Analysis
-
max time kernel
141s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
11-06-2024 12:22
Behavioral task
behavioral1
Sample
34ab17b9e55c2d7455f8ecd2ace39ee0_NeikiAnalytics.exe
Resource
win7-20231129-en
General
-
Target
34ab17b9e55c2d7455f8ecd2ace39ee0_NeikiAnalytics.exe
-
Size
3.7MB
-
MD5
34ab17b9e55c2d7455f8ecd2ace39ee0
-
SHA1
599378b3d8723ba0d85a699fde05f71f003fac08
-
SHA256
e3bc4c659158e277c281c7b92dd928219080003f2dd45e666c18806110659255
-
SHA512
af0ed0a72acb1974244bda621f5f5a09a64c7fda477f92138142d26bb1d3c88822b12afc919be1ab8297d74efb781da4fc23306c817efd710acc4f284566d8e5
-
SSDEEP
98304:8vK8jFVPqKVj9nyCMa8Asdk+C3neFYaObK164jpw:8v1VCCB6dvMqbObK16ew
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
Processes:
34ab17b9e55c2d7455f8ecd2ace39ee0_NeikiAnalytics.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 34ab17b9e55c2d7455f8ecd2ace39ee0_NeikiAnalytics.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
34ab17b9e55c2d7455f8ecd2ace39ee0_NeikiAnalytics.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 34ab17b9e55c2d7455f8ecd2ace39ee0_NeikiAnalytics.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 34ab17b9e55c2d7455f8ecd2ace39ee0_NeikiAnalytics.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
34ab17b9e55c2d7455f8ecd2ace39ee0_NeikiAnalytics.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\TCP Service = "C:\\Program Files (x86)\\TCP Service\\tcpsv.exe" 34ab17b9e55c2d7455f8ecd2ace39ee0_NeikiAnalytics.exe -
Processes:
34ab17b9e55c2d7455f8ecd2ace39ee0_NeikiAnalytics.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 34ab17b9e55c2d7455f8ecd2ace39ee0_NeikiAnalytics.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
Processes:
34ab17b9e55c2d7455f8ecd2ace39ee0_NeikiAnalytics.exepid process 2884 34ab17b9e55c2d7455f8ecd2ace39ee0_NeikiAnalytics.exe -
Drops file in Program Files directory 1 IoCs
Processes:
34ab17b9e55c2d7455f8ecd2ace39ee0_NeikiAnalytics.exedescription ioc process File created C:\Program Files (x86)\TCP Service\tcpsv.exe 34ab17b9e55c2d7455f8ecd2ace39ee0_NeikiAnalytics.exe -
Suspicious behavior: EnumeratesProcesses 5 IoCs
Processes:
34ab17b9e55c2d7455f8ecd2ace39ee0_NeikiAnalytics.exepid process 2884 34ab17b9e55c2d7455f8ecd2ace39ee0_NeikiAnalytics.exe 2884 34ab17b9e55c2d7455f8ecd2ace39ee0_NeikiAnalytics.exe 2884 34ab17b9e55c2d7455f8ecd2ace39ee0_NeikiAnalytics.exe 2884 34ab17b9e55c2d7455f8ecd2ace39ee0_NeikiAnalytics.exe 2884 34ab17b9e55c2d7455f8ecd2ace39ee0_NeikiAnalytics.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
34ab17b9e55c2d7455f8ecd2ace39ee0_NeikiAnalytics.exepid process 2884 34ab17b9e55c2d7455f8ecd2ace39ee0_NeikiAnalytics.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
