Analysis
-
max time kernel
149s -
max time network
51s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
17-06-2024 01:26
Static task
static1
Behavioral task
behavioral1
Sample
2dc958d58978bbd7b1108c8a0da50cf0_NeikiAnalytics.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
2dc958d58978bbd7b1108c8a0da50cf0_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
2dc958d58978bbd7b1108c8a0da50cf0_NeikiAnalytics.exe
-
Size
88KB
-
MD5
2dc958d58978bbd7b1108c8a0da50cf0
-
SHA1
bc4051bba1812f7fc6cb6c175b7a00490c8520a6
-
SHA256
50dba9c5aa44ad0a65aeb8cf8d552a2928b7d441f1a8ffa20280757f146c5d76
-
SHA512
42ad6a9174965f23b744c3dea27c5472df8d4ad93f269f032591b9af69921e8a7c9f6928094c19053cf7ae155c4edfb9c3da3988ad591c6de3b3e9b719892c6c
-
SSDEEP
1536:ahUDofByDJWbMGcEFLPEPKOJUsy1+VMA:aIofBHbKMP0PvMA
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation 2dc958d58978bbd7b1108c8a0da50cf0_NeikiAnalytics.exe -
Executes dropped EXE 4 IoCs
pid Process 4436 explorer.exe 3256 explorer.exe 844 explorer.exe 1932 explorer.exe -
resource yara_rule behavioral2/memory/224-17-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/memory/224-19-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/memory/224-20-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/memory/3256-59-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/memory/224-63-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/memory/3256-70-0x0000000000400000-0x000000000040B000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Video Driver = "C:\\Users\\Admin\\AppData\\Roaming\\config\\explorer.exe" reg.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 1384 set thread context of 224 1384 2dc958d58978bbd7b1108c8a0da50cf0_NeikiAnalytics.exe 84 PID 4436 set thread context of 3256 4436 explorer.exe 90 PID 4436 set thread context of 844 4436 explorer.exe 91 PID 844 set thread context of 1932 844 explorer.exe 92 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 3256 explorer.exe Token: SeDebugPrivilege 3256 explorer.exe Token: SeDebugPrivilege 3256 explorer.exe Token: SeDebugPrivilege 3256 explorer.exe Token: SeDebugPrivilege 3256 explorer.exe Token: SeDebugPrivilege 3256 explorer.exe Token: SeDebugPrivilege 3256 explorer.exe Token: SeDebugPrivilege 3256 explorer.exe Token: SeDebugPrivilege 3256 explorer.exe Token: SeDebugPrivilege 3256 explorer.exe Token: SeDebugPrivilege 3256 explorer.exe Token: SeDebugPrivilege 3256 explorer.exe Token: SeDebugPrivilege 3256 explorer.exe Token: SeDebugPrivilege 3256 explorer.exe Token: SeDebugPrivilege 3256 explorer.exe Token: SeDebugPrivilege 3256 explorer.exe Token: SeDebugPrivilege 3256 explorer.exe Token: SeDebugPrivilege 3256 explorer.exe Token: SeDebugPrivilege 3256 explorer.exe Token: SeDebugPrivilege 3256 explorer.exe Token: SeDebugPrivilege 3256 explorer.exe Token: SeDebugPrivilege 3256 explorer.exe Token: SeDebugPrivilege 3256 explorer.exe Token: SeDebugPrivilege 3256 explorer.exe Token: SeDebugPrivilege 3256 explorer.exe Token: SeDebugPrivilege 3256 explorer.exe Token: SeDebugPrivilege 3256 explorer.exe Token: SeDebugPrivilege 3256 explorer.exe Token: SeDebugPrivilege 3256 explorer.exe Token: SeDebugPrivilege 3256 explorer.exe Token: SeDebugPrivilege 