a7a87155582148e87
SHA256a29ced7007bcb1d72878f01e84d9c2e770df9cb0d5e2691e7a5c451130e4a01f
SHA512167c3613ad5d44c536b97428f8055a6fa9a17804394b96adb73cd4c3f4ee60c7b89199bf705d40f5fa83677b4a39d0729b3f526aa18c78b20d7b9d2c56abbcb1
-
Filesize
135KB
MD545c9edff3950f51da09436509c8e21c6
SHA112aaec6c37fe85b3c85353f07ceeae9b02515058
SHA2566bbe117c703b3959a088e7f5dfd95b92dbbf7286d5bee2a99a050d05276c49d4
SHA51222b7df07a375d7f3e3b4cd7e3b78d7c9605bfec39abab5aba14ecea01a4051a9f7ef60a7cb18383505940af7d916c84d2be6cb0131c4a8d9d6dbe058331dfaa6