34ab17b9e55c2d7455f8ecd2ace39ee0_NeikiAnalytics.exedescription pid process Token: SeDebugPrivilege 2884 34ab17b9e55c2d7455f8ecd2ace39ee0_NeikiAnalytics.exe Token: SeDebugPrivilege 2884 34ab17b9e55c2d7455f8ecd2ace39ee0_NeikiAnalytics.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\34ab17b9e55c2d7455f8ecd2ace39ee0_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\34ab17b9e55c2d7455f8ecd2ace39ee0_NeikiAnalytics.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Adds Run key to start application
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/2884-0-0x0000000000400000-0x0000000000DA6000-memory.dmpFilesize
9.6MB
-
memory/2884-1-0x00000000760F4000-0x00000000760F5000-memory.dmpFilesize
4KB
-
memory/2884-3-0x00000000760E0000-0x00000000761F0000-memory.dmpFilesize
1.1MB
-
memory/2884-4-0x00000000760E0000-0x00000000761F0000-memory.dmpFilesize
1.1MB
-
memory/2884-5-0x00000000760E0000-0x00000000761F0000-memory.dmpFilesize
1.1MB
-
memory/2884-2-0x00000000760E0000-0x00000000761F0000-memory.dmpFilesize
1.1MB
-
memory/2884-18-0x00000000760E0000-0x00000000761F0000-memory.dmpFilesize
1.1MB
-
memory/2884-7-0x00000000760E0000-0x00000000761F0000-memory.dmpFilesize
1.1MB
-
memory/2884-23-0x00000000760E0000-0x00000000761F0000-memory.dmpFilesize
1.1MB
-
memory/2884-26-0x00000000760E0000-0x00000000761F0000-memory.dmpFilesize
1.1MB
-
memory/2884-22-0x00000000760E0000-0x00000000761F0000-memory.dmpFilesize
1.1MB
-
memory/2884-21-0x00000000760E0000-0x00000000761F0000-memory.dmpFilesize
1.1MB
-
memory/2884-20-0x00000000760E0000-0x00000000761F0000-memory.dmpFilesize
1.1MB
-
memory/2884-19-0x00000000760E0000-0x00000000761F0000-memory.dmpFilesize
1.1MB
-
memory/2884-17-0x00000000760E0000-0x00000000761F0000-memory.dmpFilesize
1.1MB
-
memory/2884-16-0x00000000760E0000-0x00000000761F0000-memory.dmpFilesize
1.1MB
-
memory/2884-15-0x00000000760E0000-0x00000000761F0000-memory.dmpFilesize
1.1MB
-
memory/2884-14-0x00000000760E0000-0x00000000761F0000-memory.dmpFilesize
1.1MB
-
memory/2884-13-0x00000000760E0000-0x00000000761F0000-memory.dmpFilesize
1.1MB
-
memory/2884-12-0x00000000760E0000-0x00000000761F0000-memory.dmpFilesize
1.1MB
-
memory/2884-11-0x00000000760E0000-0x00000000761F0000-memory.dmpFilesize
1.1MB
-
memory/2884-10-0x00000000760E0000-0x00000000761F0000-memory.dmpFilesize
1.1MB
-
memory/2884-9-0x00000000760E0000-0x00000000761F0000-memory.dmpFilesize
1.1MB
-
memory/2884-8-0x00000000760E0000-0x00000000761F0000-memory.dmpFilesize
1.1MB
-
memory/2884-6-0x00000000760E0000-0x00000000761F0000-memory.dmpFilesize
1.1MB
-
memory/2884-27-0x00000000760E0000-0x00000000761F0000-memory.dmpFilesize
1.1MB
-
memory/2884-31-0x00000000760F4000-0x00000000760F5000-memory.dmpFilesize
4KB
-
memory/2884-32-0x00000000760E0000-0x00000000761F0000-memory.dmpFilesize
1.1MB
-
memory/2884-35-0x00000000760E0000-0x00000000761F0000-memory.dmpFilesize
1.1MB
-
memory/2884-36-0x00000000760E0000-0x00000000761F0000-memory.dmpFilesize
1.1MB
-
memory/2884-34-0x00000000760E0000-0x00000000761F0000-memory.dmpFilesize
1.1MB
-
memory/2884-33-0x00000000760E0000-0x00000000761F0000-memory.dmpFilesize
1.1MB
-
memory/2884-37-0x00000000760E0000-0x00000000761F0000-memory.dmpFilesize
1.1MB