Analysis Overview
SHA256
e06f0b3475cf372ae4ca2b4fc52a3b0a25ac32217e3fb44131bba88faf5bab22
Threat Level: Shows suspicious behavior
The file 333c162ad695fb918bd3aae018fae0d0_NeikiAnalytics.exe was found to be: Shows suspicious behavior.
Malicious Activity Summary
Executes dropped EXE
Loads dropped DLL
Adds Run key to start application
Unsigned PE
Suspicious behavior: EnumeratesProcesses
Suspicious use of WriteProcessMemory
MITRE ATT&CK
Enterprise Matrix V15
Analysis: static1
Detonation Overview
Reported
2024-06-11 11:28
Signatures
Unsigned PE
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Analysis: behavioral1
Detonation Overview
Submitted
2024-06-11 11:28
Reported
2024-06-11 11:31
Platform
win7-20240215-en
Max time kernel
149s
Max time network
122s
Command Line
Signatures
Executes dropped EXE
| Description | Indicator | Process | Target |
| N/A | N/A | C:\SysDrvZV\abodsys.exe | N/A |
Loads dropped DLL
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\333c162ad695fb918bd3aae018fae0d0_NeikiAnalytics.exe | N/A |
Adds Run key to start application
| Description | Indicator | Process | Target |
| Set value (str) | \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Run\Parametr = "C:\\SysDrvZV\\abodsys.exe" | C:\Users\Admin\AppData\Local\Temp\333c162ad695fb918bd3aae018fae0d0_NeikiAnalytics.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\Parametr = "C:\\KaVBWE\\dobaec.exe" | C:\Users\Admin\AppData\Local\Temp\333c162ad695fb918bd3aae018fae0d0_NeikiAnalytics.exe | N/A |
Suspicious behavior: EnumeratesProcesses
Suspicious use of WriteProcessMemory
| Description | Indicator | Process | Target |
| PID 2108 wrote to memory of 2796 | N/A | C:\Users\Admin\AppData\Local\Temp\333c162ad695fb918bd3aae018fae0d0_NeikiAnalytics.exe | C:\SysDrvZV\abodsys.exe |
| PID 2108 wrote to memory of 2796 | N/A | C:\Users\Admin\AppData\Local\Temp\333c162ad695fb918bd3aae018fae0d0_NeikiAnalytics.exe | C:\SysDrvZV\abodsys.exe |
| PID 2108 wrote to memory of 2796 | N/A | C:\Users\Admin\AppData\Local\Temp\333c162ad695fb918bd3aae018fae0d0_NeikiAnalytics.exe | C:\SysDrvZV\abodsys.exe |
| PID 2108 wrote to memory of 2796 | N/A | C:\Users\Admin\AppData\Local\Temp\333c162ad695fb918bd3aae018fae0d0_NeikiAnalytics.exe | C:\SysDrvZV\abodsys.exe |
Processes
C:\Users\Admin\AppData\Local\Temp\333c162ad695fb918bd3aae018fae0d0_NeikiAnalytics.exe
"C:\Users\Admin\AppData\Local\Temp\333c162ad695fb918bd3aae018fae0d0_NeikiAnalytics.exe"
C:\SysDrvZV\abodsys.exe
C:\SysDrvZV\abodsys.exe
Network
Files
\SysDrvZV\abodsys.exe
| MD5 | 57e9ebbc849473f10b5c0bfae65d4ff1 |
| SHA1 | ce0db473a4a2ba3d3cfde2cc7d97a435e34fe798 |
| SHA256 | d14de5ea073acad60f2f6bb89d334a914f9a1b03856cf0c518a1e9aa993f0ec4 |
| SHA512 | 887afdf1889c1b6e450bce7faa8213d0fe05423a099b030894e7ff474daba857626abc1541320af7818161f8227430fc28e6cdd27827ddd885d75c21563f9757 |
C:\Users\Admin\253086396416_6.1_Admin.ini
| MD5 | 428b50e02bab583797ed9ff924579807 |
| SHA1 | 35eacf2b1cee25f42869cd7dec01194f3a5fd566 |
| SHA256 | de118ca96fe9a295e43f7bff2a03940446d223ca277fd8890f27d561595a49a5 |
