Analysis
-
max time kernel
149s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
17-06-2024 06:53
Static task
static1
Behavioral task
behavioral1
Sample
5d38c3e563850dbba4934d4b96a32cc0_NeikiAnalytics.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
5d38c3e563850dbba4934d4b96a32cc0_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
5d38c3e563850dbba4934d4b96a32cc0_NeikiAnalytics.exe
-
Size
88KB
-
MD5
5d38c3e563850dbba4934d4b96a32cc0
-
SHA1
27fe8cb6fdb7499dd4aaf678d50bca4f1e3e6e11
-
SHA256
38d86fc8d74296ab74506125ca891b7014858a47afe514ce684ae21cf91d7b00
-
SHA512
7d344680c8073d9f936c9d60955aff802baa449d3c4cf1501d5b3302ac87d7cab69baa2be9c1daa815f07cf86a20be7d6c8d715511296f79547cd5d591523473
-
SSDEEP
1536:ahUDofByDJWbMGcEFLPEPKOJUsy1+VMA:aIofBHbKMP0PvMA
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation 5d38c3e563850dbba4934d4b96a32cc0_NeikiAnalytics.exe -
Executes dropped EXE 4 IoCs
pid Process 1952 explorer.exe 2260 explorer.exe 2696 explorer.exe 1588 explorer.exe -
resource yara_rule behavioral2/memory/1376-2-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/memory/1376-20-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/memory/1376-21-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/memory/1376-65-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/memory/2260-72-0x0000000000400000-0x000000000040B000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Video Driver = "C:\\Users\\Admin\\AppData\\Roaming\\config\\explorer.exe" reg.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 3724 set thread context of 1376 3724 5d38c3e563850dbba4934d4b96a32cc0_NeikiAnalytics.exe 92 PID 1952 set thread context of 2260 1952 explorer.exe 98 PID 1952 set thread context of 2696 1952 explorer.exe 99 PID 2696 set thread context of 1588 2696 explorer.exe 100 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 2260 explorer.exe Token: SeDebugPrivilege 2260 explorer.exe Token: SeDebugPrivilege 2260 explorer.exe Token: SeDebugPrivilege 2260 explorer.exe Token: SeDebugPrivilege 2260 explorer.exe Token: SeDebugPrivilege 2260 explorer.exe Token: SeDebugPrivilege 2260 explorer.exe Token: SeDebugPrivilege 2260 explorer.exe Token: SeDebugPrivilege 2260 explorer.exe Token: SeDebugPrivilege 2260 explorer.exe Token: SeDebugPrivilege 2260 explorer.exe Token: SeDebugPrivilege 2260 explorer.exe Token: SeDebugPrivilege 2260 explorer.exe Token: SeDebugPrivilege 2260 explorer.exe Token: SeDebugPrivilege 2260 explorer.exe Token: SeDebugPrivilege 2260 explorer.exe Token: SeDebugPrivilege 2260 explorer.exe Token: SeDebugPrivilege 2260 explorer.exe Token: SeDebugPrivilege 2260 explorer.exe Token: SeDebugPrivilege 2260 explorer.exe Token: SeDebugPrivilege 2260 explorer.exe Token: SeDebugPrivilege 2260 explorer.exe Token: SeDebugPrivilege 2260 explorer.exe Token: SeDebugPrivilege 2260 explorer.exe Token: SeDebugPrivilege 2260 explorer.exe Token: SeDebugPrivilege 2260 explorer.exe Token: SeDebugPrivilege 2260 explorer.exe Token: SeDebugPrivilege 2260 explorer.exe Token: SeDebugPrivilege 2260 explorer.exe Token: SeDebugPrivilege 2260 explorer.exe Token: SeDebugPrivilege 2260 explorer.exe Token: SeDebugPrivilege 2260 explorer.exe Token: SeDebugPrivilege 2260 explorer.exe Token: SeDebugPrivilege 2260 explorer.exe