Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
11-06-2024 23:47
Static task
static1
Behavioral task
behavioral1
Sample
0e151bf158cee4eb0de5c8dc297b09a0_NeikiAnalytics.exe
Resource
win7-20240221-en
General
-
Target
0e151bf158cee4eb0de5c8dc297b09a0_NeikiAnalytics.exe
-
Size
875KB
-
MD5
0e151bf158cee4eb0de5c8dc297b09a0
-
SHA1
382d97c653365402dc7b88703f01c22950a5e37f
-
SHA256
9b5362142a7a4cbb8fdd1f2d947ebedbde5289f245e3777601ff964672a1d700
-
SHA512
0e41168f3c4d757ac67ee4d03460d4b710d86115c04d9b04a8eb9550d17d52f8cc7fbeb91d29b8353ee594c545e8cc1542cf3804579751a2cc696d7b64da12df
-
SSDEEP
12288:GQWN/7YkrWBfWhvRhQUAIUfezD/LoN/MhVl1cJ6Q5joTeRH6R:GQWN/7DSBfWhA030Nc1ujo616
Malware Config
Signatures
-
Expiro payload 1 IoCs
resource yara_rule behavioral2/memory/2964-35-0x000000004AD00000-0x000000004AEFF000-memory.dmp family_expiro1 -
Executes dropped EXE 5 IoCs
pid Process 8 elevation_service.exe 1036 elevation_service.exe 3384 maintenanceservice.exe 4004 OSE.EXE 2748 ssh-agent.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops Chrome extension 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\dlddmedljhmbgdhapibnagaanenmajcm\1.0_0\manifest.json 0e151bf158cee4eb0de5c8dc297b09a0_NeikiAnalytics.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\L: 0e151bf158cee4eb0de5c8dc297b09a0_NeikiAnalytics.exe File opened (read-only) \??\R: 0e151bf158cee4eb0de5c8dc297b09a0_NeikiAnalytics.exe File opened (read-only) \??\T: 0e151bf158cee4eb0de5c8dc297b09a0_NeikiAnalytics.exe File opened (read-only) \??\U: 0e151bf158cee4eb0de5c8dc297b09a0_NeikiAnalytics.exe File opened (read-only) \??\V: 0e151bf158cee4eb0de5c8dc297b09a0_NeikiAnalytics.exe File opened (read-only) \??\N: 0e151bf158cee4eb0de5c8dc297b09a0_NeikiAnalytics.exe File opened (read-only) \??\O: 0e151bf158cee4eb0de5c8dc297b09a0_NeikiAnalytics.exe File opened (read-only) \??\Q: 0e151bf158cee4eb0de5c8dc297b09a0_NeikiAnalytics.exe File opened (read-only) \??\S: 0e151bf158cee4eb0de5c8dc297b09a0_NeikiAnalytics.exe File opened (read-only) \??\Y: 0e151bf158cee4eb0de5c8dc297b09a0_NeikiAnalytics.exe File opened (read-only) \??\Z: 0e151bf158cee4eb0de5c8dc297b09a0_NeikiAnalytics.exe File opened (read-only) \??\G: 0e151bf158cee4eb0de5c8dc297b09a0_NeikiAnalytics.exe File opened (read-only) \??\I: 0e151bf158cee4eb0de5c8dc297b09a0_NeikiAnalytics.exe File opened (read-only) \??\J: 0e151bf158cee4eb0de5c8dc297b09a0_NeikiAnalytics.exe File opened (read-only) \??\M: 0e151bf158cee4eb0de5c8dc297b09a0_NeikiAnalytics.exe File opened (read-only) \??\P: 0e151bf158cee4eb0de5c8dc297b09a0_NeikiAnalytics.exe File opened (read-only) \??\W: 0e151bf158cee4eb0de5c8dc297b09a0_NeikiAnalytics.exe File opened (read-only) \??\E: 0e151bf158cee4eb0de5c8dc297b09a0_NeikiAnalytics.exe File opened (read-only) \??\H: 0e151bf158cee4eb0de5c8dc297b09a0_NeikiAnalytics.exe File opened (read-only) \??\K: 0e151bf158cee4eb0de5c8dc297b09a0_NeikiAnalytics.exe File opened (read-only) \??\X: 0e151bf158cee4eb0de5c8dc297b09a0_NeikiAnalytics.exe -
Drops file in System32 directory 61 IoCs
