Analysis
-
max time kernel
122s -
max time network
67s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
17-06-2024 11:30
Static task
static1
Behavioral task
behavioral1
Sample
84adf40fd3bae5667b60c75bad3f0320_NeikiAnalytics.exe
Resource
win7-20240508-en
General
-
Target
84adf40fd3bae5667b60c75bad3f0320_NeikiAnalytics.exe
-
Size
78KB
-
MD5
84adf40fd3bae5667b60c75bad3f0320
-
SHA1
81820dfefa43ed01349a6c6a99a32e344c235bd0
-
SHA256
a247ca1fe9162f80db703c0066d5ede361e38b02017987f2a91d4eb81fbf3caf
-
SHA512
9ca0c4409e10c0c15e3cd282c7cd6b456c755f57625eeafcd3d9ed619ea62565256062f31b82a13bbc90495f083d98813d754a1532ba98cf7e4f7450f4d8816c
-
SSDEEP
1536:tJVSICrSkaw/p/EvPUV/INj1LaI1kCWibeCF5mNo8oSYQXQpbQqX+Pe/:NSleeEEV/OZaPCWibeCjsXEQXSXS6
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Signatures
-
Modifies firewall policy service 2 TTPs 3 IoCs
Processes:
84adf40fd3bae5667b60c75bad3f0320_NeikiAnalytics.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" 84adf40fd3bae5667b60c75bad3f0320_NeikiAnalytics.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" 84adf40fd3bae5667b60c75bad3f0320_NeikiAnalytics.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "1" 84adf40fd3bae5667b60c75bad3f0320_NeikiAnalytics.exe -
Processes:
84adf40fd3bae5667b60c75bad3f0320_NeikiAnalytics.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 84adf40fd3bae5667b60c75bad3f0320_NeikiAnalytics.exe -
Processes:
84adf40fd3bae5667b60c75bad3f0320_NeikiAnalytics.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" 84adf40fd3bae5667b60c75bad3f0320_NeikiAnalytics.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" 84adf40fd3bae5667b60c75bad3f0320_NeikiAnalytics.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UacDisableNotify = "1" 84adf40fd3bae5667b60c75bad3f0320_NeikiAnalytics.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" 84adf40fd3bae5667b60c75bad3f0320_NeikiAnalytics.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" 84adf40fd3bae5667b60c75bad3f0320_NeikiAnalytics.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" 84adf40fd3bae5667b60c75bad3f0320_NeikiAnalytics.exe -
Processes:
resource yara_rule behavioral2/memory/1872-5-0x00000000025F0000-0x00000000036AA000-memory.dmp upx behavioral2/memory/1872-12-0x00000000025F0000-0x00000000036AA000-memory.dmp upx behavioral2/memory/1872-1-0x00000000025F0000-0x00000000036AA000-memory.dmp upx behavioral2/memory/1872-6-0x00000000025F0000-0x00000000036AA000-memory.dmp upx behavioral2/memory/1872-3-0x00000000025F0000-0x00000000036AA000-memory.dmp upx behavioral2/memory/1872-13-0x00000000025F0000-0x00000000036AA000-memory.dmp upx behavioral2/memory/1872-16-0x00000000025F0000-0x00000000036AA000-memory.dmp upx behavioral2/memory/1872-14-0x00000000025F0000-0x00000000036AA000-memory.dmp upx behavioral2/memory/1872-15-0x00000000025F0000-0x00000000036AA000-memory.dmp upx behavioral2/memory/1872-4-0x00000000025F0000-0x00000000036AA000-memory.dmp upx behavioral2/memory/1872-17-0x00000000025F0000-0x00000000036AA000-memory.dmp upx behavioral2/memory/1872-22-0x00000000025F0000-0x00000000036AA000-memory.dmp upx behavioral2/memory/1872-23-0x00000000025F0000-0x00000000036AA000-memory.dmp upx behavioral2/memory/1872-24-0x00000000025F0000-0x00000000036AA000-memory.dmp upx behavioral2/memory/1872-25-0x00000000025F0000-0x00000000036AA000-memory.dmp upx behavioral2/memory/1872-26-0x00000000025F0000-0x00000000036AA000-memory.dmp upx behavioral2/memory/1872-28-0x00000000025F0000-0x00000000036AA000-memory.dmp upx behavioral2/memory/1872-29-0x00000000025F0000-0x00000000036AA000-memory.dmp upx behavioral2/memory/1872-30-0x00000000025F0000-0x00000000036AA000-memory.dmp upx behavioral2/memory/1872-32-0x00000000025F0000-0x00000000036AA000-memory.dmp upx behavioral2/memory/1872-33-0x00000000025F0000-0x00000000036AA000-memory.dmp upx behavioral2/memory/1872-35-0x00000000025F0000-0x00000000036AA000-memory.dmp upx behavioral2/memory/1872-37-0x00000000025F0000-0x00000000036AA000-memory.dmp upx behavioral2/memory/1872-40-0x00000000025F0000-0x00000000036AA000-memory.dmp upx behavioral2/memory/1872-42-0x00000000025F0000-0x00000000036AA000-memory.dmp upx