Token: SeDebugPrivilege 2260 explorer.exe Token: SeDebugPrivilege 2260 explorer.exe Token: SeDebugPrivilege 2260 explorer.exe Token: SeDebugPrivilege 2260 explorer.exe Token: SeDebugPrivilege 2260 explorer.exe Token: SeDebugPrivilege 2260 explorer.exe Token: SeDebugPrivilege 2260 explorer.exe Token: SeDebugPrivilege 2260 explorer.exe Token: SeDebugPrivilege 2260 explorer.exe Token: SeDebugPrivilege 2260 explorer.exe Token: SeDebugPrivilege 2260 explorer.exe Token: SeDebugPrivilege 2260 explorer.exe Token: SeDebugPrivilege 2260 explorer.exe Token: SeDebugPrivilege 2260 explorer.exe Token: SeDebugPrivilege 2260 explorer.exe Token: SeDebugPrivilege 2260 explorer.exe Token: SeDebugPrivilege 2260 explorer.exe Token: SeDebugPrivilege 2260 explorer.exe Token: SeDebugPrivilege 2260 explorer.exe Token: SeDebugPrivilege 2260 explorer.exe Token: SeDebugPrivilege 2260 explorer.exe Token: SeDebugPrivilege 2260 explorer.exe Token: SeDebugPrivilege 2260 explorer.exe Token: SeDebugPrivilege 2260 explorer.exe Token: SeDebugPrivilege 2260 explorer.exe Token: SeDebugPrivilege 2260 explorer.exe Token: SeDebugPrivilege 2260 explorer.exe Token: SeDebugPrivilege 2260 explorer.exe Token: SeDebugPrivilege 2260 explorer.exe Token: SeDebugPrivilege 2260 explorer.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 3724 5d38c3e563850dbba4934d4b96a32cc0_NeikiAnalytics.exe 1376 5d38c3e563850dbba4934d4b96a32cc0_NeikiAnalytics.exe 1952 explorer.exe 2260 explorer.exe -
Suspicious use of WriteProcessMemory 39 IoCs
description pid Process procid_target PID 3724 wrote to memory of 1376 3724 5d38c3e563850dbba4934d4b96a32cc0_NeikiAnalytics.exe 92 PID 3724 wrote to memory of 1376 3724 5d38c3e563850dbba4934d4b96a32cc0_NeikiAnalytics.exe 92 PID 3724 wrote to memory of 1376 3724 5d38c3e563850dbba4934d4b96a32cc0_NeikiAnalytics.exe 92 PID 3724 wrote to memory of 1376 3724 5d38c3e563850dbba4934d4b96a32cc0_NeikiAnalytics.exe 92 PID 3724 wrote to memory of 1376 3724 5d38c3e563850dbba4934d4b96a32cc0_NeikiAnalytics.exe 92 PID 3724 wrote to memory of 1376 3724 5d38c3e563850dbba4934d4b96a32cc0_NeikiAnalytics.exe 92 PID 3724 wrote to memory of 1376 3724 5d38c3e563850dbba4934d4b96a32cc0_NeikiAnalytics.exe 92 PID 3724 wrote to memory of 1376 3724 5d38c3e563850dbba4934d4b96a32cc0_NeikiAnalytics.exe 92 PID 1376 wrote to memory of 4384 1376 5d38c3e563850dbba4934d4b96a32cc0_NeikiAnalytics.exe 93 PID 1376 wrote to memory of 4384 1376 5d38c3e563850dbba4934d4b96a32cc0_NeikiAnalytics.exe 93 PID 1376 wrote to memory of 4384 1376 5d38c3e563850dbba4934d4b96a32cc0_NeikiAnalytics.exe 93 PID 4384 wrote to memory of 4924 4384 cmd.exe 96 PID 4384 wrote to memory of 4924 4384 cmd.exe 96 PID 4384 wrote to memory of 4924 4384 cmd.exe 96 PID 1376 wrote to memory of 1952 1376 5d38c3e563850dbba4934d4b96a32cc0_NeikiAnalytics.exe 97 PID 1376 wrote to memory of 1952 1376 5d38c3e563850dbba4934d4b96a32cc0_NeikiAnalytics.exe 97 PID 1376 wrote to memory of 1952 1376 5d38c3e563850dbba4934d4b96a32cc0_NeikiAnalytics.exe 97 PID 1952 wrote to memory of 2260 1952 explorer.exe 98 PID 1952 wrote to memory of 2260 1952 explorer.exe 98 PID 1952 wrote to memory of 2260 1952 explorer.exe 98 PID 1952 wrote to memory of 2260 1952 explorer.exe 98 PID 1952 wrote to memory of 2260 1952 explorer.exe 