Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
17-06-2024 07:00
Static task
static1
Behavioral task
behavioral1
Sample
5e01ead7467cf6b559ec5f9f9c0a9180_NeikiAnalytics.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
5e01ead7467cf6b559ec5f9f9c0a9180_NeikiAnalytics.exe
Resource
win10v2004-20240226-en
General
-
Target
5e01ead7467cf6b559ec5f9f9c0a9180_NeikiAnalytics.exe
-
Size
31KB
-
MD5
5e01ead7467cf6b559ec5f9f9c0a9180
-
SHA1
14fae187bb5b290f809bf1470a8f9047f1cede8d
-
SHA256
cedd9b5eb5d7f3ae8aee30dbd07044dcf70b0ac88c5333b1e5dd69bf3adb1191
-
SHA512
3756fd2100f4fb3a1b6880bbf146b8c2d1ec9e937fdfe7a44a22aa53560944f09cc59132b3121199fa36a378d25593247f8153a22d0455d24ecfd53b335bb9b7
-
SSDEEP
768:/6j3dfUZBWSDVWl8zHPHXyXHCzcHHvzQBdi9vc:/62BWKVWl4vUv4Wvc
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 5e01ead7467cf6b559ec5f9f9c0a9180_NeikiAnalytics.exe Set value (int) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" Admin.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation 5e01ead7467cf6b559ec5f9f9c0a9180_NeikiAnalytics.exe -
Executes dropped EXE 1 IoCs
pid Process 2068 Admin.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Admin = "C:\\Users\\Admin\\Admin.exe" 5e01ead7467cf6b559ec5f9f9c0a9180_NeikiAnalytics.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Admin = "C:\\Users\\Admin\\Admin.exe" Admin.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3372 5e01ead7467cf6b559ec5f9f9c0a9180_NeikiAnalytics.exe 3372 5e01ead7467cf6b559ec5f9f9c0a9180_NeikiAnalytics.exe 3372 5e01ead7467cf6b559ec5f9f9c0a9180_NeikiAnalytics.exe 3372 5e01ead7467cf6b559ec5f9f9c0a9180_NeikiAnalytics.exe 3372 5e01ead7467cf6b559ec5f9f9c0a9180_NeikiAnalytics.exe 3372 5e01ead7467cf6b559ec5f9f9c0a9180_NeikiAnalytics.exe 3372 5e01ead7467cf6b559ec5f9f9c0a9180_NeikiAnalytics.exe 3372 5e01ead7467cf6b559ec5f9f9c0a9180_NeikiAnalytics.exe 2068 Admin.exe 2068 Admin.exe 3372 5e01ead7467cf6b559ec5f9f9c0a9180_NeikiAnalytics.exe 3372 5e01ead7467cf6b559ec5f9f9c0a9180_NeikiAnalytics.exe 2068 Admin.exe 2068 Admin.exe 2068 Admin.exe 2068 Admin.exe 2068 Admin.exe 2068 Admin.exe 3372 5e01ead7467cf6b559ec5f9f9c0a9180_NeikiAnalytics.exe 3372 5e01ead7467cf6b559ec5f9f9c0a9180_NeikiAnalytics.exe 2068 Admin.exe 2068 Admin.exe 2068 Admin.exe 2068 Admin.exe 2068 Admin.exe 2068 Admin.exe 2068 Admin.exe 2068 Admin.exe 2068 Admin.exe 2068 Admin.exe 2068 Admin.exe 2068 Admin.exe 2068 Admin.exe 2068 Admin.exe 2068 Admin.exe 2068 Admin.exe 2068 Admin.exe 2068 Admin.exe 2068 Admin.exe 2068 Admin.exe 2068 Admin.exe 2068 Admin.exe 2068 Admin.exe 2068 Admin.exe 2068 Admin.exe 2068 Admin.exe 2068 Admin.exe 2068 Admin.exe 2068 Admin.exe 2068 Admin.exe 2068 Admin.exe 2068 Admin.exe 2068 Admin.exe 2068 Admin.exe 2068 Admin.exe 2068 Admin.exe 2068 Admin.exe 2068 Admin.exe 2068 Admin.exe 2068 Admin.exe 2068 Admin.exe 2068 Admin.exe 2068 Admin.exe 2068 Admin.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 3372 5e01ead7467cf6b559ec5f9f9c0a9180_NeikiAnalytics.exe 2068 Admin.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3372 wrote to memory of 2068 3372 5e01ead7467cf6b559ec5f9f9c0a9180_NeikiAnalytics.exe 91 PID 3372 wrote to memory of 2068 3372 5e01ead7467cf6b559ec5f9f9c0a9180_NeikiAnalytics.exe 91 PID 3372 wrote to memory of 2068 3372 5e01ead7467cf6b559ec5f9f9c0a9180_NeikiAnalytics.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\5e01ead7467cf6b559ec5f9f9c0a9180_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\5e01ead7467cf6b559ec5f9f9c0a9180_NeikiAnalytics.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3372 -
C:\Users\Admin\Admin.exe"C:\Users\Admin\Admin.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2068
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=1408 --field-trial-handle=2676,i,447940133669489189,1353734109898858672,262144 --variations-seed-version /prefetch:81⤵PID:868
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
31KB
MD5711b2aec1555e758743ee0d70445d2e0
SHA134b8d637ed0f645a2cb6a6d9ddb327857d377911
SHA2569bcf17242e604aa1a896b28d6a96dca7c224f869b75ee90efa80cd71353cc3cf
SHA5129f1d86c3aab06ad32d6886b6e14a3786fa72d3a66ba6d96d3bdee0f40a1ec2a1d8b61a31fafd17b61cea580089a7587422884e4e85cd317f1c45bdd81c8e79eb
-
Filesize
89B
MD52bd83f0dd1740fff26d071dcdd59af56
SHA1221e9e64a79255053a9e4da65957a7bdd6bc045b
SHA25670a676e21716581858de2753ea5eec8befe6741ed299216f65a13c3853805c05
SHA512fe632b63b8b850cc83f0eb2a114de60693ec0dd8b62fe8f0938b42526557889f48357da0ca3bb06bed1ad68562280023a69b54d93cff8b7266bb8ebb63ac903c