description ioc Process File opened for modification \??\c:\windows\system32\locator.exe 0e151bf158cee4eb0de5c8dc297b09a0_NeikiAnalytics.exe File opened for modification \??\c:\windows\SysWOW64\openssh\ssh-agent.exe 0e151bf158cee4eb0de5c8dc297b09a0_NeikiAnalytics.exe File opened for modification \??\c:\windows\SysWOW64\vssvc.exe 0e151bf158cee4eb0de5c8dc297b09a0_NeikiAnalytics.exe File opened for modification \??\c:\windows\SysWOW64\searchindexer.exe 0e151bf158cee4eb0de5c8dc297b09a0_NeikiAnalytics.exe File created \??\c:\windows\SysWOW64\msiexec.vir 0e151bf158cee4eb0de5c8dc297b09a0_NeikiAnalytics.exe File opened for modification \??\c:\windows\system32\perceptionsimulation\perceptionsimulationservice.exe 0e151bf158cee4eb0de5c8dc297b09a0_NeikiAnalytics.exe File created \??\c:\windows\system32\wbengine.vir 0e151bf158cee4eb0de5c8dc297b09a0_NeikiAnalytics.exe File opened for modification \??\c:\windows\SysWOW64\diagsvcs\diagnosticshub.standardcollector.service.exe 0e151bf158cee4eb0de5c8dc297b09a0_NeikiAnalytics.exe File opened for modification \??\c:\windows\system32\sgrmbroker.exe 0e151bf158cee4eb0de5c8dc297b09a0_NeikiAnalytics.exe File opened for modification \??\c:\windows\system32\diagsvcs\diagnosticshub.standardcollector.service.exe 0e151bf158cee4eb0de5c8dc297b09a0_NeikiAnalytics.exe File opened for modification \??\c:\windows\system32\alg.exe 0e151bf158cee4eb0de5c8dc297b09a0_NeikiAnalytics.exe File opened for modification \??\c:\windows\SysWOW64\Appvclient.exe 0e151bf158cee4eb0de5c8dc297b09a0_NeikiAnalytics.exe File created \??\c:\windows\system32\openssh\ssh-agent.vir 0e151bf158cee4eb0de5c8dc297b09a0_NeikiAnalytics.exe File opened for modification \??\c:\windows\SysWOW64\wbem\wmiApsrv.exe 0e151bf158cee4eb0de5c8dc297b09a0_NeikiAnalytics.exe File opened for modification \??\c:\windows\SysWOW64\snmptrap.exe 0e151bf158cee4eb0de5c8dc297b09a0_NeikiAnalytics.exe File opened for modification \??\c:\windows\system32\Agentservice.exe 0e151bf158cee4eb0de5c8dc297b09a0_NeikiAnalytics.exe File created \??\c:\windows\system32\Agentservice.vir 0e151bf158cee4eb0de5c8dc297b09a0_NeikiAnalytics.exe File opened for modification \??\c:\windows\SysWOW64\vds.exe 0e151bf158cee4eb0de5c8dc297b09a0_NeikiAnalytics.exe File opened for modification \??\c:\windows\system32\msiexec.exe 0e151bf158cee4eb0de5c8dc297b09a0_NeikiAnalytics.exe File opened for modification \??\c:\windows\SysWOW64\sgrmbroker.exe 0e151bf158cee4eb0de5c8dc297b09a0_NeikiAnalytics.exe File created \??\c:\windows\system32\snmptrap.vir 0e151bf158cee4eb0de5c8dc297b09a0_NeikiAnalytics.exe File opened for modification \??\c:\windows\system32\searchindexer.exe 0e151bf158cee4eb0de5c8dc297b09a0_NeikiAnalytics.exe File opened for modification \??\c:\windows\system32\Appvclient.exe 0e151bf158cee4eb0de5c8dc297b09a0_NeikiAnalytics.exe File created \??\c:\windows\system32\Appvclient.vir 0e151bf158cee4eb0de5c8dc297b09a0_NeikiAnalytics.exe File opened for modification \??\c:\windows\SysWOW64\perfhost.exe 0e151bf158cee4eb0de5c8dc297b09a0_NeikiAnalytics.exe File opened for modification \??\c:\windows\system32\snmptrap.exe 0e151bf158cee4eb0de5c8dc297b09a0_NeikiAnalytics.exe File created \??\c:\windows\system32\msiexec.vir 0e151bf158cee4eb0de5c8dc297b09a0_NeikiAnalytics.exe File opened for modification \??\c:\windows\SysWOW64\locator.exe 0e151bf158cee4eb0de5c8dc297b09a0_NeikiAnalytics.exe File opened for modification \??