Analysis
-
max time kernel
122s -
max time network
60s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
18-06-2024 14:16
Static task
static1
Behavioral task
behavioral1
Sample
4fa5128c463f6062a8e73260808344e0_NeikiAnalytics.exe
Resource
win7-20240419-en
General
-
Target
4fa5128c463f6062a8e73260808344e0_NeikiAnalytics.exe
-
Size
100KB
-
MD5
4fa5128c463f6062a8e73260808344e0
-
SHA1
2bf4a7ddca9e05852307af1c679f0ff7e2aca463
-
SHA256
e726dcb3945fdf2f8b114fcba5e83cf319556c68f79f8fc629a55d6c8df19991
-
SHA512
b67f875092015e563c4c0604cbbab111e2f280d5af77f7b63086557467ea9ca17d1f889c3c73febfd86f0761cdb30dc96fd4fad5d9826b331685728c61f8e937
-
SSDEEP
3072:qXrWehmBMCXdVCrOoQmk8IJYhJjm8n4pH+XqA:cWehmltZKGYhlm+4pm1
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
http://www.klkjwre9fqwieluoi.info/
http://kukutrustnet777888.info/
Signatures
-
Modifies firewall policy service 3 TTPs 3 IoCs
Processes:
4fa5128c463f6062a8e73260808344e0_NeikiAnalytics.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" 4fa5128c463f6062a8e73260808344e0_NeikiAnalytics.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" 4fa5128c463f6062a8e73260808344e0_NeikiAnalytics.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "1" 4fa5128c463f6062a8e73260808344e0_NeikiAnalytics.exe -
Processes:
4fa5128c463f6062a8e73260808344e0_NeikiAnalytics.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 4fa5128c463f6062a8e73260808344e0_NeikiAnalytics.exe -
Processes:
4fa5128c463f6062a8e73260808344e0_NeikiAnalytics.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" 4fa5128c463f6062a8e73260808344e0_NeikiAnalytics.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UacDisableNotify = "1" 4fa5128c463f6062a8e73260808344e0_NeikiAnalytics.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" 4fa5128c463f6062a8e73260808344e0_NeikiAnalytics.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" 4fa5128c463f6062a8e73260808344e0_NeikiAnalytics.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" 4fa5128c463f6062a8e73260808344e0_NeikiAnalytics.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" 4fa5128c463f6062a8e73260808344e0_NeikiAnalytics.exe -
Processes:
resource yara_rule behavioral2/memory/1696-3-0x00000000021B0000-0x000000000323E000-memory.dmp upx behavioral2/memory/1696-8-0x00000000021B0000-0x000000000323E000-memory.dmp upx behavioral2/memory/1696-5-0x00000000021B0000-0x000000000323E000-memory.dmp upx behavioral2/memory/1696-11-0x00000000021B0000-0x000000000323E000-memory.dmp upx behavioral2/memory/1696-1-0x00000000021B0000-0x000000000323E000-memory.dmp upx behavioral2/memory/1696-9-0x00000000021B0000-0x000000000323E000-memory.dmp upx behavioral2/memory/1696-14-0x00000000021B0000-0x000000000323E000-memory.dmp upx behavioral2/memory/1696-15-0x00000000021B0000-0x000000000323E000-memory.dmp upx behavioral2/memory/1696-13-0x00000000021B0000-0x000000000323E000-memory.dmp upx behavioral2/memory/1696-17-0x00000000021B0000-0x000000000323E000-memory.dmp upx behavioral2/memory/1696-16-0x00000000021B0000-0x000000000323E000-memory.dmp upx behavioral2/memory/1696-18-0x00000000021B0000-0x000000000323E000-memory.dmp upx behavioral2/memory/1696-19-0x00000000021B0000-0x000000000323E000-memory.dmp upx behavioral2/memory/1696-20-0x00000000021B0000-0x000000000323E000-memory.dmp upx behavioral2/memory/1696-22-0x00000000021B0000-0x000000000323E000-memory.dmp upx behavioral2/memory/1696-23-0x00000000021B0000-0x000000000323E000-memory.dmp upx behavioral2/memory/1696-24-0x00000000021B0000-0x000000000323E000-memory.dmp upx behavioral2/memory/1696-26-0x00000000021B0000-0x000000000323E000-memory.dmp upx behavioral2/memory/1696-27-0x00000000021B0000-0x000000000323E000-memory.dmp upx behavioral2/memory/1696-28-0x00000000021B0000-0x000000000323E000-memory.dmp upx behavioral2/memory/1696-30-0x00000000021B0000-0x000000000323E000-memory.dmp upx behavioral2/memory/1696-33-0x00000000021B0000-0x000000000323E000-memory.dmp upx behavioral2/memory/1696-37-0x00000000021B0000-0x000000000323E000-memory.dmp upx behavioral2/memory/1696-38-0x00000000021B0000-0x000000000323E000-memory.dmp upx behavioral2/memory/1696-39-0x00000000021B0000-0x000000000323E000-memory.dmp