behavioral2/memory/1872-44-0x00000000025F0000-0x00000000036AA000-memory.dmp upx behavioral2/memory/1872-46-0x00000000025F0000-0x00000000036AA000-memory.dmp upx behavioral2/memory/1872-53-0x00000000025F0000-0x00000000036AA000-memory.dmp upx behavioral2/memory/1872-55-0x00000000025F0000-0x00000000036AA000-memory.dmp upx behavioral2/memory/1872-57-0x00000000025F0000-0x00000000036AA000-memory.dmp upx behavioral2/memory/1872-59-0x00000000025F0000-0x00000000036AA000-memory.dmp upx behavioral2/memory/1872-61-0x00000000025F0000-0x00000000036AA000-memory.dmp upx behavioral2/memory/1872-63-0x00000000025F0000-0x00000000036AA000-memory.dmp upx behavioral2/memory/1872-65-0x00000000025F0000-0x00000000036AA000-memory.dmp upx behavioral2/memory/1872-67-0x00000000025F0000-0x00000000036AA000-memory.dmp upx behavioral2/memory/1872-70-0x00000000025F0000-0x00000000036AA000-memory.dmp upx behavioral2/memory/1872-72-0x00000000025F0000-0x00000000036AA000-memory.dmp upx behavioral2/memory/1872-74-0x00000000025F0000-0x00000000036AA000-memory.dmp upx behavioral2/memory/1872-77-0x00000000025F0000-0x00000000036AA000-memory.dmp upx behavioral2/memory/1872-78-0x00000000025F0000-0x00000000036AA000-memory.dmp upx -
Processes:
84adf40fd3bae5667b60c75bad3f0320_NeikiAnalytics.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" 84adf40fd3bae5667b60c75bad3f0320_NeikiAnalytics.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" 84adf40fd3bae5667b60c75bad3f0320_NeikiAnalytics.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" 84adf40fd3bae5667b60c75bad3f0320_NeikiAnalytics.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" 84adf40fd3bae5667b60c75bad3f0320_NeikiAnalytics.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" 84adf40fd3bae5667b60c75bad3f0320_NeikiAnalytics.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UacDisableNotify = "1" 84adf40fd3bae5667b60c75bad3f0320_NeikiAnalytics.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\Svc 84adf40fd3bae5667b60c75bad3f0320_NeikiAnalytics.exe -
Processes:
84adf40fd3bae5667b60c75bad3f0320_NeikiAnalytics.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 84adf40fd3bae5667b60c75bad3f0320_NeikiAnalytics.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
84adf40fd3bae5667b60c75bad3f0320_NeikiAnalytics.exedescription ioc process File opened (read-only) \??\H: 84adf40fd3bae5667b60c75bad3f0320_NeikiAnalytics.exe File opened (read-only) \??\Q: 84adf40fd3bae5667b60c75bad3f0320_NeikiAnalytics.exe File opened (read-only) \??\R: 84adf40fd3bae5667b60c75bad3f0320_NeikiAnalytics.exe File opened (read-only) \??\U: 84adf40fd3bae5667b60c75bad3f0320_NeikiAnalytics.exe File opened (read-only) \??\V: 84adf40fd3bae5667b60c75bad3f0320_NeikiAnalytics.exe File opened (read-only) \??\W: 84adf40fd3bae5667b60c75bad3f0320_NeikiAnalytics.exe File opened (read-only) \??\J: 84adf40fd3bae5667b60c75bad3f0320_NeikiAnalytics.exe File opened (read-only) \??\L: 84adf40fd3bae5667b60c75bad3f0320_NeikiAnalytics.exe File opened (read-only) \??\M: 84adf40fd3bae5667b60c75bad3f0320_NeikiAnalytics.exe File opened (read-only) \??\N: 84adf40fd3bae5667b60c75bad3f0320_NeikiAnalytics.exe File opened (read-only) \??\O: 84adf40fd3bae5667b60c75bad3f0320_NeikiAnalytics.exe File opened (read-only) \??\P: 84adf40fd3bae5667b60c75bad3f0320_NeikiAnalytics.exe File opened (read-only) \??\Z: 84adf40fd3bae5667b60c75bad3f0320_NeikiAnalytics.exe File opened (read-only) \??\E: 84adf40fd3bae5667b60c75bad3f0320_NeikiAnalytics.exe File opened (read-only) \??\S: 84adf40fd3bae5667b60c75bad3f0320_NeikiAnalytics.exe File opened (read-only) \??\T: 84adf40fd3bae5667b60c75bad3f0320_NeikiAnalytics.exe File opened (read-only) \??\Y: 84adf40fd3bae5667b60c75bad3f0320_NeikiAnalytics.exe File opened (read-only) \??\G: 84adf40fd3bae5667b60c75bad3f0320_NeikiAnalytics.exe File opened (read-only) \??\I: 84adf40fd3bae5667b60c75bad3f0320_NeikiAnalytics.exe File opened (read-only) \??\K: 84adf40fd3bae5667b60c75bad3f0320_NeikiAnalytics.exe File opened (read-only) \??\X: 84adf40fd3bae5667b60c75bad3f0320_NeikiAnalytics.exe -
Drops autorun.inf file 1 TTPs 2 IoCs
Malware can abuse Windows Autorun to spread further via attached volumes.
