Analysis
-
max time kernel
150s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
14/06/2024, 05:59
Static task
static1
Behavioral task
behavioral1
Sample
a7d713b5c5afd331d0f61a235e72cd40_NeikiAnalytics.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
a7d713b5c5afd331d0f61a235e72cd40_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
a7d713b5c5afd331d0f61a235e72cd40_NeikiAnalytics.exe
-
Size
464KB
-
MD5
a7d713b5c5afd331d0f61a235e72cd40
-
SHA1
944b379de5feb71c58b6ef47d1f4f7d001aff5bc
-
SHA256
a7c3917d9a373260010ad28f74786005155daec97dde20abc21cf3e489e8c332
-
SHA512
e956111ff631647cc956749f7e47890d4a6b855d204089ccae5aed51e44de99d094812ce70ab2369855f46b9b39f37797f332c35fad31577c1fecd07fa9c9e06
-
SSDEEP
12288:Qslc87eqqV5e+wBV6O+Yx8yy9jB+/TZ8ZCBgS67X:QsSqqHeVBxlxR61+d7j6D
Malware Config
Signatures
-
Executes dropped EXE 3 IoCs
pid Process 1660 notekill.exe 60 certdial.exe 2960 ~4AE4.tmp -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cliphost = "C:\\Users\\Admin\\AppData\\Roaming\\iexpywiz\\notekill.exe" a7d713b5c5afd331d0f61a235e72cd40_NeikiAnalytics.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\certdial.exe a7d713b5c5afd331d0f61a235e72cd40_NeikiAnalytics.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1660 notekill.exe 1660 notekill.exe 3500 Explorer.EXE 3500 Explorer.EXE 3500 Explorer.EXE 3500 Explorer.EXE 3500 Explorer.EXE 3500 Explorer.EXE 3500 Explorer.EXE 3500 Explorer.EXE 3500 Explorer.EXE 3500 Explorer.EXE 3500 Explorer.EXE 3500 Explorer.EXE 3500 Explorer.EXE 3500 Explorer.EXE 3500 Explorer.EXE 3500 Explorer.EXE 3500 Explorer.EXE 3500 Explorer.EXE 3500 Explorer.EXE 3500 Explorer.EXE 3500 Explorer.EXE 3500 Explorer.EXE 3500 Explorer.EXE 3500 Explorer.EXE 3500 Explorer.EXE 3500 Explorer.EXE 3500 Explorer.EXE 3500 Explorer.EXE 3500 Explorer.EXE 3500 Explorer.EXE 3500 Explorer.EXE 3500 Explorer.EXE 3500 Explorer.EXE 3500 Explorer.EXE 3500 Explorer.EXE 3500 Explorer.EXE 3500 Explorer.EXE 3500 Explorer.EXE 3500 Explorer.EXE 3500 Explorer.EXE 3500 Explorer.EXE 3500 Explorer.EXE 3500 Explorer.EXE 3500 Explorer.EXE 3500 Explorer.EXE 3500 Explorer.EXE 3500 Explorer.EXE 3500 Explorer.EXE 3500 Explorer.EXE 3500 Explorer.EXE 3500 Explorer.EXE 3500 Explorer.EXE 3500 Explorer.EXE 3500 Explorer.EXE 3500 Explorer.EXE 3500 Explorer.EXE 3500 Explorer.EXE 3500 Explorer.EXE 3500 Explorer.EXE 3500 Explorer.EXE 3500 Explorer.EXE 3500 Explorer.EXE -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1660 notekill.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 3500 Explorer.EXE 3500 Explorer.EXE 3500 Explorer.EXE -
Suspicious use of SendNotifyMessage 3 IoCs
pid Process 3500 Explorer.EXE 3500 Explorer.EXE 3500 Explorer.EXE -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 3500 Explorer.EXE -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4112 wrote to memory of 1660 4112 a7d713b5c5afd331d0f61a235e72cd40_NeikiAnalytics.exe 85 PID 4112 wrote to memory of 1660 4112 a7d713b5c5afd331d0f61a235e72cd40_NeikiAnalytics.exe 85 PID 4112 wrote to memory of 1660 4112 a7d713b5c5afd331d0f61a235e72cd40_NeikiAnalytics.exe 85 PID 1660 wrote to memory of 2960 1660 notekill.exe 87 PID 1660 wrote to memory of 2960 1660 notekill.exe 87 PID 2960 wrote to memory of 3500 2960 ~4AE4.tmp 56
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of UnmapMainImage
PID:3500 -
C:\Users\Admin\AppData\Local\Temp\a7d713b5c5afd331d0f61a235e72cd40_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\a7d713b5c5afd331d0f61a235e72cd40_NeikiAnalytics.exe"2⤵
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:4112 -
C:\Users\Admin\AppData\Roaming\iexpywiz\notekill.exe"C:\Users\Admin\AppData\Roaming\iexpywiz"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1660 -
C:\Users\Admin\AppData\Local\Temp\~4AE4.tmp3500 475656 1660 14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2960
-
-
-
-
C:\Windows\SysWOW64\certdial.exeC:\Windows\SysWOW64\certdial.exe -s1⤵
- Executes dropped EXE
PID:60
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
8KB
MD586dc243576cf5c7445451af37631eea9
SHA199a81c47c4c02f32c0ab456bfa23c306c7a09bf9
SHA25625d2a671e1b5b5b95697ac0234ce4d46e0d0894919521b54aabebd9daecf994a
SHA512c7310524f9b65f811146c1eb6ae944966351ac88a95fbc1ac422d8810730e5e212a7e28090ad758ea23c96ba38073e7fcf42460575e7f09dbc759a45c5d5a4a4
-
Filesize
464KB
MD5e7ff839e99122a9655a1f8e41526ec98
SHA1e1dbebec720f4ab393e1e800ebf2c5fd60cac698
SHA256b3b741ec340370b15c6437362c4e9e1924fec7bebf3c17bb89baa90d8ef7d244
SHA512d769d6fcf8fc9bf1bd6c75a2e904233a4f1ff801b95e10cba4b37cbfc3755b1e836645eb145256d176f22a49aeb8fd3f476be17efeca7d59d280cc4c33d606ec