upx behavioral2/memory/1696-45-0x00000000021B0000-0x000000000323E000-memory.dmp upx behavioral2/memory/1696-46-0x00000000021B0000-0x000000000323E000-memory.dmp upx behavioral2/memory/1696-47-0x00000000021B0000-0x000000000323E000-memory.dmp upx behavioral2/memory/1696-48-0x00000000021B0000-0x000000000323E000-memory.dmp upx behavioral2/memory/1696-52-0x00000000021B0000-0x000000000323E000-memory.dmp upx behavioral2/memory/1696-54-0x00000000021B0000-0x000000000323E000-memory.dmp upx behavioral2/memory/1696-55-0x00000000021B0000-0x000000000323E000-memory.dmp upx behavioral2/memory/1696-56-0x00000000021B0000-0x000000000323E000-memory.dmp upx behavioral2/memory/1696-58-0x00000000021B0000-0x000000000323E000-memory.dmp upx behavioral2/memory/1696-59-0x00000000021B0000-0x000000000323E000-memory.dmp upx behavioral2/memory/1696-60-0x00000000021B0000-0x000000000323E000-memory.dmp upx behavioral2/memory/1696-63-0x00000000021B0000-0x000000000323E000-memory.dmp upx behavioral2/memory/1696-65-0x00000000021B0000-0x000000000323E000-memory.dmp upx behavioral2/memory/1696-67-0x00000000021B0000-0x000000000323E000-memory.dmp upx behavioral2/memory/1696-69-0x00000000021B0000-0x000000000323E000-memory.dmp upx -
Processes:
4fa5128c463f6062a8e73260808344e0_NeikiAnalytics.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" 4fa5128c463f6062a8e73260808344e0_NeikiAnalytics.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" 4fa5128c463f6062a8e73260808344e0_NeikiAnalytics.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" 4fa5128c463f6062a8e73260808344e0_NeikiAnalytics.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" 4fa5128c463f6062a8e73260808344e0_NeikiAnalytics.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" 4fa5128c463f6062a8e73260808344e0_NeikiAnalytics.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UacDisableNotify = "1" 4fa5128c463f6062a8e73260808344e0_NeikiAnalytics.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\Svc 4fa5128c463f6062a8e73260808344e0_NeikiAnalytics.exe -
Processes:
4fa5128c463f6062a8e73260808344e0_NeikiAnalytics.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 4fa5128c463f6062a8e73260808344e0_NeikiAnalytics.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
4fa5128c463f6062a8e73260808344e0_NeikiAnalytics.exedescription ioc process File opened (read-only) \??\M: 4fa5128c463f6062a8e73260808344e0_NeikiAnalytics.exe File opened (read-only) \??\N: 4fa5128c463f6062a8e73260808344e0_NeikiAnalytics.exe File opened (read-only) \??\P: 4fa5128c463f6062a8e73260808344e0_NeikiAnalytics.exe File opened (read-only) \??\Q: 4fa5128c463f6062a8e73260808344e0_NeikiAnalytics.exe File opened (read-only) \??\R: 4fa5128c463f6062a8e73260808344e0_NeikiAnalytics.exe File opened (read-only) \??\S: 4fa5128c463f6062a8e73260808344e0_NeikiAnalytics.exe File opened (read-only) \??\W: 4fa5128c463f6062a8e73260808344e0_NeikiAnalytics.exe File opened (read-only) \??\H: 4fa5128c463f6062a8e73260808344e0_NeikiAnalytics.exe File opened (read-only) \??\J: 4fa5128c463f6062a8e73260808344e0_NeikiAnalytics.exe File opened (read-only) \??\O: 4fa5128c463f6062a8e73260808344e0_NeikiAnalytics.exe File opened (read-only) \??\T: 4fa5128c463f6062a8e73260808344e0_NeikiAnalytics.exe File opened (read-only) \??\U: 4fa5128c463f6062a8e73260808344e0_NeikiAnalytics.exe File opened (read-only) \??\V: 4fa5128c463f6062a8e73260808344e0_NeikiAnalytics.exe File opened (read-only) \??\X: 4fa5128c463f6062a8e73260808344e0_NeikiAnalytics.exe File opened (read-only) \??\Y: 4fa5128c463f6062a8e73260808344e0_NeikiAnalytics.exe File opened (read-only) \??\G: 4fa5128c463f6062a8e73260808344e0_NeikiAnalytics.exe File opened (read-only) \??\Z: 4fa5128c463f6062a8e73260808344e0_NeikiAnalytics.exe File opened (read-only) \??\K: 4fa5128c463f6062a8e73260808344e0_NeikiAnalytics.exe File opened (read-only) \??\I: 4fa5128c463f6062a8e73260808344e0_NeikiAnalytics.exe File opened (read-only) \??\L: 4fa5128c463f6062a8e73260808344e0_NeikiAnalytics.exe File opened (read-only) \??\E: 4fa5128c463f6062a8e73260808344e0_NeikiAnalytics.exe -
Drops autorun.inf file 1 TTPs 2 IoCs
Malware can abuse Windows Autorun to spread further via attached volumes.