3256 explorer.exe Token: SeDebugPrivilege 3256 explorer.exe Token: SeDebugPrivilege 3256 explorer.exe Token: SeDebugPrivilege 3256 explorer.exe Token: SeDebugPrivilege 3256 explorer.exe Token: SeDebugPrivilege 3256 explorer.exe Token: SeDebugPrivilege 3256 explorer.exe Token: SeDebugPrivilege 3256 explorer.exe Token: SeDebugPrivilege 3256 explorer.exe Token: SeDebugPrivilege 3256 explorer.exe Token: SeDebugPrivilege 3256 explorer.exe Token: SeDebugPrivilege 3256 explorer.exe Token: SeDebugPrivilege 3256 explorer.exe Token: SeDebugPrivilege 3256 explorer.exe Token: SeDebugPrivilege 3256 explorer.exe Token: SeDebugPrivilege 3256 explorer.exe Token: SeDebugPrivilege 3256 explorer.exe Token: SeDebugPrivilege 3256 explorer.exe Token: SeDebugPrivilege 3256 explorer.exe Token: SeDebugPrivilege 3256 explorer.exe Token: SeDebugPrivilege 3256 explorer.exe Token: SeDebugPrivilege 3256 explorer.exe Token: SeDebugPrivilege 3256 explorer.exe Token: SeDebugPrivilege 3256 explorer.exe Token: SeDebugPrivilege 3256 explorer.exe Token: SeDebugPrivilege 3256 explorer.exe Token: SeDebugPrivilege 3256 explorer.exe Token: SeDebugPrivilege 3256 explorer.exe Token: SeDebugPrivilege 3256 explorer.exe Token: SeDebugPrivilege 3256 explorer.exe Token: SeDebugPrivilege 3256 explorer.exe Token: SeDebugPrivilege 3256 explorer.exe Token: SeDebugPrivilege 3256 explorer.exe Token: SeDebugPrivilege 3256 explorer.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 1384 2dc958d58978bbd7b1108c8a0da50cf0_NeikiAnalytics.exe 224 2dc958d58978bbd7b1108c8a0da50cf0_NeikiAnalytics.exe 4436 explorer.exe 3256 explorer.exe -
Suspicious use of WriteProcessMemory 39 IoCs
description pid Process procid_target PID 1384 wrote to memory of 224 1384 2dc958d58978bbd7b1108c8a0da50cf0_NeikiAnalytics.exe 84 PID 1384 wrote to memory of 224 1384 2dc958d58978bbd7b1108c8a0da50cf0_NeikiAnalytics.exe 84 PID 1384 wrote to memory of 224 1384 2dc958d58978bbd7b1108c8a0da50cf0_NeikiAnalytics.exe 84 PID 1384 wrote to memory of 224 1384 2dc958d58978bbd7b1108c8a0da50cf0_NeikiAnalytics.exe 84 PID 1384 wrote to memory of 224 1384 2dc958d58978bbd7b1108c8a0da50cf0_NeikiAnalytics.exe 84 PID 1384 wrote to memory of 224 1384 2dc958d58978bbd7b1108c8a0da50cf0_NeikiAnalytics.exe 84 PID 1384 wrote to memory of 224 1384 2dc958d58978bbd7b1108c8a0da50cf0_NeikiAnalytics.exe 84 PID 1384 wrote to memory of 224 1384 2dc958d58978bbd7b1108c8a0da50cf0_NeikiAnalytics.exe 84 PID 224 wrote to memory of 2400 224 2dc958d58978bbd7b1108c8a0da50cf0_NeikiAnalytics.exe 85 PID 224 wrote to memory of 2400 224 2dc958d58978bbd7b1108c8a0da50cf0_NeikiAnalytics.exe 85 PID 224 wrote to memory of 2400 224 2dc958d58978bbd7b1108c8a0da50cf0_NeikiAnalytics.exe 85 PID 2400 wrote to memory of 1556 2400 cmd.exe 88 PID 2400 wrote to memory of 1556 2400 cmd.exe 88 PID 2400 wrote to memory of 1556 2400 cmd.exe 88 PID 224 wrote to memory of 4436 224 2dc958d58978bbd7b1108c8a0da50cf0_NeikiAnalytics.exe 89 PID 224 wrote to memory of 4436 224 2dc958d58978bbd7b1108c8a0da50cf0_NeikiAnalytics.exe 89 PID 224 wrote to memory of 4436 224 2dc958d58978bbd7b1108c8a0da50cf0_NeikiAnalytics.exe 89 PID 4436 wrote to memory of 3256 4436 explorer.exe 90 PID 4436 wrote to memory of 3256 