Processes:
84adf40fd3bae5667b60c75bad3f0320_NeikiAnalytics.exedescription ioc process File opened for modification C:\autorun.inf 84adf40fd3bae5667b60c75bad3f0320_NeikiAnalytics.exe File opened for modification F:\autorun.inf 84adf40fd3bae5667b60c75bad3f0320_NeikiAnalytics.exe -
Drops file in Program Files directory 12 IoCs
Processes:
84adf40fd3bae5667b60c75bad3f0320_NeikiAnalytics.exedescription ioc process File opened for modification C:\Program Files\7-Zip\7zG.exe 84adf40fd3bae5667b60c75bad3f0320_NeikiAnalytics.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\IntegratedOffice.exe 84adf40fd3bae5667b60c75bad3f0320_NeikiAnalytics.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\MavInject32.exe 84adf40fd3bae5667b60c75bad3f0320_NeikiAnalytics.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\OfficeClickToRun.exe 84adf40fd3bae5667b60c75bad3f0320_NeikiAnalytics.exe File opened for modification C:\Program Files (x86)\Common Files\Java\Java Update\jusched.exe 84adf40fd3bae5667b60c75bad3f0320_NeikiAnalytics.exe File opened for modification C:\Program Files\7-Zip\7z.exe 84adf40fd3bae5667b60c75bad3f0320_NeikiAnalytics.exe File opened for modification C:\Program Files\7-Zip\7zFM.exe 84adf40fd3bae5667b60c75bad3f0320_NeikiAnalytics.exe File opened for modification C:\Program Files\7-Zip\Uninstall.exe 84adf40fd3bae5667b60c75bad3f0320_NeikiAnalytics.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\appvcleaner.exe 84adf40fd3bae5667b60c75bad3f0320_NeikiAnalytics.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\AppVShNotify.exe 84adf40fd3bae5667b60c75bad3f0320_NeikiAnalytics.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\InspectorOfficeGadget.exe 84adf40fd3bae5667b60c75bad3f0320_NeikiAnalytics.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\OfficeC2RClient.exe 84adf40fd3bae5667b60c75bad3f0320_NeikiAnalytics.exe -
Drops file in Windows directory 2 IoCs
Processes:
84adf40fd3bae5667b60c75bad3f0320_NeikiAnalytics.exedescription ioc process File created C:\Windows\e57472b 84adf40fd3bae5667b60c75bad3f0320_NeikiAnalytics.exe File opened for modification C:\Windows\SYSTEM.INI 84adf40fd3bae5667b60c75bad3f0320_NeikiAnalytics.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
Processes:
84adf40fd3bae5667b60c75bad3f0320_NeikiAnalytics.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000_Classes\Local Settings 84adf40fd3bae5667b60c75bad3f0320_NeikiAnalytics.exe -
Suspicious behavior: EnumeratesProcesses 26 IoCs
Processes:
84adf40fd3bae5667b60c75bad3f0320_NeikiAnalytics.exepid process 1872 84adf40fd3bae5667b60c75bad3f0320_NeikiAnalytics.exe 1872 84adf40fd3bae5667b60c75bad3f0320_NeikiAnalytics.exe 1872 84adf40fd3bae5667b60c75bad3f0320_NeikiAnalytics.exe 1872 84adf40fd3bae5667b60c75bad3f0320_NeikiAnalytics.exe 1872 84adf40fd3bae5667b60c75bad3f0320_NeikiAnalytics.exe 1872 84adf40fd3bae5667b60c75bad3f0320_NeikiAnalytics.exe 1872 84adf40fd3bae5667b60c75bad3f0320_NeikiAnalytics.exe 1872 84adf40fd3bae5667b60c75bad3f0320_NeikiAnalytics.exe 1872 84adf40fd3bae5667b60c75bad3f0320_NeikiAnalytics.exe 1872 84adf40fd3bae5667b60c75bad3f0320_NeikiAnalytics.exe 1872 84adf40fd3bae5667b60c75bad3f0320_NeikiAnalytics.exe 1872 84adf40fd3bae5667b60c75bad3f0320_NeikiAnalytics.exe 1872 84adf40fd3bae5667b60c75bad3f0320_NeikiAnalytics.exe 1872 84adf40fd3bae5667b60c75bad3f0320_NeikiAnalytics.exe 1872 84adf40fd3bae5667b60c75bad3f0320_NeikiAnalytics.exe 1872 84adf40fd3bae5667b60c75bad3f0320_NeikiAnalytics.exe 1872 84adf40fd3bae5667b60c75bad3f0320_NeikiAnalytics.exe 1872 84adf40fd3bae5667b60c75bad3f0320_NeikiAnalytics.exe 1872 84adf40fd3bae5667b60c75bad3f0320_NeikiAnalytics.exe 1872 84adf40fd3bae5667b60c75bad3f0320_NeikiAnalytics.exe 1872 84adf40fd3bae5667b60c75bad3f0320_NeikiAnalytics.exe 1872 84adf40fd3bae5667b60c75bad3f0320_NeikiAnalytics.exe 1872 84adf40fd3bae5667b60c75bad3f0320_NeikiAnalytics.exe 1872 84adf40fd3bae5667b60c75bad3f0320_NeikiAnalytics.exe 1872 84adf40fd3bae5667b60c75bad3f0320_NeikiAnalytics.exe 1872 84adf40fd3bae5667b60c75bad3f0320_NeikiAnalytics.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