Processes:
4fa5128c463f6062a8e73260808344e0_NeikiAnalytics.exedescription ioc process File opened for modification C:\autorun.inf 4fa5128c463f6062a8e73260808344e0_NeikiAnalytics.exe File opened for modification F:\autorun.inf 4fa5128c463f6062a8e73260808344e0_NeikiAnalytics.exe -
Drops file in Program Files directory 12 IoCs
Processes:
4fa5128c463f6062a8e73260808344e0_NeikiAnalytics.exedescription ioc process File opened for modification C:\PROGRAM FILES\COMMON FILES\MICROSOFT SHARED\CLICKTORUN\InspectorOfficeGadget.exe 4fa5128c463f6062a8e73260808344e0_NeikiAnalytics.exe File opened for modification C:\PROGRAM FILES\COMMON FILES\MICROSOFT SHARED\CLICKTORUN\IntegratedOffice.exe 4fa5128c463f6062a8e73260808344e0_NeikiAnalytics.exe File opened for modification C:\PROGRAM FILES\COMMON FILES\MICROSOFT SHARED\CLICKTORUN\MavInject32.exe 4fa5128c463f6062a8e73260808344e0_NeikiAnalytics.exe File opened for modification C:\PROGRAM FILES\COMMON FILES\MICROSOFT SHARED\CLICKTORUN\OfficeC2RClient.exe 4fa5128c463f6062a8e73260808344e0_NeikiAnalytics.exe File opened for modification C:\PROGRAM FILES\7-ZIP\7zG.exe 4fa5128c463f6062a8e73260808344e0_NeikiAnalytics.exe File opened for modification C:\PROGRAM FILES\7-ZIP\Uninstall.exe 4fa5128c463f6062a8e73260808344e0_NeikiAnalytics.exe File opened for modification C:\PROGRAM FILES\COMMON FILES\MICROSOFT SHARED\CLICKTORUN\appvcleaner.exe 4fa5128c463f6062a8e73260808344e0_NeikiAnalytics.exe File opened for modification C:\PROGRAM FILES\COMMON FILES\MICROSOFT SHARED\CLICKTORUN\AppVShNotify.exe 4fa5128c463f6062a8e73260808344e0_NeikiAnalytics.exe File opened for modification C:\PROGRAM FILES\COMMON FILES\MICROSOFT SHARED\CLICKTORUN\OfficeClickToRun.exe 4fa5128c463f6062a8e73260808344e0_NeikiAnalytics.exe File opened for modification C:\PROGRAM FILES\7-ZIP\7z.exe 4fa5128c463f6062a8e73260808344e0_NeikiAnalytics.exe File opened for modification C:\PROGRAM FILES\7-ZIP\7zFM.exe 4fa5128c463f6062a8e73260808344e0_NeikiAnalytics.exe File opened for modification C:\Program Files (x86)\Common Files\Java\Java Update\jusched.exe 4fa5128c463f6062a8e73260808344e0_NeikiAnalytics.exe -
Drops file in Windows directory 1 IoCs
Processes:
4fa5128c463f6062a8e73260808344e0_NeikiAnalytics.exedescription ioc process File opened for modification C:\Windows\SYSTEM.INI 4fa5128c463f6062a8e73260808344e0_NeikiAnalytics.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
Processes:
4fa5128c463f6062a8e73260808344e0_NeikiAnalytics.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Local Settings 4fa5128c463f6062a8e73260808344e0_NeikiAnalytics.exe -
Suspicious behavior: EnumeratesProcesses 24 IoCs
Processes:
4fa5128c463f6062a8e73260808344e0_NeikiAnalytics.exepid process 1696 4fa5128c463f6062a8e73260808344e0_NeikiAnalytics.exe 1696 4fa5128c463f6062a8e73260808344e0_NeikiAnalytics.exe 1696 4fa5128c463f6062a8e73260808344e0_NeikiAnalytics.exe 1696 4fa5128c463f6062a8e73260808344e0_NeikiAnalytics.exe 1696 4fa5128c463f6062a8e73260808344e0_NeikiAnalytics.exe 1696 4fa5128c463f6062a8e73260808344e0_NeikiAnalytics.exe 1696 4fa5128c463f6062a8e73260808344e0_NeikiAnalytics.exe 1696 4fa5128c463f6062a8e73260808344e0_NeikiAnalytics.exe 1696 4fa5128c463f6062a8e73260808344e0_NeikiAnalytics.exe 1696 4fa5128c463f6062a8e73260808344e0_NeikiAnalytics.exe 1696 4fa5128c463f6062a8e73260808344e0_NeikiAnalytics.exe 1696 4fa5128c463f6062a8e73260808344e0_NeikiAnalytics.exe 1696 4fa5128c463f6062a8e73260808344e0_NeikiAnalytics.exe 1696 4fa5128c463f6062a8e73260808344e0_NeikiAnalytics.exe 1696 4fa5128c463f6062a8e73260808344e0_NeikiAnalytics.exe 1696 4fa5128c463f6062a8e73260808344e0_NeikiAnalytics.exe 1696 4fa5128c463f6062a8e73260808344e0_NeikiAnalytics.exe 1696 4fa5128c463f6062a8e73260808344e0_NeikiAnalytics.exe 1696 4fa5128c463f6062a8e73260808344e0_NeikiAnalytics.exe 1696 4fa5128c463f6062a8e73260808344e0_NeikiAnalytics.exe 1696 4fa5128c463f6062a8e73260808344e0_NeikiAnalytics.exe 1696 4fa5128c463f6062a8e73260808344e0_NeikiAnalytics.exe 1696 4fa5128c463f6062a8e73260808344e0_NeikiAnalytics.exe 1696 4fa5128c463f6062a8e73260808344e0_NeikiAnalytics.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
