Analysis
-
max time kernel
147s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
17/06/2024, 01:46
Static task
static1
Behavioral task
behavioral1
Sample
30ec430d2dafd2d74789ebd963133960_NeikiAnalytics.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
30ec430d2dafd2d74789ebd963133960_NeikiAnalytics.exe
Resource
win10v2004-20240611-en
General
-
Target
30ec430d2dafd2d74789ebd963133960_NeikiAnalytics.exe
-
Size
53KB
-
MD5
30ec430d2dafd2d74789ebd963133960
-
SHA1
da4ccbd9a3f418ecbea08bc2e186672737c1d321
-
SHA256
47a1a0c47dfb290b25e334a99b99d174731e648c67f99d1c8316504e46d88aee
-
SHA512
ee7421d99f9307b6f5626c9020dbe95d466aa58d1817a1008e9a9364e902befa332e7a6c176a0d20bbd23140d8276b96c9bd243e35af2e766e9f3b2aa70aa5fc
-
SSDEEP
1536:vNAg8r8QnTcVK7Kp3StjEMjmLM3ztDJWZsXy4JzxPME:0TckJJjmLM3zRJWZsXy4Jt
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" youbu.exe -
Executes dropped EXE 1 IoCs
pid Process 1624 youbu.exe -
Loads dropped DLL 2 IoCs
pid Process 2580 30ec430d2dafd2d74789ebd963133960_NeikiAnalytics.exe 2580 30ec430d2dafd2d74789ebd963133960_NeikiAnalytics.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Windows\CurrentVersion\Run\youbu = "C:\\Users\\Admin\\youbu.exe" youbu.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1624 youbu.exe 1624 youbu.exe 1624 youbu.exe 1624 youbu.exe 1624 youbu.exe 1624 youbu.exe 1624 youbu.exe 1624 youbu.exe 1624 youbu.exe 1624 youbu.exe 1624 youbu.exe 1624 youbu.exe 1624 youbu.exe 1624 youbu.exe 1624 youbu.exe 1624 youbu.exe 1624 youbu.exe 1624 youbu.exe 1624 youbu.exe 1624 youbu.exe 1624 youbu.exe 1624 youbu.exe 1624 youbu.exe 1624 youbu.exe 1624 youbu.exe 1624 youbu.exe 1624 youbu.exe 1624 youbu.exe 1624 youbu.exe 1624 youbu.exe 1624 youbu.exe 1624 youbu.exe 1624 youbu.exe 1624 youbu.exe 1624 youbu.exe 1624 youbu.exe 1624 youbu.exe 1624 youbu.exe 1624 youbu.exe 1624 youbu.exe 1624 youbu.exe 1624 youbu.exe 1624 youbu.exe 1624 youbu.exe 1624 youbu.exe 1624 youbu.exe 1624 youbu.exe 1624 youbu.exe 1624 youbu.exe 1624 youbu.exe 1624 youbu.exe 1624 youbu.exe 1624 youbu.exe 1624 youbu.exe 1624 youbu.exe 1624 youbu.exe 1624 youbu.exe 1624 youbu.exe 1624 youbu.exe 1624 youbu.exe 1624 youbu.exe 1624 youbu.exe 1624 youbu.exe 1624 youbu.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2580 30ec430d2dafd2d74789ebd963133960_NeikiAnalytics.exe 1624 youbu.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2580 wrote to memory of 1624 2580 30ec430d2dafd2d74789ebd963133960_NeikiAnalytics.exe 28 PID 2580 wrote to memory of 1624 2580 30ec430d2dafd2d74789ebd963133960_NeikiAnalytics.exe 28 PID 2580 wrote to memory of 1624 2580 30ec430d2dafd2d74789ebd963133960_NeikiAnalytics.exe 28 PID 2580 wrote to memory of 1624 2580 30ec430d2dafd2d74789ebd963133960_NeikiAnalytics.exe 28 PID 1624 wrote to memory of 2580 1624 youbu.exe 27 PID 1624 wrote to memory of 2580 1624 youbu.exe 27 PID 1624 wrote to memory of 2580 1624 youbu.exe 27 PID 1624 wrote to memory of 2580 1624 youbu.exe 27 PID 1624 wrote to memory of 2580 1624 youbu.exe 27 PID 1624 wrote to memory of 2580 1624 youbu.exe 27 PID 1624 wrote to memory of 2580 1624 youbu.exe 27 PID 1624 wrote to memory of 2580 1624 youbu.exe 27 PID 1624 wrote to memory of 2580 1624 youbu.exe 27 PID 1624 wrote to memory of 2580 1624 