84adf40fd3bae5667b60c75bad3f0320_NeikiAnalytics.exedescription pid process Token: SeDebugPrivilege 1872 84adf40fd3bae5667b60c75bad3f0320_NeikiAnalytics.exe Token: SeDebugPrivilege 1872 84adf40fd3bae5667b60c75bad3f0320_NeikiAnalytics.exe Token: SeDebugPrivilege 1872 84adf40fd3bae5667b60c75bad3f0320_NeikiAnalytics.exe Token: SeDebugPrivilege 1872 84adf40fd3bae5667b60c75bad3f0320_NeikiAnalytics.exe Token: SeDebugPrivilege 1872 84adf40fd3bae5667b60c75bad3f0320_NeikiAnalytics.exe Token: SeDebugPrivilege 1872 84adf40fd3bae5667b60c75bad3f0320_NeikiAnalytics.exe Token: SeDebugPrivilege 1872 84adf40fd3bae5667b60c75bad3f0320_NeikiAnalytics.exe Token: SeDebugPrivilege 1872 84adf40fd3bae5667b60c75bad3f0320_NeikiAnalytics.exe Token: SeDebugPrivilege 1872 84adf40fd3bae5667b60c75bad3f0320_NeikiAnalytics.exe Token: SeDebugPrivilege 1872 84adf40fd3bae5667b60c75bad3f0320_NeikiAnalytics.exe Token: SeDebugPrivilege 1872 84adf40fd3bae5667b60c75bad3f0320_NeikiAnalytics.exe Token: SeDebugPrivilege 1872 84adf40fd3bae5667b60c75bad3f0320_NeikiAnalytics.exe Token: SeDebugPrivilege 1872 84adf40fd3bae5667b60c75bad3f0320_NeikiAnalytics.exe Token: SeDebugPrivilege 1872 84adf40fd3bae5667b60c75bad3f0320_NeikiAnalytics.exe Token: SeDebugPrivilege 1872 84adf40fd3bae5667b60c75bad3f0320_NeikiAnalytics.exe Token: SeDebugPrivilege 1872 84adf40fd3bae5667b60c75bad3f0320_NeikiAnalytics.exe Token: SeDebugPrivilege 1872 84adf40fd3bae5667b60c75bad3f0320_NeikiAnalytics.exe Token: SeDebugPrivilege 1872 84adf40fd3bae5667b60c75bad3f0320_NeikiAnalytics.exe Token: SeDebugPrivilege 1872 84adf40fd3bae5667b60c75bad3f0320_NeikiAnalytics.exe Token: SeDebugPrivilege 1872 84adf40fd3bae5667b60c75bad3f0320_NeikiAnalytics.exe Token: SeDebugPrivilege 1872 84adf40fd3bae5667b60c75bad3f0320_NeikiAnalytics.exe Token: SeDebugPrivilege 1872 84adf40fd3bae5667b60c75bad3f0320_NeikiAnalytics.exe Token: SeDebugPrivilege 1872 84adf40fd3bae5667b60c75bad3f0320_NeikiAnalytics.exe Token: SeDebugPrivilege 1872 84adf40fd3bae5667b60c75bad3f0320_NeikiAnalytics.exe Token: SeDebugPrivilege 1872 84adf40fd3bae5667b60c75bad3f0320_NeikiAnalytics.exe Token: SeDebugPrivilege 1872 84adf40fd3bae5667b60c75bad3f0320_NeikiAnalytics.exe Token: SeDebugPrivilege 1872 84adf40fd3bae5667b60c75bad3f0320_NeikiAnalytics.exe Token: SeDebugPrivilege 1872 84adf40fd3bae5667b60c75bad3f0320_NeikiAnalytics.exe Token: SeDebugPrivilege 1872 84adf40fd3bae5667b60c75bad3f0320_NeikiAnalytics.exe Token: SeDebugPrivilege 1872 84adf40fd3bae5667b60c75bad3f0320_NeikiAnalytics.exe Token: SeDebugPrivilege 1872 84adf40fd3bae5667b60c75bad3f0320_NeikiAnalytics.exe Token: SeDebugPrivilege 1872 84adf40fd3bae5667b60c75bad3f0320_NeikiAnalytics.exe Token: SeDebugPrivilege 1872 84adf40fd3bae5667b60c75bad3f0320_NeikiAnalytics.exe Token: SeDebugPrivilege 1872 84adf40fd3bae5667b60c75bad3f0320_NeikiAnalytics.exe Token: SeDebugPrivilege 1872 84adf40fd3bae5667b60c75bad3f0320_NeikiAnalytics.exe Token: SeDebugPrivilege 1872 84adf40fd3bae5667b60c75bad3f0320_NeikiAnalytics.exe Token: SeDebugPrivilege 1872 84adf40fd3bae5667b60c75bad3f0320_NeikiAnalytics.exe Token: SeDebugPrivilege 1872 84adf40fd3bae5667b60c75bad3f0320_NeikiAnalytics.exe