4fa5128c463f6062a8e73260808344e0_NeikiAnalytics.exedescription pid process Token: SeDebugPrivilege 1696 4fa5128c463f6062a8e73260808344e0_NeikiAnalytics.exe Token: SeDebugPrivilege 1696 4fa5128c463f6062a8e73260808344e0_NeikiAnalytics.exe Token: SeDebugPrivilege 1696 4fa5128c463f6062a8e73260808344e0_NeikiAnalytics.exe Token: SeDebugPrivilege 1696 4fa5128c463f6062a8e73260808344e0_NeikiAnalytics.exe Token: SeDebugPrivilege 1696 4fa5128c463f6062a8e73260808344e0_NeikiAnalytics.exe Token: SeDebugPrivilege 1696 4fa5128c463f6062a8e73260808344e0_NeikiAnalytics.exe Token: SeDebugPrivilege 1696 4fa5128c463f6062a8e73260808344e0_NeikiAnalytics.exe Token: SeDebugPrivilege 1696 4fa5128c463f6062a8e73260808344e0_NeikiAnalytics.exe Token: SeDebugPrivilege 1696 4fa5128c463f6062a8e73260808344e0_NeikiAnalytics.exe Token: SeDebugPrivilege 1696 4fa5128c463f6062a8e73260808344e0_NeikiAnalytics.exe Token: SeDebugPrivilege 1696 4fa5128c463f6062a8e73260808344e0_NeikiAnalytics.exe Token: SeDebugPrivilege 1696 4fa5128c463f6062a8e73260808344e0_NeikiAnalytics.exe Token: SeDebugPrivilege 1696 4fa5128c463f6062a8e73260808344e0_NeikiAnalytics.exe Token: SeDebugPrivilege 1696 4fa5128c463f6062a8e73260808344e0_NeikiAnalytics.exe Token: SeDebugPrivilege 1696 4fa5128c463f6062a8e73260808344e0_NeikiAnalytics.exe Token: SeDebugPrivilege 1696 4fa5128c463f6062a8e73260808344e0_NeikiAnalytics.exe Token: SeDebugPrivilege 1696 4fa5128c463f6062a8e73260808344e0_NeikiAnalytics.exe Token: SeDebugPrivilege 1696 4fa5128c463f6062a8e73260808344e0_NeikiAnalytics.exe Token: SeDebugPrivilege 1696 4fa5128c463f6062a8e73260808344e0_NeikiAnalytics.exe Token: SeDebugPrivilege 1696 4fa5128c463f6062a8e73260808344e0_NeikiAnalytics.exe Token: SeDebugPrivilege 1696 4fa5128c463f6062a8e73260808344e0_NeikiAnalytics.exe Token: SeDebugPrivilege 1696 4fa5128c463f6062a8e73260808344e0_NeikiAnalytics.exe Token: SeDebugPrivilege 1696 4fa5128c463f6062a8e73260808344e0_NeikiAnalytics.exe Token: SeDebugPrivilege 1696 4fa5128c463f6062a8e73260808344e0_NeikiAnalytics.exe Token: SeDebugPrivilege 1696 4fa5128c463f6062a8e73260808344e0_NeikiAnalytics.exe Token: SeDebugPrivilege 1696 4fa5128c463f6062a8e73260808344e0_NeikiAnalytics.exe Token: SeDebugPrivilege 1696 4fa5128c463f6062a8e73260808344e0_NeikiAnalytics.exe Token: SeDebugPrivilege 1696 4fa5128c463f6062a8e73260808344e0_NeikiAnalytics.exe Token: SeDebugPrivilege 1696 4fa5128c463f6062a8e73260808344e0_NeikiAnalytics.exe Token: SeDebugPrivilege 1696 4fa5128c463f6062a8e73260808344e0_NeikiAnalytics.exe Token: SeDebugPrivilege 1696 4fa5128c463f6062a8e73260808344e0_NeikiAnalytics.exe Token: SeDebugPrivilege 1696 4fa5128c463f6062a8e73260808344e0_NeikiAnalytics.exe Token: SeDebugPrivilege 1696 4fa5128c463f6062a8e73260808344e0_NeikiAnalytics.exe Token: SeDebugPrivilege 1696 4fa5128c463f6062a8e73260808344e0_NeikiAnalytics.exe Token: SeDebugPrivilege 1696 4fa5128c463f6062a8e73260808344e0_NeikiAnalytics.exe Token: SeDebugPrivilege 1696 4fa5128c463f6062a8e73260808344e0_NeikiAnalytics.exe Token: SeDebugPrivilege 1696 4fa5128c463f6062a8e73260808344e0_NeikiAnalytics.exe Token: SeDebugPrivilege 1696 4fa5128c463f6062a8e73260808344e0_NeikiAnalytics.exe