Analysis
-
max time kernel
95s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
14/06/2024, 08:28
Static task
static1
Behavioral task
behavioral1
Sample
b0db1bf84422e82a4eedd3de64581150_NeikiAnalytics.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
b0db1bf84422e82a4eedd3de64581150_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
b0db1bf84422e82a4eedd3de64581150_NeikiAnalytics.exe
-
Size
76KB
-
MD5
b0db1bf84422e82a4eedd3de64581150
-
SHA1
5eb1464bec8f946defef43c529f99e842ff4b26d
-
SHA256
c39b4881014b7e5e9ca42adf22eb5a88ccf62468c9449890471bb8c3c7bfcb33
-
SHA512
a9e03d5643531c1155719858b1561b7033fe485ab4d07bb0ddeb1d3ed08856f4f5f17f60a948d1c3a4427da0bffae865315c8461fd454ebeeac6a17d7ea507be
-
SSDEEP
768:/GIrCeYLmwy+xOF4/i/BEYkp7P6lweQDhDmpU5GFrrEzWsdSE0d8pUHIkI0Iq1:/TKmIxO+2G40OIkaq1
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" siobo.exe -
Executes dropped EXE 1 IoCs
pid Process 2752 siobo.exe -
Loads dropped DLL 2 IoCs
pid Process 2024 b0db1bf84422e82a4eedd3de64581150_NeikiAnalytics.exe 2024 b0db1bf84422e82a4eedd3de64581150_NeikiAnalytics.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Windows\CurrentVersion\Run\siobo = "C:\\Users\\Admin\\siobo.exe" siobo.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2752 siobo.exe 2752 siobo.exe 2752 siobo.exe 2752 siobo.exe 2752 siobo.exe 2752 siobo.exe 2752 siobo.exe 2752 siobo.exe 2752 siobo.exe 2752 siobo.exe 2752 siobo.exe 2752 siobo.exe 2752 siobo.exe 2752 siobo.exe 2752 siobo.exe 2752 siobo.exe 2752 siobo.exe 2752 siobo.exe 2752 siobo.exe 2752 siobo.exe 2752 siobo.exe 2752 siobo.exe 2752 siobo.exe 2752 siobo.exe 2752 siobo.exe 2752 siobo.exe 2752 siobo.exe 2752 siobo.exe 2752 siobo.exe 2752 siobo.exe 2752 siobo.exe 2752 siobo.exe 2752 siobo.exe 2752 siobo.exe 2752 siobo.exe 2752 siobo.exe 2752 siobo.exe 2752 siobo.exe 2752 siobo.exe 2752 siobo.exe 2752 siobo.exe 2752 siobo.exe 2752 siobo.exe 2752 siobo.exe 2752 siobo.exe 2752 siobo.exe 2752 siobo.exe 2752 siobo.exe 2752 siobo.exe 2752 siobo.exe 2752 siobo.exe 2752 siobo.exe 2752 siobo.exe 2752 siobo.exe 2752 siobo.exe 2752 siobo.exe 2752 siobo.exe 2752 siobo.exe 2752 siobo.exe 2752 siobo.exe 2752 siobo.exe 2752 siobo.exe 2752 siobo.exe 2752 siobo.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2024 b0db1bf84422e82a4eedd3de64581150_NeikiAnalytics.exe 2752 siobo.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2024 wrote to memory of 2752 2024 b0db1bf84422e82a4eedd3de64581150_NeikiAnalytics.exe 29 PID 2024 wrote to memory of 2752 2024 b0db1bf84422e82a4eedd3de64581150_NeikiAnalytics.exe 29 PID 2024 wrote to memory of 2752 2024 b0db1bf84422e82a4eedd3de64581150_NeikiAnalytics.exe 29 PID 2024 wrote to memory of 2752 2024 b0db1bf84422e82a4eedd3de64581150_NeikiAnalytics.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\b0db1bf84422e82a4eedd3de64581150_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\b0db1bf84422e82a4eedd3de64581150_NeikiAnalytics.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2024 -
C:\Users\Admin\siobo.exe"C:\Users\Admin\siobo.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2752
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
76KB
MD5eac3fdb90bd7c447f32bc9bff4cbbf93
SHA1b04485283bc0c60b3ff2ef04f051557dcab98925
SHA256ebb06e41bf8b088f10f59db3b2da09ad6c611a04b5e0fe7050e6f6f8f8621588
SHA5120ded199b599ec66e34dc23635da689c62cf483f19d6a69ae93f0356e720e9cdbcd052074d386d8c26ac486b756146b252ee8c328e3f7308dd5d6ea18f002df03