Token: SeDebugPrivilege 1872 84adf40fd3bae5667b60c75bad3f0320_NeikiAnalytics.exe Token: SeDebugPrivilege 1872 84adf40fd3bae5667b60c75bad3f0320_NeikiAnalytics.exe Token: SeDebugPrivilege 1872 84adf40fd3bae5667b60c75bad3f0320_NeikiAnalytics.exe Token: SeDebugPrivilege 1872 84adf40fd3bae5667b60c75bad3f0320_NeikiAnalytics.exe Token: SeDebugPrivilege 1872 84adf40fd3bae5667b60c75bad3f0320_NeikiAnalytics.exe Token: SeDebugPrivilege 1872 84adf40fd3bae5667b60c75bad3f0320_NeikiAnalytics.exe Token: SeDebugPrivilege 1872 84adf40fd3bae5667b60c75bad3f0320_NeikiAnalytics.exe Token: SeDebugPrivilege 1872 84adf40fd3bae5667b60c75bad3f0320_NeikiAnalytics.exe Token: SeDebugPrivilege 1872 84adf40fd3bae5667b60c75bad3f0320_NeikiAnalytics.exe Token: SeDebugPrivilege 1872 84adf40fd3bae5667b60c75bad3f0320_NeikiAnalytics.exe Token: SeDebugPrivilege 1872 84adf40fd3bae5667b60c75bad3f0320_NeikiAnalytics.exe Token: SeDebugPrivilege 1872 84adf40fd3bae5667b60c75bad3f0320_NeikiAnalytics.exe Token: SeDebugPrivilege 1872 84adf40fd3bae5667b60c75bad3f0320_NeikiAnalytics.exe Token: SeDebugPrivilege 1872 84adf40fd3bae5667b60c75bad3f0320_NeikiAnalytics.exe Token: SeDebugPrivilege 1872 84adf40fd3bae5667b60c75bad3f0320_NeikiAnalytics.exe Token: SeDebugPrivilege 1872 84adf40fd3bae5667b60c75bad3f0320_NeikiAnalytics.exe Token: SeDebugPrivilege 1872 84adf40fd3bae5667b60c75bad3f0320_NeikiAnalytics.exe Token: SeDebugPrivilege 1872 84adf40fd3bae5667b60c75bad3f0320_NeikiAnalytics.exe Token: SeDebugPrivilege 1872 84adf40fd3bae5667b60c75bad3f0320_NeikiAnalytics.exe Token: SeDebugPrivilege 1872 84adf40fd3bae5667b60c75bad3f0320_NeikiAnalytics.exe Token: SeDebugPrivilege 1872 84adf40fd3bae5667b60c75bad3f0320_NeikiAnalytics.exe Token: SeDebugPrivilege 1872 84adf40fd3bae5667b60c75bad3f0320_NeikiAnalytics.exe Token: SeDebugPrivilege 1872 84adf40fd3bae5667b60c75bad3f0320_NeikiAnalytics.exe Token: SeDebugPrivilege 1872 84adf40fd3bae5667b60c75bad3f0320_NeikiAnalytics.exe Token: SeDebugPrivilege 1872 84adf40fd3bae5667b60c75bad3f0320_NeikiAnalytics.exe Token: SeDebugPrivilege 1872 84adf40fd3bae5667b60c75bad3f0320_NeikiAnalytics.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
84adf40fd3bae5667b60c75bad3f0320_NeikiAnalytics.exedescription pid process target process PID 1872 wrote to memory of 788 1872 84adf40fd3bae5667b60c75bad3f0320_NeikiAnalytics.exe fontdrvhost.exe PID 1872 wrote to memory of 796 1872 84adf40fd3bae5667b60c75bad3f0320_NeikiAnalytics.exe fontdrvhost.exe PID 1872 wrote to memory of 68 1872 84adf40fd3bae5667b60c75bad3f0320_NeikiAnalytics.exe dwm.exe PID 1872 wrote to memory of 2552 1872 84adf40fd3bae5667b60c75bad3f0320_NeikiAnalytics.exe sihost.exe PID 1872 wrote to memory of 2564 1872 84adf40fd3bae5667b60c75bad3f0320_NeikiAnalytics.exe svchost.exe PID 1872 wrote to memory of 2820 1872 84adf40fd3bae5667b60c75bad3f0320_NeikiAnalytics.exe taskhostw.exe PID 1872 wrote to memory of 3488 1872 84adf40fd3bae5667b60c75bad3f0320_NeikiAnalytics.exe Explorer.EXE PID 1872 wrote to memory of 3632 1872 84adf40fd3bae5667b60c75bad3f0320_NeikiAnalytics.exe svchost.exe PID 1872 wrote to memory of 3808 1872 84adf40fd3bae5667b60c75bad3f0320_NeikiAnalytics.exe DllHost.exe PID 1872 wrote to memory of 3908 1872 84adf40fd3bae5667b60c75bad3f0320_NeikiAnalytics.exe StartMenuExperienceHost.exe PID 1872 wrote to memory of 3972 1872 84adf40fd3bae5667b60c75bad3f0320_NeikiAnalytics.exe RuntimeBroker.exe PID 1872 wrote to memory of 4048 1872 84adf40fd3bae5667b60c75bad3f0320_NeikiAnalytics.exe SearchApp.exe PID 1872 wrote to memory of 4208 1872 84adf40fd3bae5667b60c75bad3f0320_NeikiAnalytics.exe RuntimeBroker.exe PID 1872 