\c:\windows\SysWOW64\Agentservice.exe 0e151bf158cee4eb0de5c8dc297b09a0_NeikiAnalytics.exe File opened for modification \??\c:\windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe 0e151bf158cee4eb0de5c8dc297b09a0_NeikiAnalytics.exe File opened for modification \??\c:\windows\system32\WindowsPowerShell\v1.0\powershell.exe 0e151bf158cee4eb0de5c8dc297b09a0_NeikiAnalytics.exe File opened for modification C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe 0e151bf158cee4eb0de5c8dc297b09a0_NeikiAnalytics.exe File opened for modification \??\c:\windows\system32\openssh\ssh-agent.exe 0e151bf158cee4eb0de5c8dc297b09a0_NeikiAnalytics.exe File opened for modification \??\c:\windows\system32\tieringengineservice.exe 0e151bf158cee4eb0de5c8dc297b09a0_NeikiAnalytics.exe File opened for modification \??\c:\windows\SysWOW64\svchost.exe 0e151bf158cee4eb0de5c8dc297b09a0_NeikiAnalytics.exe File opened for modification \??\c:\windows\SysWOW64\alg.exe 0e151bf158cee4eb0de5c8dc297b09a0_NeikiAnalytics.exe File opened for modification \??\c:\windows\SysWOW64\lsass.exe 0e151bf158cee4eb0de5c8dc297b09a0_NeikiAnalytics.exe File opened for modification \??\c:\windows\SysWOW64\sensordataservice.exe 0e151bf158cee4eb0de5c8dc297b09a0_NeikiAnalytics.exe File created \??\c:\windows\system32\WindowsPowerShell\v1.0\powershell.vir 0e151bf158cee4eb0de5c8dc297b09a0_NeikiAnalytics.exe File opened for modification \??\c:\windows\system32\sensordataservice.exe 0e151bf158cee4eb0de5c8dc297b09a0_NeikiAnalytics.exe File opened for modification \??\c:\windows\system32\vds.exe 0e151bf158cee4eb0de5c8dc297b09a0_NeikiAnalytics.exe File opened for modification \??\c:\windows\system32\wbengine.exe 0e151bf158cee4eb0de5c8dc297b09a0_NeikiAnalytics.exe File opened for modification \??\c:\windows\system32\svchost.exe 0e151bf158cee4eb0de5c8dc297b09a0_NeikiAnalytics.exe File opened for modification \??\c:\windows\SysWOW64\fxssvc.exe 0e151bf158cee4eb0de5c8dc297b09a0_NeikiAnalytics.exe File opened for modification \??\c:\windows\system32\fxssvc.exe 0e151bf158cee4eb0de5c8dc297b09a0_NeikiAnalytics.exe File opened for modification \??\c:\windows\system32\msdtc.exe 0e151bf158cee4eb0de5c8dc297b09a0_NeikiAnalytics.exe File created \??\c:\windows\system32\msdtc.vir 0e151bf158cee4eb0de5c8dc297b09a0_NeikiAnalytics.exe File opened for modification \??\c:\windows\SysWOW64\msiexec.exe 0e151bf158cee4eb0de5c8dc297b09a0_NeikiAnalytics.exe File opened for modification \??\c:\windows\SysWOW64\perceptionsimulation\perceptionsimulationservice.exe 0e151bf158cee4eb0de5c8dc297b09a0_NeikiAnalytics.exe File opened for modification \??\c:\windows\system32\dllhost.exe 0e151bf158cee4eb0de5c8dc297b09a0_NeikiAnalytics.exe File opened for modification \??\c:\windows\system32\lsass.exe 0e151bf158cee4eb0de5c8dc297b09a0_NeikiAnalytics.exe File opened for modification \??\c:\windows\SysWOW64\spectrum.exe 0e151bf158cee4eb0de5c8dc297b09a0_NeikiAnalytics.exe File opened for modification \??\c:\windows\system32\spectrum.exe 0e151bf158cee4eb0de5c8dc297b09a0_NeikiAnalytics.exe File created C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.vir 0e151bf158cee4eb0de5c8dc297b09a0_NeikiAnalytics.exe File opened for modification \??