4436 explorer.exe 90 PID 4436 wrote to memory of 3256 4436 explorer.exe 90 PID 4436 wrote to memory of 3256 4436 explorer.exe 90 PID 4436 wrote to memory of 3256 4436 explorer.exe 90 PID 4436 wrote to memory of 3256 4436 explorer.exe 90 PID 4436 wrote to memory of 3256 4436 explorer.exe 90 PID 4436 wrote to memory of 3256 4436 explorer.exe 90 PID 4436 wrote to memory of 844 4436 explorer.exe 91 PID 4436 wrote to memory of 844 4436 explorer.exe 91 PID 4436 wrote to memory of 844 4436 explorer.exe 91 PID 4436 wrote to memory of 844 4436 explorer.exe 91 PID 4436 wrote to memory of 844 4436 explorer.exe 91 PID 4436 wrote to memory of 844 4436 explorer.exe 91 PID 4436 wrote to memory of 844 4436 explorer.exe 91 PID 844 wrote to memory of 1932 844 explorer.exe 92 PID 844 wrote to memory of 1932 844 explorer.exe 92 PID 844 wrote to memory of 1932 844 explorer.exe 92 PID 844 wrote to memory of 1932 844 explorer.exe 92 PID 844 wrote to memory of 1932 844 explorer.exe 92 PID 844 wrote to memory of 1932 844 explorer.exe 92 PID 844 wrote to memory of 1932 844 explorer.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\2dc958d58978bbd7b1108c8a0da50cf0_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\2dc958d58978bbd7b1108c8a0da50cf0_NeikiAnalytics.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1384 -
C:\Users\Admin\AppData\Local\Temp\2dc958d58978bbd7b1108c8a0da50cf0_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\2dc958d58978bbd7b1108c8a0da50cf0_NeikiAnalytics.exe"2⤵
- Checks computer location settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:224 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\CDAJB.bat" "3⤵
- Suspicious use of WriteProcessMemory
PID:2400 -
C:\Windows\SysWOW64\reg.exeREG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "Video Driver" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\config\explorer.exe" /f4⤵
- Adds Run key to start application
PID:1556
-
-
-
C:\Users\Admin\AppData\Roaming\config\explorer.exe"C:\Users\Admin\AppData\Roaming\config\explorer.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4436 -
C:\Users\Admin\AppData\Roaming\config\explorer.exe"C:\Users\Admin\AppData\Roaming\config\explorer.exe"4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:3256
-
-
C:\Users\Admin\AppData\Roaming\config\explorer.exe"C:\Users\Admin\AppData\Roaming\config\explorer.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:844 -
C:\Users\Admin\AppData\Roaming\config\explorer.exe"C:\Users\Admin\AppData\Roaming\config\explorer.exe"5⤵
- Executes dropped EXE
PID:1932
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
149B
MD5fc1798b7c7938454220fda837a76f354
SHA1b232912930b2bc24ff18bf7ecd58f872bbe01ea0
SHA2567f0a5917b5aca9c5beb153aad0ef95bf0aeafb83768da5b086c3f029ba42d7c8
SHA512d1abdd45a8e5d33893b9d19424174a07feed145d2e6b4be318ab5fde503f850579a4a101a010f30e16ecde2c7123f45357a8341214655321ee0f0097ca911331
-
Filesize
88KB
MD555590b2f3bbdbc948e6f094060b0e8a2
SHA17eeedff052e19aa8ef0c746adb34f4779191c259
SHA256f6f0bee56cf5b5bd872f90ef66a84808e4b016acc5d1ec6cfcb2b905d9a9425d
SHA512942315dfd444f5af2189ef2f6319f1868a85df6937ddc3a1f0853056e144e2cbf55fa61c3321492cb2ae1f2e5326607dd1e4091cff5f1f8bfc416e5716235a7c