wrote to memory of 4600 1872 84adf40fd3bae5667b60c75bad3f0320_NeikiAnalytics.exe RuntimeBroker.exe PID 1872 wrote to memory of 4716 1872 84adf40fd3bae5667b60c75bad3f0320_NeikiAnalytics.exe TextInputHost.exe PID 1872 wrote to memory of 3164 1872 84adf40fd3bae5667b60c75bad3f0320_NeikiAnalytics.exe backgroundTaskHost.exe PID 1872 wrote to memory of 788 1872 84adf40fd3bae5667b60c75bad3f0320_NeikiAnalytics.exe fontdrvhost.exe PID 1872 wrote to memory of 796 1872 84adf40fd3bae5667b60c75bad3f0320_NeikiAnalytics.exe fontdrvhost.exe PID 1872 wrote to memory of 68 1872 84adf40fd3bae5667b60c75bad3f0320_NeikiAnalytics.exe dwm.exe PID 1872 wrote to memory of 2552 1872 84adf40fd3bae5667b60c75bad3f0320_NeikiAnalytics.exe sihost.exe PID 1872 wrote to memory of 2564 1872 84adf40fd3bae5667b60c75bad3f0320_NeikiAnalytics.exe svchost.exe PID 1872 wrote to memory of 2820 1872 84adf40fd3bae5667b60c75bad3f0320_NeikiAnalytics.exe taskhostw.exe PID 1872 wrote to memory of 3488 1872 84adf40fd3bae5667b60c75bad3f0320_NeikiAnalytics.exe Explorer.EXE PID 1872 wrote to memory of 3632 1872 84adf40fd3bae5667b60c75bad3f0320_NeikiAnalytics.exe svchost.exe PID 1872 wrote to memory of 3808 1872 84adf40fd3bae5667b60c75bad3f0320_NeikiAnalytics.exe DllHost.exe PID 1872 wrote to memory of 3908 1872 84adf40fd3bae5667b60c75bad3f0320_NeikiAnalytics.exe StartMenuExperienceHost.exe PID 1872 wrote to memory of 3972 1872 84adf40fd3bae5667b60c75bad3f0320_NeikiAnalytics.exe RuntimeBroker.exe PID 1872 wrote to memory of 4048 1872 84adf40fd3bae5667b60c75bad3f0320_NeikiAnalytics.exe SearchApp.exe PID 1872 wrote to memory of 4208 1872 84adf40fd3bae5667b60c75bad3f0320_NeikiAnalytics.exe RuntimeBroker.exe PID 1872 wrote to memory of 4600 1872 84adf40fd3bae5667b60c75bad3f0320_NeikiAnalytics.exe RuntimeBroker.exe PID 1872 wrote to memory of 4716 1872 84adf40fd3bae5667b60c75bad3f0320_NeikiAnalytics.exe TextInputHost.exe PID 1872 wrote to memory of 2732 1872 84adf40fd3bae5667b60c75bad3f0320_NeikiAnalytics.exe RuntimeBroker.exe PID 1872 wrote to memory of 2104 1872 84adf40fd3bae5667b60c75bad3f0320_NeikiAnalytics.exe RuntimeBroker.exe PID 1872 wrote to memory of 788 1872 84adf40fd3bae5667b60c75bad3f0320_NeikiAnalytics.exe fontdrvhost.exe PID 1872 wrote to memory of 796 1872 84adf40fd3bae5667b60c75bad3f0320_NeikiAnalytics.exe fontdrvhost.exe PID 1872 wrote to memory of 68 1872 84adf40fd3bae5667b60c75bad3f0320_NeikiAnalytics.exe dwm.exe PID 1872 wrote to memory of 2552 1872 84adf40fd3bae5667b60c75bad3f0320_NeikiAnalytics.exe sihost.exe PID 1872 wrote to memory of 2564 1872 84adf40fd3bae5667b60c75bad3f0320_NeikiAnalytics.exe svchost.exe PID 1872 wrote to memory of 2820 1872 84adf40fd3bae5667b60c75bad3f0320_NeikiAnalytics.exe taskhostw.exe PID 1872 wrote to memory of 3488 1872 84adf40fd3bae5667b60c75bad3f0320_NeikiAnalytics.exe Explorer.EXE PID 1872 wrote to memory of 3632 1872 84adf40fd3bae5667b60c75bad3f0320_NeikiAnalytics.exe svchost.exe PID 1872 wrote to memory of 3808 1872 84adf40fd3bae5667b60c75bad3f0320_NeikiAnalytics.exe DllHost.exe PID 1872 wrote to memory of 3908 1872 84adf40fd3bae5667b60c75bad3f0320_NeikiAnalytics.exe StartMenuExperienceHost.exe PID 1872 wrote to memory of 3972 1872 84adf40fd3bae5667b60c75bad3f0320_NeikiAnalytics.exe RuntimeBroker.exe PID 1872 wrote to memory of 4048 1872 84adf40fd3bae5667b60c75bad3f0320_NeikiAnalytics.exe SearchApp.exe PID 1872 wrote to memory of 4208 1872 84adf40fd3bae5667b60c75bad3f0320_NeikiAnalytics.exe RuntimeBroker.exe PID 1872 wrote to memory of 4600 1872 84adf40fd3bae5667b60c75bad3f0320_NeikiAnalytics.exe RuntimeBroker.exe PID 1872 wrote to memory of 4716 1872 