Token: SeDebugPrivilege 1696 4fa5128c463f6062a8e73260808344e0_NeikiAnalytics.exe Token: SeDebugPrivilege 1696 4fa5128c463f6062a8e73260808344e0_NeikiAnalytics.exe Token: SeDebugPrivilege 1696 4fa5128c463f6062a8e73260808344e0_NeikiAnalytics.exe Token: SeDebugPrivilege 1696 4fa5128c463f6062a8e73260808344e0_NeikiAnalytics.exe Token: SeDebugPrivilege 1696 4fa5128c463f6062a8e73260808344e0_NeikiAnalytics.exe Token: SeDebugPrivilege 1696 4fa5128c463f6062a8e73260808344e0_NeikiAnalytics.exe Token: SeDebugPrivilege 1696 4fa5128c463f6062a8e73260808344e0_NeikiAnalytics.exe Token: SeDebugPrivilege 1696 4fa5128c463f6062a8e73260808344e0_NeikiAnalytics.exe Token: SeDebugPrivilege 1696 4fa5128c463f6062a8e73260808344e0_NeikiAnalytics.exe Token: SeDebugPrivilege 1696 4fa5128c463f6062a8e73260808344e0_NeikiAnalytics.exe Token: SeDebugPrivilege 1696 4fa5128c463f6062a8e73260808344e0_NeikiAnalytics.exe Token: SeDebugPrivilege 1696 4fa5128c463f6062a8e73260808344e0_NeikiAnalytics.exe Token: SeDebugPrivilege 1696 4fa5128c463f6062a8e73260808344e0_NeikiAnalytics.exe Token: SeDebugPrivilege 1696 4fa5128c463f6062a8e73260808344e0_NeikiAnalytics.exe Token: SeDebugPrivilege 1696 4fa5128c463f6062a8e73260808344e0_NeikiAnalytics.exe Token: SeDebugPrivilege 1696 4fa5128c463f6062a8e73260808344e0_NeikiAnalytics.exe Token: SeDebugPrivilege 1696 4fa5128c463f6062a8e73260808344e0_NeikiAnalytics.exe Token: SeDebugPrivilege 1696 4fa5128c463f6062a8e73260808344e0_NeikiAnalytics.exe Token: SeDebugPrivilege 1696 4fa5128c463f6062a8e73260808344e0_NeikiAnalytics.exe Token: SeDebugPrivilege 1696 4fa5128c463f6062a8e73260808344e0_NeikiAnalytics.exe Token: SeDebugPrivilege 1696 4fa5128c463f6062a8e73260808344e0_NeikiAnalytics.exe Token: SeDebugPrivilege 1696 4fa5128c463f6062a8e73260808344e0_NeikiAnalytics.exe Token: SeDebugPrivilege 1696 4fa5128c463f6062a8e73260808344e0_NeikiAnalytics.exe Token: SeDebugPrivilege 1696 4fa5128c463f6062a8e73260808344e0_NeikiAnalytics.exe Token: SeDebugPrivilege 1696 4fa5128c463f6062a8e73260808344e0_NeikiAnalytics.exe Token: SeDebugPrivilege 1696 4fa5128c463f6062a8e73260808344e0_NeikiAnalytics.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
4fa5128c463f6062a8e73260808344e0_NeikiAnalytics.exedescription pid process target process PID 1696 wrote to memory of 760 1696 4fa5128c463f6062a8e73260808344e0_NeikiAnalytics.exe fontdrvhost.exe PID 1696 wrote to memory of 768 1696 4fa5128c463f6062a8e73260808344e0_NeikiAnalytics.exe fontdrvhost.exe PID 1696 wrote to memory of 1012 1696 4fa5128c463f6062a8e73260808344e0_NeikiAnalytics.exe dwm.exe PID 1696 wrote to memory of 2760 1696 4fa5128c463f6062a8e73260808344e0_NeikiAnalytics.exe sihost.exe PID 1696 wrote to memory of 2856 1696 4fa5128c463f6062a8e73260808344e0_NeikiAnalytics.exe svchost.exe PID 1696 wrote to memory of 3068 1696 4fa5128c463f6062a8e73260808344e0_NeikiAnalytics.exe taskhostw.exe PID 1696 wrote to memory of 3412 1696 4fa5128c463f6062a8e73260808344e0_NeikiAnalytics.exe Explorer.EXE PID 1696 wrote to memory of 3532 1696 4fa5128c463f6062a8e73260808344e0_NeikiAnalytics.exe svchost.exe PID 1696 wrote to memory of 3724 1696 4fa5128c463f6062a8e73260808344e0_NeikiAnalytics.exe DllHost.exe PID 1696 wrote to memory of 3812 1696 4fa5128c463f6062a8e73260808344e0_NeikiAnalytics.exe StartMenuExperienceHost.exe PID 1696 wrote to memory of 3876 1696 4fa5128c463f6062a8e73260808344e0_NeikiAnalytics.exe RuntimeBroker.exe PID 1696 wrote to memory of 3964 1696 4fa5128c463f6062a8e73260808344e0_NeikiAnalytics.exe SearchApp.exe PID 1696 wrote to memory of 2364 1696 4fa5128c463f6062a8e73260808344e0_NeikiAnalytics.exe RuntimeBroker.exe PID 1696 wrote to memory of 