\c:\windows\SysWOW64\dllhost.exe 0e151bf158cee4eb0de5c8dc297b09a0_NeikiAnalytics.exe File created \??\c:\windows\system32\fxssvc.vir 0e151bf158cee4eb0de5c8dc297b09a0_NeikiAnalytics.exe File opened for modification \??\c:\windows\SysWOW64\msdtc.exe 0e151bf158cee4eb0de5c8dc297b09a0_NeikiAnalytics.exe File opened for modification \??\c:\windows\SysWOW64\tieringengineservice.exe 0e151bf158cee4eb0de5c8dc297b09a0_NeikiAnalytics.exe File opened for modification \??\c:\windows\system32\vssvc.exe 0e151bf158cee4eb0de5c8dc297b09a0_NeikiAnalytics.exe File opened for modification \??\c:\windows\SysWOW64\wbengine.exe 0e151bf158cee4eb0de5c8dc297b09a0_NeikiAnalytics.exe File opened for modification \??\c:\windows\system32\wbem\wmiApsrv.exe 0e151bf158cee4eb0de5c8dc297b09a0_NeikiAnalytics.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Microsoft Office\Office16\OSPPREARM.EXE 0e151bf158cee4eb0de5c8dc297b09a0_NeikiAnalytics.exe File created C:\Program Files\Java\jdk-1.8\bin\jabswitch.vir 0e151bf158cee4eb0de5c8dc297b09a0_NeikiAnalytics.exe File created C:\Program Files\Java\jdk-1.8\bin\servertool.vir 0e151bf158cee4eb0de5c8dc297b09a0_NeikiAnalytics.exe File created C:\Program Files\Java\jre-1.8\bin\java-rmi.vir 0e151bf158cee4eb0de5c8dc297b09a0_NeikiAnalytics.exe File created C:\Program Files\Java\jdk-1.8\bin\policytool.vir 0e151bf158cee4eb0de5c8dc297b09a0_NeikiAnalytics.exe File created C:\Program Files\Microsoft Office\root\Integration\Addons\OneDriveSetup.vir 0e151bf158cee4eb0de5c8dc297b09a0_NeikiAnalytics.exe File created C:\Program Files\Microsoft Office\root\Integration\Integrator.vir 0e151bf158cee4eb0de5c8dc297b09a0_NeikiAnalytics.exe File opened for modification C:\Program Files\Common Files\microsoft shared\MSInfo\msinfo32.exe 0e151bf158cee4eb0de5c8dc297b09a0_NeikiAnalytics.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\createdump.vir 0e151bf158cee4eb0de5c8dc297b09a0_NeikiAnalytics.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\appletviewer.exe 0e151bf158cee4eb0de5c8dc297b09a0_NeikiAnalytics.exe File created C:\Program Files\Java\jdk-1.8\bin\java-rmi.vir 0e151bf158cee4eb0de5c8dc297b09a0_NeikiAnalytics.exe File created C:\Program Files\Java\jre-1.8\bin\keytool.vir 0e151bf158cee4eb0de5c8dc297b09a0_NeikiAnalytics.exe File created C:\Program Files (x86)\Microsoft\Edge\Application\msedge.vir 0e151bf158cee4eb0de5c8dc297b09a0_NeikiAnalytics.exe File created C:\Program Files\Google\Chrome\Application\110.0.5481.104\chrome_pwa_launcher.vir 0e151bf158cee4eb0de5c8dc297b09a0_NeikiAnalytics.exe File opened for modification C:\Program Files\Google\Chrome\Application\110.0.5481.104\notification_helper.exe 0e151bf158cee4eb0de5c8dc297b09a0_NeikiAnalytics.exe File created C:\Program Files\Java\jdk-1.8\bin\rmid.vir 0e151bf158cee4eb0de5c8dc297b09a0_NeikiAnalytics.exe File created C:\Program Files\Java\jre-1.8\bin\javacpl.vir 0e151bf158cee4eb0de5c8dc297b09a0_NeikiAnalytics.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\OfficeC2RClient.vir 0e151bf158cee4eb0de5c8dc297b09a0_NeikiAnalytics.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\8.0.2\createdump.vir 0e151bf158cee4eb0de5c8dc297b09a0_NeikiAnalytics.exe File created C:\Program Files\Java\jdk-1.8\bin\jhat.vir 0e151bf158cee4eb0de5c8dc297b09a0_NeikiAnalytics.