Analysis
-
max time kernel
51s -
max time network
51s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
12-06-2024 01:17
Static task
static1
Behavioral task
behavioral1
Sample
14207ffdb32665e1789ac652767bdca0_NeikiAnalytics.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
14207ffdb32665e1789ac652767bdca0_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
14207ffdb32665e1789ac652767bdca0_NeikiAnalytics.exe
-
Size
76KB
-
MD5
14207ffdb32665e1789ac652767bdca0
-
SHA1
85ddab79a94a21d85c432922638c5c6092cb0f47
-
SHA256
3f6d30b6783aba1d1a0697ae0dbd1fe2149c51caa5481fb246c8bc564dfd642a
-
SHA512
5d316e0e835146edcfad4505f444d7818c3dcbee13187a22fc8bc3a20ddb84a951dbfbba7750f3f286dd33f52316a14ff5a779d1e4b43d9de9706764992f078d
-
SSDEEP
768:zXS6Lnze1gshn5ew/QuBdL/4Ckir4SWeq3HwFdkt+Afs2DBno9lTL12K6KcgMxnj:TSSnze1gsJ55n/4CkOwwF+bhoLV9Ynj
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3092 Winkdjf.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File created C:\Windows\SysWOW64\Winkdjf.exe Winkdjf.exe File opened for modification C:\Windows\SysWOW64\Winkdjf.exe 14207ffdb32665e1789ac652767bdca0_NeikiAnalytics.exe File created C:\Windows\SysWOW64\Winkdjf.exe 14207ffdb32665e1789ac652767bdca0_NeikiAnalytics.exe File opened for modification C:\Windows\SysWOW64\Winkdjf.exe Winkdjf.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeTcbPrivilege 5000 14207ffdb32665e1789ac652767bdca0_NeikiAnalytics.exe Token: SeTcbPrivilege 3092 Winkdjf.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\14207ffdb32665e1789ac652767bdca0_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\14207ffdb32665e1789ac652767bdca0_NeikiAnalytics.exe"1⤵
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:5000
-
C:\Windows\SysWOW64\Winkdjf.exeC:\Windows\SysWOW64\Winkdjf.exe1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:3092
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
86KB
MD55b7970ef2eaf3abd5084cb6e6b2de21f
SHA1d4f5b2b2882baa1cc58e7942f60abf0eeb9fd3e4
SHA256d92e990ac7f40bbf6a1bb92b293b272597f71f96c3d4e85ae906fbb394dc8637
SHA512ddd395fbe64d629d9d50a10c09f95a08c9c350d58ce891332885d06589a07ec3ebea0d27ae93b051dcf930d0aae4011d7d23dd1a4c725b8ff6bbc7134e79263e