84adf40fd3bae5667b60c75bad3f0320_NeikiAnalytics.exe TextInputHost.exe PID 1872 wrote to memory of 2732 1872 84adf40fd3bae5667b60c75bad3f0320_NeikiAnalytics.exe RuntimeBroker.exe PID 1872 wrote to memory of 2104 1872 84adf40fd3bae5667b60c75bad3f0320_NeikiAnalytics.exe RuntimeBroker.exe PID 1872 wrote to memory of 788 1872 84adf40fd3bae5667b60c75bad3f0320_NeikiAnalytics.exe fontdrvhost.exe PID 1872 wrote to memory of 796 1872 84adf40fd3bae5667b60c75bad3f0320_NeikiAnalytics.exe fontdrvhost.exe PID 1872 wrote to memory of 68 1872 84adf40fd3bae5667b60c75bad3f0320_NeikiAnalytics.exe dwm.exe PID 1872 wrote to memory of 2552 1872 84adf40fd3bae5667b60c75bad3f0320_NeikiAnalytics.exe sihost.exe PID 1872 wrote to memory of 2564 1872 84adf40fd3bae5667b60c75bad3f0320_NeikiAnalytics.exe svchost.exe PID 1872 wrote to memory of 2820 1872 84adf40fd3bae5667b60c75bad3f0320_NeikiAnalytics.exe taskhostw.exe PID 1872 wrote to memory of 3488 1872 84adf40fd3bae5667b60c75bad3f0320_NeikiAnalytics.exe Explorer.EXE PID 1872 wrote to memory of 3632 1872 84adf40fd3bae5667b60c75bad3f0320_NeikiAnalytics.exe svchost.exe PID 1872 wrote to memory of 3808 1872 84adf40fd3bae5667b60c75bad3f0320_NeikiAnalytics.exe DllHost.exe PID 1872 wrote to memory of 3908 1872 84adf40fd3bae5667b60c75bad3f0320_NeikiAnalytics.exe StartMenuExperienceHost.exe PID 1872 wrote to memory of 3972 1872 84adf40fd3bae5667b60c75bad3f0320_NeikiAnalytics.exe RuntimeBroker.exe PID 1872 wrote to memory of 4048 1872 84adf40fd3bae5667b60c75bad3f0320_NeikiAnalytics.exe SearchApp.exe PID 1872 wrote to memory of 4208 1872 84adf40fd3bae5667b60c75bad3f0320_NeikiAnalytics.exe RuntimeBroker.exe PID 1872 wrote to memory of 4600 1872 84adf40fd3bae5667b60c75bad3f0320_NeikiAnalytics.exe RuntimeBroker.exe -
System policy modification 1 TTPs 1 IoCs
Processes:
84adf40fd3bae5667b60c75bad3f0320_NeikiAnalytics.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 84adf40fd3bae5667b60c75bad3f0320_NeikiAnalytics.exe
Processes
-
C:\Windows\system32\fontdrvhost.exe"fontdrvhost.exe"1⤵
-
C:\Windows\system32\fontdrvhost.exe"fontdrvhost.exe"1⤵
-
C:\Windows\system32\dwm.exe"dwm.exe"1⤵
-
C:\Windows\system32\sihost.exesihost.exe1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc1⤵
-
C:\Windows\system32\taskhostw.exetaskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}1⤵
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
-
C:\Users\Admin\AppData\Local\Temp\84adf40fd3bae5667b60c75bad3f0320_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\84adf40fd3bae5667b60c75bad3f0320_NeikiAnalytics.exe"2⤵
- Modifies firewall policy service
- UAC bypass
- Windows security bypass
- Windows security modification
- Checks whether UAC is enabled
- Enumerates connected drives
- Drops autorun.inf file
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k ClipboardSvcGroup -p -s cbdhsvc1⤵
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵
-
C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\InputApp\TextInputHost.exe"C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\InputApp\TextInputHost.exe" -ServerName:InputApp.AppX9jnwykgrccxc8by3hsrsh07r423xzvav.mca1⤵
-
C:\Windows\system32\backgroundTaskHost.exe"C:\Windows\system32\backgroundTaskHost.exe" -ServerName:App.AppXmtcan0h2tfbfy7k9kn8hbxb6dmzz1zh0.mca1⤵
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Privilege Escalation
Create or Modify System Process
1Windows Service
1Abuse Elevation Control Mechanism
1Bypass User Account Control
1Defense Evasion
Modify Registry
5Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
3Disable or Modify Tools
3Replay Monitor
Loading Replay Monitor...