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\TabTip.exe 0e151bf158cee4eb0de5c8dc297b09a0_NeikiAnalytics.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\idlj.exe 0e151bf158cee4eb0de5c8dc297b09a0_NeikiAnalytics.exe File created C:\Program Files\Java\jdk-1.8\bin\jarsigner.vir 0e151bf158cee4eb0de5c8dc297b09a0_NeikiAnalytics.exe File created C:\Program Files\Java\jre-1.8\bin\java.vir 0e151bf158cee4eb0de5c8dc297b09a0_NeikiAnalytics.exe File created C:\Program Files\Java\jdk-1.8\bin\javac.vir 0e151bf158cee4eb0de5c8dc297b09a0_NeikiAnalytics.exe File created C:\Program Files\Java\jdk-1.8\bin\javaws.vir 0e151bf158cee4eb0de5c8dc297b09a0_NeikiAnalytics.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jps.exe 0e151bf158cee4eb0de5c8dc297b09a0_NeikiAnalytics.exe File created C:\Program Files\Java\jdk-1.8\bin\jinfo.vir 0e151bf158cee4eb0de5c8dc297b09a0_NeikiAnalytics.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\pack200.exe 0e151bf158cee4eb0de5c8dc297b09a0_NeikiAnalytics.exe File created C:\Program Files\Java\jdk-1.8\bin\wsgen.vir 0e151bf158cee4eb0de5c8dc297b09a0_NeikiAnalytics.exe File created C:\Program Files\Java\jdk-1.8\jre\bin\orbd.vir 0e151bf158cee4eb0de5c8dc297b09a0_NeikiAnalytics.exe File created C:\Program Files\Google\Chrome\Application\110.0.5481.104\Installer\setup.vir 0e151bf158cee4eb0de5c8dc297b09a0_NeikiAnalytics.exe File created C:\Program Files\Java\jdk-1.8\bin\javapackager.vir 0e151bf158cee4eb0de5c8dc297b09a0_NeikiAnalytics.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\javaws.exe 0e151bf158cee4eb0de5c8dc297b09a0_NeikiAnalytics.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\keytool.exe 0e151bf158cee4eb0de5c8dc297b09a0_NeikiAnalytics.exe File opened for modification C:\Program Files\Microsoft Office\root\Client\AppVDllSurrogate64.exe 0e151bf158cee4eb0de5c8dc297b09a0_NeikiAnalytics.exe File opened for modification C:\Program Files\Google\Chrome\Application\110.0.5481.104\chrome_pwa_launcher.exe 0e151bf158cee4eb0de5c8dc297b09a0_NeikiAnalytics.exe File created C:\Program Files\Internet Explorer\ielowutil.vir 0e151bf158cee4eb0de5c8dc297b09a0_NeikiAnalytics.exe File created C:\Program Files\Java\jdk-1.8\bin\rmiregistry.vir 0e151bf158cee4eb0de5c8dc297b09a0_NeikiAnalytics.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\java.exe 0e151bf158cee4eb0de5c8dc297b09a0_NeikiAnalytics.exe File created C:\Program Files\Java\jdk-1.8\bin\javah.vir 0e151bf158cee4eb0de5c8dc297b09a0_NeikiAnalytics.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\rmiregistry.exe 0e151bf158cee4eb0de5c8dc297b09a0_NeikiAnalytics.exe File created C:\Program Files\7-Zip\7zG.vir 0e151bf158cee4eb0de5c8dc297b09a0_NeikiAnalytics.exe File created C:\Program Files\Common Files\microsoft shared\ink\InputPersonalization.vir 0e151bf158cee4eb0de5c8dc297b09a0_NeikiAnalytics.exe File opened for modification C:\Program Files\Common Files\microsoft shared\OFFICE16\LICLUA.EXE 0e151bf158cee4eb0de5c8dc297b09a0_NeikiAnalytics.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jrunscript.exe 0e151bf158cee4eb0de5c8dc297b09a0_NeikiAnalytics.exe File created C:\Program Files\Java\jdk-1.8\jre\bin\kinit.vir 0e151bf158cee4eb0de5c8dc297b09a0_NeikiAnalytics.