Analysis
-
max time kernel
150s -
max time network
51s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
13/06/2024, 07:15
Static task
static1
Behavioral task
behavioral1
Sample
6896b29c080de488d8246d1073817ab0_NeikiAnalytics.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
6896b29c080de488d8246d1073817ab0_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
6896b29c080de488d8246d1073817ab0_NeikiAnalytics.exe
-
Size
135KB
-
MD5
6896b29c080de488d8246d1073817ab0
-
SHA1
1119ad81cc985210374994b6267ff35a8f30a199
-
SHA256
1e6fc3a8788dee9e2499fad43164f524319796c8801394f1808268fb880bc47c
-
SHA512
7506671992ac3e2236cd5ff7070861333bd58d751d99af9c3a3aba70313f95a0a582cb2a8c9f57adf828c0e38089440b331a6d38920e8bff19ce3f5c2412caeb
-
SSDEEP
1536:UfsEqouTRcG/Mzvgf7xEuvnXNTRdUzwTekUOisZ1yDDajtXbVfD4:UVqoCl/YgjxEufVU0TbTyDDal94
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" svchost.exe -
Executes dropped EXE 4 IoCs
pid Process 4412 explorer.exe 4364 spoolsv.exe 1104 svchost.exe 2792 spoolsv.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\resources\\themes\\explorer.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\resources\\svchost.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\resources\\themes\\explorer.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\resources\\svchost.exe RO" svchost.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\explorer.exe svchost.exe File opened for modification C:\Windows\SysWOW64\explorer.exe explorer.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification \??\c:\windows\resources\spoolsv.exe explorer.exe File opened for modification \??\c:\windows\resources\svchost.exe spoolsv.exe File opened for modification C:\Windows\Resources\tjud.exe explorer.exe File opened for modification \??\c:\windows\resources\themes\explorer.exe 6896b29c080de488d8246d1073817ab0_NeikiAnalytics.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 736 6896b29c080de488d8246d1073817ab0_NeikiAnalytics.exe 736 6896b29c080de488d8246d1073817ab0_NeikiAnalytics.exe 736 6896b29c080de488d8246d1073817ab0_NeikiAnalytics.exe 736 6896b29c080de488d8246d1073817ab0_NeikiAnalytics.exe 736 6896b29c080de488d8246d1073817ab0_NeikiAnalytics.exe 736 6896b29c080de488d8246d1073817ab0_NeikiAnalytics.exe 736 6896b29c080de488d8246d1073817ab0_NeikiAnalytics.exe 736 6896b29c080de488d8246d1073817ab0_NeikiAnalytics.exe 736 6896b29c080de488d8246d1073817ab0_NeikiAnalytics.exe 736 6896b29c080de488d8246d1073817ab0_NeikiAnalytics.exe 736 6896b29c080de488d8246d1073817ab0_NeikiAnalytics.exe 736 6896b29c080de488d8246d1073817ab0_NeikiAnalytics.exe 736 6896b29c080de488d8246d1073817ab0_NeikiAnalytics.exe 736 6896b29c080de488d8246d1073817ab0_NeikiAnalytics.exe 736 6896b29c080de488d8246d1073817ab0_NeikiAnalytics.exe 736 6896b29c080de488d8246d1073817ab0_NeikiAnalytics.exe 736 6896b29c080de488d8246d1073817ab0_NeikiAnalytics.exe 736 6896b29c080de488d8246d1073817ab0_NeikiAnalytics.exe 736 6896b29c080de488d8246d1073817ab0_NeikiAnalytics.exe 736 6896b29c080de488d8246d1073817ab0_NeikiAnalytics.exe 736 6896b29c080de488d8246d1073817ab0_NeikiAnalytics.exe 736 6896b29c080de488d8246d1073817ab0_NeikiAnalytics.exe 736 6896b29c080de488d8246d1073817ab0_NeikiAnalytics.exe 736 6896b29c080de488d8246d1073817ab0_NeikiAnalytics.exe 736 6896b29c080de488d8246d1073817ab0_NeikiAnalytics.exe 736 6896b29c080de488d8246d1073817ab0_NeikiAnalytics.exe 736 6896b29c080de488d8246d1073817ab0_NeikiAnalytics.exe 736 6896b29c080de488d8246d1073817ab0_NeikiAnalytics.exe 736 6896b29c080de488d8246d1073817ab0_NeikiAnalytics.exe 736 6896b29c080de488d8246d1073817ab0_NeikiAnalytics.exe 736 6896b29c080de488d8246d1073817ab0_NeikiAnalytics.exe 