youbu.exe 27 PID 1624 wrote to memory of 2580 1624 youbu.exe 27 PID 1624 wrote to memory of 2580 1624 youbu.exe 27 PID 1624 wrote to memory of 2580 1624 youbu.exe 27 PID 1624 wrote to memory of 2580 1624 youbu.exe 27 PID 1624 wrote to memory of 2580 1624 youbu.exe 27 PID 1624 wrote to memory of 2580 1624 youbu.exe 27 PID 1624 wrote to memory of 2580 1624 youbu.exe 27 PID 1624 wrote to memory of 2580 1624 youbu.exe 27 PID 1624 wrote to memory of 2580 1624 youbu.exe 27 PID 1624 wrote to memory of 2580 1624 youbu.exe 27 PID 1624 wrote to memory of 2580 1624 youbu.exe 27 PID 1624 wrote to memory of 2580 1624 youbu.exe 27 PID 1624 wrote to memory of 2580 1624 youbu.exe 27 PID 1624 wrote to memory of 2580 1624 youbu.exe 27 PID 1624 wrote to memory of 2580 1624 youbu.exe 27 PID 1624 wrote to memory of 2580 1624 youbu.exe 27 PID 1624 wrote to memory of 2580 1624 youbu.exe 27 PID 1624 wrote to memory of 2580 1624 youbu.exe 27 PID 1624 wrote to memory of 2580 1624 youbu.exe 27 PID 1624 wrote to memory of 2580 1624 youbu.exe 27 PID 1624 wrote to memory of 2580 1624 youbu.exe 27 PID 1624 wrote to memory of 2580 1624 youbu.exe 27 PID 1624 wrote to memory of 2580 1624 youbu.exe 27 PID 1624 wrote to memory of 2580 1624 youbu.exe 27 PID 1624 wrote to memory of 2580 1624 youbu.exe 27 PID 1624 wrote to memory of 2580 1624 youbu.exe 27 PID 1624 wrote to memory of 2580 1624 youbu.exe 27 PID 1624 wrote to memory of 2580 1624 youbu.exe 27 PID 1624 wrote to memory of 2580 1624 youbu.exe 27 PID 1624 wrote to memory of 2580 1624 youbu.exe 27 PID 1624 wrote to memory of 2580 1624 youbu.exe 27 PID 1624 wrote to memory of 2580 1624 youbu.exe 27 PID 1624 wrote to memory of 2580 1624 youbu.exe 27 PID 1624 wrote to memory of 2580 1624 youbu.exe 27 PID 1624 wrote to memory of 2580 1624 youbu.exe 27 PID 1624 wrote to memory of 2580 1624 youbu.exe 27 PID 1624 wrote to memory of 2580 1624 youbu.exe 27 PID 1624 wrote to memory of 2580 1624 youbu.exe 27 PID 1624 wrote to memory of 2580 1624 youbu.exe 27 PID 1624 wrote to memory of 2580 1624 youbu.exe 27 PID 1624 wrote to memory of 2580 1624 youbu.exe 27 PID 1624 wrote to memory of 2580 1624 youbu.exe 27 PID 1624 wrote to memory of 2580 1624 youbu.exe 27 PID 1624 wrote to memory of 2580 1624 youbu.exe 27 PID 1624 wrote to memory of 2580 1624 youbu.exe 27 PID 1624 wrote to memory of 2580 1624 youbu.exe 27 PID 1624 wrote to memory of 2580 1624 youbu.exe 27 PID 1624 wrote to memory of 2580 1624 youbu.exe 27 PID 1624 wrote to memory of 2580 1624 youbu.exe 27 PID 1624 wrote to memory of 2580 1624 youbu.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\30ec430d2dafd2d74789ebd963133960_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\30ec430d2dafd2d74789ebd963133960_NeikiAnalytics.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2580 -
C:\Users\Admin\youbu.exe"C:\Users\Admin\youbu.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1624
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
53KB
MD50f3938d8ef7f3c833b8bd62808a1c524
SHA107bf49cddcd303813c56ee261346fa016b163456
SHA25663a15a0aae2c24c3c27ccffa0db8a0501e56fcbc1167a5c2405372c37d1aa632
SHA512c7151679e0b0ed732aa93af6a21a19095abd047958e97c9fb9eeb2b44b2ed9552d226806749a51f7d61a98d8420915e115621d02247a18419c5245bacc8b680a