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\javacpl.exe 0e151bf158cee4eb0de5c8dc297b09a0_NeikiAnalytics.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\rmid.exe 0e151bf158cee4eb0de5c8dc297b09a0_NeikiAnalytics.exe File created \??\c:\program files (x86)\mozilla maintenance service\maintenanceservice.vir 0e151bf158cee4eb0de5c8dc297b09a0_NeikiAnalytics.exe File created C:\Program Files\Java\jdk-1.8\bin\native2ascii.vir 0e151bf158cee4eb0de5c8dc297b09a0_NeikiAnalytics.exe File created C:\Program Files\Java\jdk-1.8\jre\bin\rmid.vir 0e151bf158cee4eb0de5c8dc297b09a0_NeikiAnalytics.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\javaws.exe 0e151bf158cee4eb0de5c8dc297b09a0_NeikiAnalytics.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jstack.exe 0e151bf158cee4eb0de5c8dc297b09a0_NeikiAnalytics.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\jjs.exe 0e151bf158cee4eb0de5c8dc297b09a0_NeikiAnalytics.exe File created C:\Program Files\Java\jdk-1.8\jre\bin\jjs.vir 0e151bf158cee4eb0de5c8dc297b09a0_NeikiAnalytics.exe File created C:\Program Files\Java\jdk-1.8\jre\bin\servertool.vir 0e151bf158cee4eb0de5c8dc297b09a0_NeikiAnalytics.exe File created C:\Program Files\7-Zip\7zFM.vir 0e151bf158cee4eb0de5c8dc297b09a0_NeikiAnalytics.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\appvcleaner.exe 0e151bf158cee4eb0de5c8dc297b09a0_NeikiAnalytics.exe File created C:\Program Files\Common Files\microsoft shared\MSInfo\msinfo32.vir 0e151bf158cee4eb0de5c8dc297b09a0_NeikiAnalytics.exe File created C:\Program Files\Google\Chrome\Application\110.0.5481.104\notification_helper.vir 0e151bf158cee4eb0de5c8dc297b09a0_NeikiAnalytics.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\javacpl.exe 0e151bf158cee4eb0de5c8dc297b09a0_NeikiAnalytics.exe File created C:\Program Files\Java\jre-1.8\bin\rmiregistry.vir 0e151bf158cee4eb0de5c8dc297b09a0_NeikiAnalytics.exe File created C:\Program Files\Microsoft Office\root\Client\AppVDllSurrogate64.vir 0e151bf158cee4eb0de5c8dc297b09a0_NeikiAnalytics.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification \??\c:\windows\servicing\trustedinstaller.exe 0e151bf158cee4eb0de5c8dc297b09a0_NeikiAnalytics.exe File opened for modification \??\c:\windows\microsoft.net\framework64\v3.0\wpf\presentationfontcache.exe 0e151bf158cee4eb0de5c8dc297b09a0_NeikiAnalytics.exe -
Suspicious behavior: LoadsDriver 2 IoCs
pid Process 652 Process not Found 652 Process not Found -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeTakeOwnershipPrivilege 2964 0e151bf158cee4eb0de5c8dc297b09a0_NeikiAnalytics.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\0e151bf158cee4eb0de5c8dc297b09a0_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\0e151bf158cee4eb0de5c8dc297b09a0_NeikiAnalytics.exe"1⤵
- Drops Chrome extension
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:2964
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵
- Executes dropped EXE
PID:8
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\elevation_service.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\elevation_service.exe"1⤵
- Executes dropped EXE
PID:1036
-
