Analysis
-
max time kernel
0s -
max time network
97s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
07/06/2024, 08:41
Static task
static1
Behavioral task
behavioral1
Sample
4651390cce6ca4ff2990897e76a9f150_NeikiAnalytics.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
4651390cce6ca4ff2990897e76a9f150_NeikiAnalytics.exe
Resource
win10v2004-20240426-en
General
-
Target
4651390cce6ca4ff2990897e76a9f150_NeikiAnalytics.exe
-
Size
66KB
-
MD5
4651390cce6ca4ff2990897e76a9f150
-
SHA1
6844d704a06807b18016cffadc359861aafcc239
-
SHA256
69296ab0cb190d814fee224de6fcd14ebf7894b165cc8fec750690559379dc09
-
SHA512
599fbedb0db8895a4a2508b57bb868ee80cad5c5bcaea71822bcee2bb345dc41af313c3e3142bc67ead20a45d349baca6b0b05c8ac549b1ccecf6890567cc0ab
-
SSDEEP
1536:EHfetdklPp+07gDSrB8Xru2zGeJxgawTzpXzrDJrXiv:IeklMMYJhqezw/pXzH9iv
Malware Config
Signatures
-
Executes dropped EXE 3 IoCs
pid Process 4920 explorer.exe 4444 spoolsv.exe 1576 svchost.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File opened for modification \??\c:\windows\system\explorer.exe 4651390cce6ca4ff2990897e76a9f150_NeikiAnalytics.exe File opened for modification \??\c:\windows\system\spoolsv.exe explorer.exe File opened for modification \??\c:\windows\system\svchost.exe spoolsv.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4948 4651390cce6ca4ff2990897e76a9f150_NeikiAnalytics.exe 4948 4651390cce6ca4ff2990897e76a9f150_NeikiAnalytics.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 4948 4651390cce6ca4ff2990897e76a9f150_NeikiAnalytics.exe 4948 4651390cce6ca4ff2990897e76a9f150_NeikiAnalytics.exe 4920 explorer.exe 4920 explorer.exe 4444 spoolsv.exe 4444 spoolsv.exe 1576 svchost.exe 1576 svchost.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4948 wrote to memory of 4920 4948 4651390cce6ca4ff2990897e76a9f150_NeikiAnalytics.exe 81 PID 4948 wrote to memory of 4920 4948 4651390cce6ca4ff2990897e76a9f150_NeikiAnalytics.exe 81 PID 4948 wrote to memory of 4920 4948 4651390cce6ca4ff2990897e76a9f150_NeikiAnalytics.exe 81 PID 4920 wrote to memory of 4444 4920 explorer.exe 82 PID 4920 wrote to memory of 4444 4920 explorer.exe 82 PID 4920 wrote to memory of 4444 4920 explorer.exe 82 PID 4444 wrote to memory of 1576 4444 spoolsv.exe 84 PID 4444 wrote to memory of 1576 4444 spoolsv.exe 84 PID 4444 wrote to memory of 1576 4444 spoolsv.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\4651390cce6ca4ff2990897e76a9f150_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\4651390cce6ca4ff2990897e76a9f150_NeikiAnalytics.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4948 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe2⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4920 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE3⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4444 -
\??\c:\windows\system\svchost.exec:\windows\system\svchost.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1576 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe PR5⤵PID:372
-
-
C:\Windows\SysWOW64\at.exeat 08:58 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe5⤵PID:1724
-
-
C:\Windows\SysWOW64\at.exeat 08:59 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe5⤵PID:4668
-
-
C:\Windows\SysWOW64\at.exeat 09:00 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe5⤵PID:872
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
66KB
MD58f362b64906487a94f6a35d9759b854f
SHA19f02d81db9601d2471bf268f25345e073acda525
SHA256bff3bc79bc4f358f97b1461687a05e98b34cf0b5879dd6368822457f744a5359
SHA5127b5b183e32b19a428a1d39bfd5599b1ec0a206de7d0740fb38922c59b265fdebdbc965f878d6046cf48d5686327c2693bf9fe5ad06ab934a3aa33dac453f5ab8
-
Filesize
66KB
MD5d21de824660d074abeaaa3b002df005b
SHA11a5901535935eb67aea5a060cfc553a55f0f0526
SHA2569fbef1ad11b07f814270fd611593434bbeb0ff1eb6f532ad453d7e938b7f6352
SHA51231cda993d421fed6a79b73ec031f39292394fd4198e16f1b1f24e2f5a991548e7732c217a37b1dc83a2e01c2e092dc9c62c7bd91b442e0f4a847e839035ef650
-
Filesize
66KB
MD53d56421f5c56752e8f58d7b260f8d375
SHA16adc588e6b391e4e995ed3c0cde7f3de9264e0bf
SHA2563f472cd1a8c1c537883c4af74bb66655127658854d7ea262024ce1ba238d0162
SHA512dd4c3a6bfacc59350a09ce9cc263252f1bb676e55bcbd9b85ce50fb82ec762638c85fd6778f1053a783b1c77a8d2ce8df262ad57da4addac76fdd5106d242d37
-
Filesize
66KB
MD5b063f4906f019c7179f9c31a79a78792
SHA16d5c67e568b8cec023190d944d572b0a56310772
SHA2563bf17da7e412c31dc28fb37d974f9b59f5ac9d4df3590b1e244c51f45275587f
SHA5126b7060b5a4bcef0bfc3718d75092ab14bba9be8de82dc4cfba7c5bd469f8be1f5b9595870ed504783ef345780ed03e8487f7c0c9ec2d6c2b1f2a00ab4472325a