Analysis
-
max time kernel
146s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
11-06-2024 12:22
Behavioral task
behavioral1
Sample
34ab17b9e55c2d7455f8ecd2ace39ee0_NeikiAnalytics.exe
Resource
win7-20231129-en
General
-
Target
34ab17b9e55c2d7455f8ecd2ace39ee0_NeikiAnalytics.exe
-
Size
3.7MB
-
MD5
34ab17b9e55c2d7455f8ecd2ace39ee0
-
SHA1
599378b3d8723ba0d85a699fde05f71f003fac08
-
SHA256
e3bc4c659158e277c281c7b92dd928219080003f2dd45e666c18806110659255
-
SHA512
af0ed0a72acb1974244bda621f5f5a09a64c7fda477f92138142d26bb1d3c88822b12afc919be1ab8297d74efb781da4fc23306c817efd710acc4f284566d8e5
-
SSDEEP
98304:8vK8jFVPqKVj9nyCMa8Asdk+C3neFYaObK164jpw:8v1VCCB6dvMqbObK16ew
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
Processes:
34ab17b9e55c2d7455f8ecd2ace39ee0_NeikiAnalytics.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 34ab17b9e55c2d7455f8ecd2ace39ee0_NeikiAnalytics.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
34ab17b9e55c2d7455f8ecd2ace39ee0_NeikiAnalytics.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 34ab17b9e55c2d7455f8ecd2ace39ee0_NeikiAnalytics.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 34ab17b9e55c2d7455f8ecd2ace39ee0_NeikiAnalytics.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
34ab17b9e55c2d7455f8ecd2ace39ee0_NeikiAnalytics.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\LAN Monitor = "C:\\Program Files (x86)\\LAN Monitor\\lanmon.exe" 34ab17b9e55c2d7455f8ecd2ace39ee0_NeikiAnalytics.exe -
Processes:
34ab17b9e55c2d7455f8ecd2ace39ee0_NeikiAnalytics.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 34ab17b9e55c2d7455f8ecd2ace39ee0_NeikiAnalytics.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
Processes:
34ab17b9e55c2d7455f8ecd2ace39ee0_NeikiAnalytics.exepid process 1588 34ab17b9e55c2d7455f8ecd2ace39ee0_NeikiAnalytics.exe -
Drops file in Program Files directory 1 IoCs
Processes:
34ab17b9e55c2d7455f8ecd2ace39ee0_NeikiAnalytics.exedescription ioc process File created C:\Program Files (x86)\LAN Monitor\lanmon.exe 34ab17b9e55c2d7455f8ecd2ace39ee0_NeikiAnalytics.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
Processes:
34ab17b9e55c2d7455f8ecd2ace39ee0_NeikiAnalytics.exepid process 1588 34ab17b9e55c2d7455f8ecd2ace39ee0_NeikiAnalytics.exe 1588 34ab17b9e55c2d7455f8ecd2ace39ee0_NeikiAnalytics.exe 1588 34ab17b9e55c2d7455f8ecd2ace39ee0_NeikiAnalytics.exe 1588 34ab17b9e55c2d7455f8ecd2ace39ee0_NeikiAnalytics.exe 1588 34ab17b9e55c2d7455f8ecd2ace39ee0_NeikiAnalytics.exe 1588 34ab17b9e55c2d7455f8ecd2ace39ee0_NeikiAnalytics.exe 1588 34ab17b9e55c2d7455f8ecd2ace39ee0_NeikiAnalytics.exe 1588 34ab17b9e55c2d7455f8ecd2ace39ee0_NeikiAnalytics.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
34ab17b9e55c2d7455f8ecd2ace39ee0_NeikiAnalytics.exepid process 1588 34ab17b9e55c2d7455f8ecd2ace39ee0_NeikiAnalytics.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
34ab17b9e55c2d7455f8ecd2ace39ee0_NeikiAnalytics.exedescription pid process Token: SeDebugPrivilege 1588 34ab17b9e55c2d7455f8ecd2ace39ee0_NeikiAnalytics.exe Token: SeDebugPrivilege 1588 34ab17b9e55c2d7455f8ecd2ace39ee0_NeikiAnalytics.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\34ab17b9e55c2d7455f8ecd2ace39ee0_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\34ab17b9e55c2d7455f8ecd2ace39ee0_NeikiAnalytics.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Adds Run key to start application
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1588-0-0x0000000000400000-0x0000000000DA6000-memory.dmpFilesize
9.6MB
-
memory/1588-5-0x0000000077220000-0x0000000077310000-memory.dmpFilesize
960KB
-
memory/1588-4-0x0000000077220000-0x0000000077310000-memory.dmpFilesize
960KB
-
memory/1588-3-0x0000000077220000-0x0000000077310000-memory.dmpFilesize
960KB
-
memory/1588-2-0x0000000077220000-0x0000000077310000-memory.dmpFilesize
960KB
-
memory/1588-1-0x0000000077240000-0x0000000077241000-memory.dmpFilesize
4KB
-
memory/1588-7-0x0000000077220000-0x0000000077310000-memory.dmpFilesize
960KB
-
memory/1588-8-0x0000000077220000-0x0000000077310000-memory.dmpFilesize
960KB
-
memory/1588-6-0x0000000077220000-0x0000000077310000-memory.dmpFilesize
960KB
-
memory/1588-14-0x0000000000400000-0x0000000000DA6000-memory.dmpFilesize
9.6MB
-
memory/1588-15-0x0000000077240000-0x0000000077241000-memory.dmpFilesize
4KB
-
memory/1588-16-0x0000000077220000-0x0000000077310000-memory.dmpFilesize
960KB
-
memory/1588-17-0x0000000077220000-0x0000000077310000-memory.dmpFilesize
960KB
-
memory/1588-18-0x0000000077220000-0x0000000077310000-memory.dmpFilesize
960KB
-
memory/1588-19-0x0000000077220000-0x0000000077310000-memory.dmpFilesize
960KB
-
memory/1588-20-0x0000000077220000-0x0000000077310000-memory.dmpFilesize
960KB
-
memory/1588-22-0x0000000077220000-0x0000000077310000-memory.dmpFilesize
960KB
-
memory/1588-23-0x0000000077220000-0x0000000077310000-memory.dmpFilesize
960KB