4332 1696 4fa5128c463f6062a8e73260808344e0_NeikiAnalytics.exe RuntimeBroker.exe PID 1696 wrote to memory of 4920 1696 4fa5128c463f6062a8e73260808344e0_NeikiAnalytics.exe TextInputHost.exe PID 1696 wrote to memory of 3756 1696 4fa5128c463f6062a8e73260808344e0_NeikiAnalytics.exe backgroundTaskHost.exe PID 1696 wrote to memory of 760 1696 4fa5128c463f6062a8e73260808344e0_NeikiAnalytics.exe fontdrvhost.exe PID 1696 wrote to memory of 768 1696 4fa5128c463f6062a8e73260808344e0_NeikiAnalytics.exe fontdrvhost.exe PID 1696 wrote to memory of 1012 1696 4fa5128c463f6062a8e73260808344e0_NeikiAnalytics.exe dwm.exe PID 1696 wrote to memory of 2760 1696 4fa5128c463f6062a8e73260808344e0_NeikiAnalytics.exe sihost.exe PID 1696 wrote to memory of 2856 1696 4fa5128c463f6062a8e73260808344e0_NeikiAnalytics.exe svchost.exe PID 1696 wrote to memory of 3068 1696 4fa5128c463f6062a8e73260808344e0_NeikiAnalytics.exe taskhostw.exe PID 1696 wrote to memory of 3412 1696 4fa5128c463f6062a8e73260808344e0_NeikiAnalytics.exe Explorer.EXE PID 1696 wrote to memory of 3532 1696 4fa5128c463f6062a8e73260808344e0_NeikiAnalytics.exe svchost.exe PID 1696 wrote to memory of 3724 1696 4fa5128c463f6062a8e73260808344e0_NeikiAnalytics.exe DllHost.exe PID 1696 wrote to memory of 3812 1696 4fa5128c463f6062a8e73260808344e0_NeikiAnalytics.exe StartMenuExperienceHost.exe PID 1696 wrote to memory of 3876 1696 4fa5128c463f6062a8e73260808344e0_NeikiAnalytics.exe RuntimeBroker.exe PID 1696 wrote to memory of 3964 1696 4fa5128c463f6062a8e73260808344e0_NeikiAnalytics.exe SearchApp.exe PID 1696 wrote to memory of 2364 1696 4fa5128c463f6062a8e73260808344e0_NeikiAnalytics.exe RuntimeBroker.exe PID 1696 wrote to memory of 4332 1696 4fa5128c463f6062a8e73260808344e0_NeikiAnalytics.exe RuntimeBroker.exe PID 1696 wrote to memory of 4920 1696 4fa5128c463f6062a8e73260808344e0_NeikiAnalytics.exe TextInputHost.exe PID 1696 wrote to memory of 3756 1696 4fa5128c463f6062a8e73260808344e0_NeikiAnalytics.exe backgroundTaskHost.exe PID 1696 wrote to memory of 656 1696 4fa5128c463f6062a8e73260808344e0_NeikiAnalytics.exe RuntimeBroker.exe PID 1696 wrote to memory of 1976 1696 4fa5128c463f6062a8e73260808344e0_NeikiAnalytics.exe RuntimeBroker.exe PID 1696 wrote to memory of 760 1696 4fa5128c463f6062a8e73260808344e0_NeikiAnalytics.exe fontdrvhost.exe PID 1696 wrote to memory of 768 1696 4fa5128c463f6062a8e73260808344e0_NeikiAnalytics.exe fontdrvhost.exe PID 1696 wrote to memory of 1012 1696 4fa5128c463f6062a8e73260808344e0_NeikiAnalytics.exe dwm.exe PID 1696 wrote to memory of 2760 1696 4fa5128c463f6062a8e73260808344e0_NeikiAnalytics.exe sihost.exe PID 1696 wrote to memory of 2856 1696 4fa5128c463f6062a8e73260808344e0_NeikiAnalytics.exe svchost.exe PID 1696 wrote to memory of 3068 1696 4fa5128c463f6062a8e73260808344e0_NeikiAnalytics.exe taskhostw.exe PID 1696 wrote to memory of 3412 1696 4fa5128c463f6062a8e73260808344e0_NeikiAnalytics.exe Explorer.EXE PID 1696 wrote to memory of 3532 1696 4fa5128c463f6062a8e73260808344e0_NeikiAnalytics.exe svchost.exe PID 1696 wrote to memory of 3724 1696 4fa5128c463f6062a8e73260808344e0_NeikiAnalytics.exe DllHost.exe PID 1696 wrote to memory of 3812 1696 4fa5128c463f6062a8e73260808344e0_NeikiAnalytics.exe StartMenuExperienceHost.exe PID 1696 wrote to memory of 3876 1696 4fa5128c463f6062a8e73260808344e0_NeikiAnalytics.exe RuntimeBroker.exe PID 1696 wrote to memory of 3964 1696 4fa5128c463f6062a8e73260808344e0_NeikiAnalytics.exe SearchApp.exe PID 1696 wrote to memory of 2364 1696 4fa5128c463f6062a8e73260808344e0_NeikiAnalytics.exe RuntimeBroker.exe PID 1696 wrote to memory of 4332 1696 4fa5128c463f6062a8e73260808344e0_NeikiAnalytics.exe