Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
12-06-2024 01:17
Static task
static1
Behavioral task
behavioral1
Sample
14207ffdb32665e1789ac652767bdca0_NeikiAnalytics.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
14207ffdb32665e1789ac652767bdca0_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
14207ffdb32665e1789ac652767bdca0_NeikiAnalytics.exe
-
Size
76KB
-
MD5
14207ffdb32665e1789ac652767bdca0
-
SHA1
85ddab79a94a21d85c432922638c5c6092cb0f47
-
SHA256
3f6d30b6783aba1d1a0697ae0dbd1fe2149c51caa5481fb246c8bc564dfd642a
-
SHA512
5d316e0e835146edcfad4505f444d7818c3dcbee13187a22fc8bc3a20ddb84a951dbfbba7750f3f286dd33f52316a14ff5a779d1e4b43d9de9706764992f078d
-
SSDEEP
768:zXS6Lnze1gshn5ew/QuBdL/4Ckir4SWeq3HwFdkt+Afs2DBno9lTL12K6KcgMxnj:TSSnze1gsJ55n/4CkOwwF+bhoLV9Ynj
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2172 Winkpy.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File created C:\Windows\SysWOW64\Winkpy.exe Winkpy.exe File opened for modification C:\Windows\SysWOW64\Winkpy.exe 14207ffdb32665e1789ac652767bdca0_NeikiAnalytics.exe File created C:\Windows\SysWOW64\Winkpy.exe 14207ffdb32665e1789ac652767bdca0_NeikiAnalytics.exe File opened for modification C:\Windows\SysWOW64\Winkpy.exe Winkpy.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeTcbPrivilege 1940 14207ffdb32665e1789ac652767bdca0_NeikiAnalytics.exe Token: SeTcbPrivilege 2172 Winkpy.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\14207ffdb32665e1789ac652767bdca0_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\14207ffdb32665e1789ac652767bdca0_NeikiAnalytics.exe"1⤵
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:1940
-
C:\Windows\SysWOW64\Winkpy.exeC:\Windows\SysWOW64\Winkpy.exe1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:2172
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
84KB
MD5231805458179bc7c8875b7a04f33abac
SHA1465fd1fa809ea2e440cfb5eb4db7cd38fd99bf63
SHA2565ed26aa4238a67ad97dfc651cbd453513aeab2c10374308b3d4808e5374e410c
SHA512565c47a735c7e8915d994cf505400aacd1ec4976d8204f65e6ab2505929aeaefe4b60be1c95c584de512ce68211b8327e0f59f21c46caf14583ca25b7123c78e