736 6896b29c080de488d8246d1073817ab0_NeikiAnalytics.exe 736 6896b29c080de488d8246d1073817ab0_NeikiAnalytics.exe 736 6896b29c080de488d8246d1073817ab0_NeikiAnalytics.exe 4412 explorer.exe 4412 explorer.exe 4412 explorer.exe 4412 explorer.exe 4412 explorer.exe 4412 explorer.exe 4412 explorer.exe 4412 explorer.exe 4412 explorer.exe 4412 explorer.exe 4412 explorer.exe 4412 explorer.exe 4412 explorer.exe 4412 explorer.exe 4412 explorer.exe 4412 explorer.exe 4412 explorer.exe 4412 explorer.exe 4412 explorer.exe 4412 explorer.exe 4412 explorer.exe 4412 explorer.exe 4412 explorer.exe 4412 explorer.exe 4412 explorer.exe 4412 explorer.exe 4412 explorer.exe 4412 explorer.exe 4412 explorer.exe 4412 explorer.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 4412 explorer.exe 1104 svchost.exe -
Suspicious use of SetWindowsHookEx 10 IoCs
pid Process 736 6896b29c080de488d8246d1073817ab0_NeikiAnalytics.exe 736 6896b29c080de488d8246d1073817ab0_NeikiAnalytics.exe 4412 explorer.exe 4412 explorer.exe 4364 spoolsv.exe 4364 spoolsv.exe 1104 svchost.exe 1104 svchost.exe 2792 spoolsv.exe 2792 spoolsv.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 736 wrote to memory of 4412 736 6896b29c080de488d8246d1073817ab0_NeikiAnalytics.exe 81 PID 736 wrote to memory of 4412 736 6896b29c080de488d8246d1073817ab0_NeikiAnalytics.exe 81 PID 736 wrote to memory of 4412 736 6896b29c080de488d8246d1073817ab0_NeikiAnalytics.exe 81 PID 4412 wrote to memory of 4364 4412 explorer.exe 82 PID 4412 wrote to memory of 4364 4412 explorer.exe 82 PID 4412 wrote to memory of 4364 4412 explorer.exe 82 PID 4364 wrote to memory of 1104 4364 spoolsv.exe 83 PID 4364 wrote to memory of 1104 4364 spoolsv.exe 83 PID 4364 wrote to memory of 1104 4364 spoolsv.exe 83 PID 1104 wrote to memory of 2792 1104 svchost.exe 85 PID 1104 wrote to memory of 2792 1104 svchost.exe 85 PID 1104 wrote to memory of 2792 1104 svchost.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\6896b29c080de488d8246d1073817ab0_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\6896b29c080de488d8246d1073817ab0_NeikiAnalytics.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:736 -
\??\c:\windows\resources\themes\explorer.exec:\windows\resources\themes\explorer.exe2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4412 -
\??\c:\windows\resources\spoolsv.exec:\windows\resources\spoolsv.exe SE3⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4364 -
\??\c:\windows\resources\svchost.exec:\windows\resources\svchost.exe4⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1104 -
\??\c:\windows\resources\spoolsv.exec:\windows\resources\spoolsv.exe PR5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2792
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
135KB
MD5b934a6b47390c8c8f5ad69a13df4241c
SHA16f4ff0c757e9f903ec22db4dbd7992eea9cd35e8
SHA256e92cd9d60d74749bf9254c64307471a00a96a76bc5177ed22d3fb1ba5858df41
SHA512bf2ca453b32e6620de15b9bbc2197d7571648fa997d6f6d430218d4fe7105d6d91b1765cbd00c312ea1408223f8fabed8db7b6c7af61e78a431dadf649ff705b
-
Filesize
135KB
MD574820e88b348f6663181689498096928
SHA178457a9eb2d9aea6bb997e18526cc05a5a839f17
SHA25640bde1bdace88b9611bf4d008dda8badff4efa48e7432e6fa728f7c80a39b8e1
SHA5124e0fe9aa13703e9e6558a0583e7be337d8eb3cfabed10291d99c9c326417ddb7454ed2f920425ca870106c6a7607204baf80b1631cbaeda70f892e37b1b4befc
-
Filesize
135KB
MD54fc05d9683e0e9df8b57c8187df2f898
SHA1d266122dd85a542cacfb4eac38654dae20d66735
SHA2564ff1df8f9d95eb479e448d653c554568219f904c2fbf34f6fa58703ac249cdf1
SHA512117f1867c2a793772d6fbd412575651acf11ea39549249b7f2ee9c30826b4dae11470b48cc15f0c8c84fd0cc6a90c53f5e3da75f163cb199b87f8dcdd9fcf4b9