C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe"C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe"1⤵
- Executes dropped EXE
PID:3384
-
\??\c:\Program Files\Common Files\Microsoft Shared\Source Engine\OSE.EXE"c:\Program Files\Common Files\Microsoft Shared\Source Engine\OSE.EXE"1⤵
- Executes dropped EXE
PID:4004
-
C:\Windows\System32\OpenSSH\ssh-agent.exeC:\Windows\System32\OpenSSH\ssh-agent.exe1⤵
- Executes dropped EXE
PID:2748
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.0MB
MD54cafc1a8e48df58261715971f0541f36
SHA13182b9b838ef30e3578e968650092b578b7051d0
SHA2565be8979dfe1349eda329be19380a3e52c0476277cdc9bc7319eb5d651ec14333
SHA51271eb14716ab62de8223cf47a2fd323cc9d0bde06abbe462a565db8405a80d5f9cc34408534bedcde5525b542c27b6f2bcfa87655c10496b888e9ef9c386256a0
-
Filesize
727KB
MD5db065dcd5704bbe1f37396978ef6cf59
SHA1a3d9beb81f69c0a6d9a077786faf9a95142de865
SHA256e86ea905781ce022ce6b20d33a07080a85164f3cfe26ec1d21d1ba6e7153e9e3
SHA51285d96a634a8c63c973f2a0e88465e5243adb92b6a4dfc3c721b25f96c7b500f7d413bbfaa1290379d61d03eac424d0e37e3eee399ef3b5ab07d46be7a0e7a74f
-
Filesize
736KB
MD52357ebc758a8af52246f46e9bfb9d06a
SHA10a0def5fd86f42b832386eddd8b6fb7968299e75
SHA256ae34bd055bff347ebdbb3a4dba005c61a43fab7303dd87266e531342c8189be1
SHA5125ea0b374d947f1cfca066a235a40433de1d3f8eba4e71ca8ebeabd05e1fbbf4528f2e9edeafa9b95935efef796243aa2307cba4f331e0798a41e306699281212
-
Filesize
5.3MB
MD5188982750fba34b33f39ee427a952f91
SHA190ec6a7f563fb86d62486a79e3b8a5b5d750a93d
SHA256fdc16c2c6e9c2a7774bc00d1b3e2b7b3f725e7deb18573a549d41586eb4fb0b7
SHA5128bdc112591eb0bac988fe6b98647e8bdb1fa9d3eb2b61a0ef2e73ea87cf2dcbcaa9a52e2aef3688488eaa23515b2f0bcd995e83dcf7b97cf6067b597a945c689
-
Filesize
2.1MB
MD5c4317c51d54a4b9fbf05d7dc5457331e
SHA1e18a9b7e1785cdb633a48a94f4de031975ff08b0
SHA25652f230295206938dd89585d5e56afdad87b7c9e5dda2b3980e1005e1029ed8f0
SHA512d1fab77e7e345737f84bbc4c82407c53e04996bad2e6a2b57230368b1567a80e5aad093e84fa98f231609dede622777dbb7c683b37bd09dd49643c5200ffaaee
-
Filesize
1.3MB
MD5294974f5765823ed6d795648b16ddbdc
SHA11534ed61b2413fa9399ba1de9833d73bf7c45439
SHA256e8d8b7711882763d876562c664755f33c4fa8bdfb33c1268523a7e94282cf760
SHA512d721a6b534e2b7110cc0ca683955baf342eaff75c5ce50136a9408196e00071ae6492ca04e20171a8f8a5417cc3831f7145e198cd49581d8a875621ef4468beb
-
Filesize
919KB
MD568e1eb120293650f652cbf436293ae02
SHA143c7d9a2e2b491e8d8024afb503e5170141580ed
SHA256750403146ebab9354d8f0ae3e5087bc0053494313953e9edb6c5afb3c7e1ace7
SHA5129dc1b4113c6f902b683cc185f54696d7c9ecc5d6ec4ac27ea16eb8a61c3383ce7ad12a928ea0558ae305ac78c9147da883b57207a672e944ce97e660182ee94b
-
Filesize
1.2MB
MD5a2311b03bedf9534da3196a22093f05d
SHA19b440ed5b9335f9676164ec53cfcc7dedf4ec253
SHA256d592b707a51827e65254efc0e3bf1642171636ab41a048c8b7a52977db0b526d
SHA5120607be5106eaa038c10f6356be7258f3292110adbe0cfb8b96d44ef2e5d6ff655e39bca85076c8ccd89bbff5156b19fe88dcd4f6dd5c880b17aaec9150ac97c3
-
Filesize
870KB
MD53a71fd0ab8a5efec3e32a57c3bfce078
SHA148ce22f53222f2039395dab6d10dbd346aa3aec1
SHA25692066d62e59ce1fe128df98845c56bb9d51122716da0cdc71a6aa0d27646a08d
SHA51291c68d5faf252996ac135416c86668a59ffc08efc5561251e21b8533bea273434f57d6133eea46e19da0b617917ce470100f4fc8e984b6b17fc8ffd7aa11d382