Analysis
-
max time kernel
10s -
max time network
1s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
16-06-2024 20:18
Static task
static1
Behavioral task
behavioral1
Sample
0251605e9b1798f5d13a96f13abe91d0_NeikiAnalytics.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
0251605e9b1798f5d13a96f13abe91d0_NeikiAnalytics.exe
Resource
win10v2004-20240611-en
General
-
Target
0251605e9b1798f5d13a96f13abe91d0_NeikiAnalytics.exe
-
Size
145KB
-
MD5
0251605e9b1798f5d13a96f13abe91d0
-
SHA1
adb55c9e954805981618726b68ef702cc0c5edb9
-
SHA256
52236d72dc0e8fd41c72ac109252c8ecc2c63b0e09499a93e94a7d7e0f2a4876
-
SHA512
00e0bda059022514dc531b6bf43067806a5c8d9522404989839649b5dcf7964cb6973f7c09d687f10541ffb5e34b8a515018a58d4638cadabc2261930a5b0e12
-
SSDEEP
3072:2RoehnyJB1e74nZkTtzButyfclmxX7I856KbmPRJ:2LyD1e74ZkBBCcclmxryJJ
Malware Config
Signatures
-
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
Processes:
0251605e9b1798f5d13a96f13abe91d0_NeikiAnalytics.exedescription ioc process File opened for modification \??\PhysicalDrive0 0251605e9b1798f5d13a96f13abe91d0_NeikiAnalytics.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
0251605e9b1798f5d13a96f13abe91d0_NeikiAnalytics.exedescription pid process Token: SeShutdownPrivilege 2872 0251605e9b1798f5d13a96f13abe91d0_NeikiAnalytics.exe