RuntimeBroker.exe PID 1696 wrote to memory of 4920 1696 4fa5128c463f6062a8e73260808344e0_NeikiAnalytics.exe TextInputHost.exe PID 1696 wrote to memory of 656 1696 4fa5128c463f6062a8e73260808344e0_NeikiAnalytics.exe RuntimeBroker.exe PID 1696 wrote to memory of 1976 1696 4fa5128c463f6062a8e73260808344e0_NeikiAnalytics.exe RuntimeBroker.exe PID 1696 wrote to memory of 760 1696 4fa5128c463f6062a8e73260808344e0_NeikiAnalytics.exe fontdrvhost.exe PID 1696 wrote to memory of 768 1696 4fa5128c463f6062a8e73260808344e0_NeikiAnalytics.exe fontdrvhost.exe PID 1696 wrote to memory of 1012 1696 4fa5128c463f6062a8e73260808344e0_NeikiAnalytics.exe dwm.exe PID 1696 wrote to memory of 2760 1696 4fa5128c463f6062a8e73260808344e0_NeikiAnalytics.exe sihost.exe PID 1696 wrote to memory of 2856 1696 4fa5128c463f6062a8e73260808344e0_NeikiAnalytics.exe svchost.exe PID 1696 wrote to memory of 3068 1696 4fa5128c463f6062a8e73260808344e0_NeikiAnalytics.exe taskhostw.exe PID 1696 wrote to memory of 3412 1696 4fa5128c463f6062a8e73260808344e0_NeikiAnalytics.exe Explorer.EXE PID 1696 wrote to memory of 3532 1696 4fa5128c463f6062a8e73260808344e0_NeikiAnalytics.exe svchost.exe PID 1696 wrote to memory of 3724 1696 4fa5128c463f6062a8e73260808344e0_NeikiAnalytics.exe DllHost.exe PID 1696 wrote to memory of 3812 1696 4fa5128c463f6062a8e73260808344e0_NeikiAnalytics.exe StartMenuExperienceHost.exe PID 1696 wrote to memory of 3876 1696 4fa5128c463f6062a8e73260808344e0_NeikiAnalytics.exe RuntimeBroker.exe PID 1696 wrote to memory of 3964 1696 4fa5128c463f6062a8e73260808344e0_NeikiAnalytics.exe SearchApp.exe PID 1696 wrote to memory of 2364 1696 4fa5128c463f6062a8e73260808344e0_NeikiAnalytics.exe RuntimeBroker.exe -
System policy modification 1 TTPs 1 IoCs
Processes:
4fa5128c463f6062a8e73260808344e0_NeikiAnalytics.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 4fa5128c463f6062a8e73260808344e0_NeikiAnalytics.exe
Processes
-
C:\Windows\system32\fontdrvhost.exe"fontdrvhost.exe"1⤵
-
C:\Windows\system32\fontdrvhost.exe"fontdrvhost.exe"1⤵
-
C:\Windows\system32\dwm.exe"dwm.exe"1⤵
-
C:\Windows\system32\sihost.exesihost.exe1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc1⤵
-
C:\Windows\system32\taskhostw.exetaskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}1⤵
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
-
C:\Users\Admin\AppData\Local\Temp\4fa5128c463f6062a8e73260808344e0_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\4fa5128c463f6062a8e73260808344e0_NeikiAnalytics.exe"2⤵
- Modifies firewall policy service
- UAC bypass
- Windows security bypass
- Windows security modification
- Checks whether UAC is enabled
- Enumerates connected drives
- Drops autorun.inf file
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k ClipboardSvcGroup -p -s cbdhsvc1⤵
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵
-
C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\InputApp\TextInputHost.exe"C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\InputApp\TextInputHost.exe" -ServerName:InputApp.AppX9jnwykgrccxc8by3hsrsh07r423xzvav.mca1⤵
-
C:\Windows\system32\backgroundTaskHost.exe"C:\Windows\system32\backgroundTaskHost.exe" -ServerName:App.AppXmtcan0h2tfbfy7k9kn8hbxb6dmzz1zh0.mca1⤵
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Privilege Escalation
Create or Modify System Process
1Windows Service
1Abuse Elevation Control Mechanism
1Bypass User Account Control
1Defense Evasion
Modify Registry
5Impair Defenses
4Disable or Modify Tools
3Disable or Modify System Firewall
1Abuse Elevation Control Mechanism
1Bypass User Account Control
1Replay Monitor
Loading Replay Monitor...