98 PID 1952 wrote to memory of 2260 1952 explorer.exe 98 PID 1952 wrote to memory of 2260 1952 explorer.exe 98 PID 1952 wrote to memory of 2260 1952 explorer.exe 98 PID 1952 wrote to memory of 2696 1952 explorer.exe 99 PID 1952 wrote to memory of 2696 1952 explorer.exe 99 PID 1952 wrote to memory of 2696 1952 explorer.exe 99 PID 1952 wrote to memory of 2696 1952 explorer.exe 99 PID 1952 wrote to memory of 2696 1952 explorer.exe 99 PID 1952 wrote to memory of 2696 1952 explorer.exe 99 PID 1952 wrote to memory of 2696 1952 explorer.exe 99 PID 2696 wrote to memory of 1588 2696 explorer.exe 100 PID 2696 wrote to memory of 1588 2696 explorer.exe 100 PID 2696 wrote to memory of 1588 2696 explorer.exe 100 PID 2696 wrote to memory of 1588 2696 explorer.exe 100 PID 2696 wrote to memory of 1588 2696 explorer.exe 100 PID 2696 wrote to memory of 1588 2696 explorer.exe 100 PID 2696 wrote to memory of 1588 2696 explorer.exe 100
Processes
-
C:\Users\Admin\AppData\Local\Temp\5d38c3e563850dbba4934d4b96a32cc0_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\5d38c3e563850dbba4934d4b96a32cc0_NeikiAnalytics.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3724 -
C:\Users\Admin\AppData\Local\Temp\5d38c3e563850dbba4934d4b96a32cc0_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\5d38c3e563850dbba4934d4b96a32cc0_NeikiAnalytics.exe"2⤵
- Checks computer location settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1376 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\IHVCL.bat" "3⤵
- Suspicious use of WriteProcessMemory
PID:4384 -
C:\Windows\SysWOW64\reg.exeREG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "Video Driver" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\config\explorer.exe" /f4⤵
- Adds Run key to start application
PID:4924
-
-
-
C:\Users\Admin\AppData\Roaming\config\explorer.exe"C:\Users\Admin\AppData\Roaming\config\explorer.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1952 -
C:\Users\Admin\AppData\Roaming\config\explorer.exe"C:\Users\Admin\AppData\Roaming\config\explorer.exe"4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2260
-
-
C:\Users\Admin\AppData\Roaming\config\explorer.exe"C:\Users\Admin\AppData\Roaming\config\explorer.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2696 -
C:\Users\Admin\AppData\Roaming\config\explorer.exe"C:\Users\Admin\AppData\Roaming\config\explorer.exe"5⤵
- Executes dropped EXE
PID:1588
-
-
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --field-trial-handle=4184,i,9746875443948590908,1444894342962555245,262144 --variations-seed-version --mojo-platform-channel-handle=4696 /prefetch:81⤵PID:2000
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
149B
MD5fc1798b7c7938454220fda837a76f354
SHA1b232912930b2bc24ff18bf7ecd58f872bbe01ea0
SHA2567f0a5917b5aca9c5beb153aad0ef95bf0aeafb83768da5b086c3f029ba42d7c8
SHA512d1abdd45a8e5d33893b9d19424174a07feed145d2e6b4be318ab5fde503f850579a4a101a010f30e16ecde2c7123f45357a8341214655321ee0f0097ca911331
-
Filesize
88KB
MD55d38c3e563850dbba4934d4b96a32cc0
SHA127fe8cb6fdb7499dd4aaf678d50bca4f1e3e6e11
SHA25638d86fc8d74296ab74506125ca891b7014858a47afe514ce684ae21cf91d7b00
SHA5127d344680c8073d9f936c9d60955aff802baa449d3c4cf1501d5b3302ac87d7cab69baa2be9c1daa815f07cf86a20be7d6c8d715511296f79547cd5d591523473