Downloads
-
F:\jurbq.pifFilesize
97KB
MD5145087bf829897a0a304303178052319
SHA1d09f1543d6630729307d11f460ed3725f14793f0
SHA2562d4e0c8f552c4a53f670ac4e4e55ed794dba99d5d11c8c68e654a88a7731d381
SHA512b54c2a4715d247c87bb69c3f958dfc9534a7b6884c42e41140e606e317c78142b948f0bff0230007d0392ff9a906eaf0754f302d84a89d44e537d0373b9cbf4c
-
memory/1872-29-0x00000000025F0000-0x00000000036AA000-memory.dmpFilesize
16.7MB
-
memory/1872-78-0x00000000025F0000-0x00000000036AA000-memory.dmpFilesize
16.7MB
-
memory/1872-1-0x00000000025F0000-0x00000000036AA000-memory.dmpFilesize
16.7MB
-
memory/1872-6-0x00000000025F0000-0x00000000036AA000-memory.dmpFilesize
16.7MB
-
memory/1872-3-0x00000000025F0000-0x00000000036AA000-memory.dmpFilesize
16.7MB
-
memory/1872-13-0x00000000025F0000-0x00000000036AA000-memory.dmpFilesize
16.7MB
-
memory/1872-16-0x00000000025F0000-0x00000000036AA000-memory.dmpFilesize
16.7MB
-
memory/1872-14-0x00000000025F0000-0x00000000036AA000-memory.dmpFilesize
16.7MB
-
memory/1872-15-0x00000000025F0000-0x00000000036AA000-memory.dmpFilesize
16.7MB
-
memory/1872-21-0x0000000004330000-0x0000000004332000-memory.dmpFilesize
8KB
-
memory/1872-19-0x0000000004380000-0x0000000004381000-memory.dmpFilesize
4KB
-
memory/1872-18-0x0000000004330000-0x0000000004332000-memory.dmpFilesize
8KB
-
memory/1872-20-0x0000000004330000-0x0000000004332000-memory.dmpFilesize
8KB
-
memory/1872-4-0x00000000025F0000-0x00000000036AA000-memory.dmpFilesize
16.7MB
-
memory/1872-17-0x00000000025F0000-0x00000000036AA000-memory.dmpFilesize
16.7MB
-
memory/1872-22-0x00000000025F0000-0x00000000036AA000-memory.dmpFilesize
16.7MB
-
memory/1872-30-0x00000000025F0000-0x00000000036AA000-memory.dmpFilesize
16.7MB
-
memory/1872-24-0x00000000025F0000-0x00000000036AA000-memory.dmpFilesize
16.7MB
-
memory/1872-25-0x00000000025F0000-0x00000000036AA000-memory.dmpFilesize
16.7MB
-
memory/1872-26-0x00000000025F0000-0x00000000036AA000-memory.dmpFilesize
16.7MB
-
memory/1872-28-0x00000000025F0000-0x00000000036AA000-memory.dmpFilesize
16.7MB
-
memory/1872-0-0x0000000000400000-0x0000000000416000-memory.dmpFilesize
88KB
-
memory/1872-33-0x00000000025F0000-0x00000000036AA000-memory.dmpFilesize
16.7MB
-
memory/1872-12-0x00000000025F0000-0x00000000036AA000-memory.dmpFilesize
16.7MB
-
memory/1872-23-0x00000000025F0000-0x00000000036AA000-memory.dmpFilesize
16.7MB
-
memory/1872-35-0x00000000025F0000-0x00000000036AA000-memory.dmpFilesize
16.7MB
-
memory/1872-37-0x00000000025F0000-0x00000000036AA000-memory.dmpFilesize
16.7MB
-
memory/1872-40-0x00000000025F0000-0x00000000036AA000-memory.dmpFilesize
16.7MB
-
memory/1872-42-0x00000000025F0000-0x00000000036AA000-memory.dmpFilesize
16.7MB
-
memory/1872-44-0x00000000025F0000-0x00000000036AA000-memory.dmpFilesize
16.7MB
-
memory/1872-46-0x00000000025F0000-0x00000000036AA000-memory.dmpFilesize
16.7MB
-
memory/1872-53-0x00000000025F0000-0x00000000036AA000-memory.dmpFilesize
16.7MB
-
memory/1872-55-0x00000000025F0000-0x00000000036AA000-memory.dmpFilesize
16.7MB
-
memory/1872-57-0x00000000025F0000-0x00000000036AA000-memory.dmpFilesize
16.7MB
-
memory/1872-59-0x00000000025F0000-0x00000000036AA000-memory.dmpFilesize
16.7MB
-
memory/1872-61-0x00000000025F0000-0x00000000036AA000-memory.dmpFilesize
16.7MB
-
memory/1872-63-0x00000000025F0000-0x00000000036AA000-memory.dmpFilesize
16.7MB
-
memory/1872-65-0x00000000025F0000-0x00000000036AA000-memory.dmpFilesize
16.7MB
-
memory/1872-67-0x00000000025F0000-0x00000000036AA000-memory.dmpFilesize
16.7MB
-
memory/1872-69-0x0000000004330000-0x0000000004332000-memory.dmpFilesize
8KB
-
memory/1872-70-0x00000000025F0000-0x00000000036AA000-memory.dmpFilesize
16.7MB
-
memory/1872-72-0x00000000025F0000-0x00000000036AA000-memory.dmpFilesize
16.7MB
-
memory/1872-74-0x00000000025F0000-0x00000000036AA000-memory.dmpFilesize
16.7MB
-
memory/1872-77-0x00000000025F0000-0x00000000036AA000-memory.dmpFilesize
16.7MB
-
memory/1872-32-0x00000000025F0000-0x00000000036AA000-memory.dmpFilesize
16.7MB
-
memory/1872-5-0x00000000025F0000-0x00000000036AA000-memory.dmpFilesize
16.7MB