| SHA512 | bc303de23513e3c68d763ed11b176c32a2bd508aeda1e3e4e767f2dffe19e66d7b5676c40058f880545a887e4bcdf86011804a5cb1574a0abc48c9571110b286 |
C:\KaVBWE\dobaec.exe
| MD5 | 63bab2a3c7e25f2c9674fcb565918f94 |
| SHA1 | 33aaa5ef7a0d2233a1ebc23c439fbeb390ee6d8f |
| SHA256 | 47c228f58f54921aa831b490f9a985a3f910768e51fe9f3dfcac8f467f95f9de |
| SHA512 | 647f142fef4458dfbda9880e5b130f131d586026ef6eccda01e59cc5ca69b668d0762a54d035c382ac3460baed9f01ae6c6df1dcd2f71f1aef593a2ada743431 |
Analysis: behavioral2
Detonation Overview
Submitted
2024-06-11 11:28
Reported
2024-06-11 11:31
Platform
win10v2004-20240508-en
Max time kernel
149s
Max time network
51s
Command Line
Signatures
Executes dropped EXE
| Description | Indicator | Process | Target |
| N/A | N/A | C:\UserDotGH\devdobloc.exe | N/A |
Adds Run key to start application
| Description | Indicator | Process | Target |
| Set value (str) | \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Parametr = "C:\\UserDotGH\\devdobloc.exe" | C:\Users\Admin\AppData\Local\Temp\333c162ad695fb918bd3aae018fae0d0_NeikiAnalytics.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Parametr = "C:\\MintRO\\dobaec.exe" | C:\Users\Admin\AppData\Local\Temp\333c162ad695fb918bd3aae018fae0d0_NeikiAnalytics.exe | N/A |
Suspicious behavior: EnumeratesProcesses
Suspicious use of WriteProcessMemory
| Description | Indicator | Process | Target |
| PID 344 wrote to memory of 1940 | N/A | C:\Users\Admin\AppData\Local\Temp\333c162ad695fb918bd3aae018fae0d0_NeikiAnalytics.exe | C:\UserDotGH\devdobloc.exe |
| PID 344 wrote to memory of 1940 | N/A | C:\Users\Admin\AppData\Local\Temp\333c162ad695fb918bd3aae018fae0d0_NeikiAnalytics.exe | C:\UserDotGH\devdobloc.exe |
| PID 344 wrote to memory of 1940 | N/A | C:\Users\Admin\AppData\Local\Temp\333c162ad695fb918bd3aae018fae0d0_NeikiAnalytics.exe | C:\UserDotGH\devdobloc.exe |
Processes
C:\Users\Admin\AppData\Local\Temp\333c162ad695fb918bd3aae018fae0d0_NeikiAnalytics.exe
"C:\Users\Admin\AppData\Local\Temp\333c162ad695fb918bd3aae018fae0d0_NeikiAnalytics.exe"
C:\UserDotGH\devdobloc.exe
C:\UserDotGH\devdobloc.exe
Network
Files
C:\UserDotGH\devdobloc.exe
| MD5 | 6425136f453df6b11cdf8384a8bc6e52 |
| SHA1 | f305278b1ffa048c208c2e820bd34b659c56535e |
| SHA256 | 4c5704aa5e5fd2d871fbc8d57647fe0f9b57beb615fec3e520b96003f239e89e |
| SHA512 | 06156124b21e7761cffae858c9c9d4cac8ede3e4dc8e8b19ce0dd4b31ba2f03bfbc8629888fd027343c8150ab91889cf7eceeeb384917ebc3e5fb85da6e9fb23 |
C:\Users\Admin\253086396416_10.0_Admin.ini
| MD5 | ab490b7f5e846aacbf9d16515bfc7233 |
| SHA1 | 8d2e8da5f6ef826194aa1774557cd8a66e263dc1 |
| SHA256 | 4f42434817a5063c12a0814a22583f59170dbb1807140b0630843631e5d9c244 |
| SHA512 | 413d0c9195a82aeb37e8fb0aaea239d08442aa3a8e5ab2053ba436d0a42356201b06187cc993ff1ea83e35d29423a3520c5eaa5c579758b62831ce908e5738b2 |
C:\MintRO\dobaec.exe
| MD5 | 3ed08d693b317babf4a1816702acfdd0 |
| SHA1 | d80195aa289cbaee52acfecc4c9eab29ed3dea31 |
| SHA256 | d0ea3eb204fb4518d62ad6821690e91864d8535063915b32b4f876dfab3f033d |
| SHA512 | 6b81b52697973732bcefc930bb4e604d120c91e6a0f92526d1f1eb909f36eb6a6023b5ce53e71cebc787fc25242075bde5b6a1820662484647b1a87ec1572e99 |