Downloads
-
F:\bgyyxk.exeFilesize
100KB
MD53a22167cb70006e6b39538927bf466cc
SHA112236f53dcaf016d4627b79a5baf50e96ea7db28
SHA25608c8f6471b05c2d0922484e18fc602ca4ccd378940ad8320d82be7af33af17bb
SHA51269b3e30c8e5192997aa749d2cc94224633d28557742b796ecf88c6a7b7db47dde1ca1dbb162cbc926b9501c107a36e9a90727c89acb9f0c0b8dd44e8fb9aa876
-
memory/1696-26-0x00000000021B0000-0x000000000323E000-memory.dmpFilesize
16.6MB
-
memory/1696-69-0x00000000021B0000-0x000000000323E000-memory.dmpFilesize
16.6MB
-
memory/1696-12-0x00000000007F0000-0x00000000007F2000-memory.dmpFilesize
8KB
-
memory/1696-8-0x00000000021B0000-0x000000000323E000-memory.dmpFilesize
16.6MB
-
memory/1696-5-0x00000000021B0000-0x000000000323E000-memory.dmpFilesize
16.6MB
-
memory/1696-11-0x00000000021B0000-0x000000000323E000-memory.dmpFilesize
16.6MB
-
memory/1696-10-0x00000000007F0000-0x00000000007F2000-memory.dmpFilesize
8KB
-
memory/1696-1-0x00000000021B0000-0x000000000323E000-memory.dmpFilesize
16.6MB
-
memory/1696-6-0x00000000007F0000-0x00000000007F2000-memory.dmpFilesize
8KB
-
memory/1696-9-0x00000000021B0000-0x000000000323E000-memory.dmpFilesize
16.6MB
-
memory/1696-14-0x00000000021B0000-0x000000000323E000-memory.dmpFilesize
16.6MB
-
memory/1696-15-0x00000000021B0000-0x000000000323E000-memory.dmpFilesize
16.6MB
-
memory/1696-13-0x00000000021B0000-0x000000000323E000-memory.dmpFilesize
16.6MB
-
memory/1696-17-0x00000000021B0000-0x000000000323E000-memory.dmpFilesize
16.6MB
-
memory/1696-16-0x00000000021B0000-0x000000000323E000-memory.dmpFilesize
16.6MB
-
memory/1696-18-0x00000000021B0000-0x000000000323E000-memory.dmpFilesize
16.6MB
-
memory/1696-27-0x00000000021B0000-0x000000000323E000-memory.dmpFilesize
16.6MB
-
memory/1696-20-0x00000000021B0000-0x000000000323E000-memory.dmpFilesize
16.6MB
-
memory/1696-22-0x00000000021B0000-0x000000000323E000-memory.dmpFilesize
16.6MB
-
memory/1696-23-0x00000000021B0000-0x000000000323E000-memory.dmpFilesize
16.6MB
-
memory/1696-24-0x00000000021B0000-0x000000000323E000-memory.dmpFilesize
16.6MB
-
memory/1696-0-0x0000000000400000-0x0000000000414000-memory.dmpFilesize
80KB
-
memory/1696-30-0x00000000021B0000-0x000000000323E000-memory.dmpFilesize
16.6MB
-
memory/1696-3-0x00000000021B0000-0x000000000323E000-memory.dmpFilesize
16.6MB
-
memory/1696-19-0x00000000021B0000-0x000000000323E000-memory.dmpFilesize
16.6MB
-
memory/1696-33-0x00000000021B0000-0x000000000323E000-memory.dmpFilesize
16.6MB
-
memory/1696-37-0x00000000021B0000-0x000000000323E000-memory.dmpFilesize
16.6MB
-
memory/1696-38-0x00000000021B0000-0x000000000323E000-memory.dmpFilesize
16.6MB
-
memory/1696-39-0x00000000021B0000-0x000000000323E000-memory.dmpFilesize
16.6MB
-
memory/1696-45-0x00000000021B0000-0x000000000323E000-memory.dmpFilesize
16.6MB
-
memory/1696-46-0x00000000021B0000-0x000000000323E000-memory.dmpFilesize
16.6MB
-
memory/1696-47-0x00000000021B0000-0x000000000323E000-memory.dmpFilesize
16.6MB
-
memory/1696-48-0x00000000021B0000-0x000000000323E000-memory.dmpFilesize
16.6MB
-
memory/1696-52-0x00000000021B0000-0x000000000323E000-memory.dmpFilesize
16.6MB
-
memory/1696-54-0x00000000021B0000-0x000000000323E000-memory.dmpFilesize
16.6MB
-
memory/1696-55-0x00000000021B0000-0x000000000323E000-memory.dmpFilesize
16.6MB
-
memory/1696-56-0x00000000021B0000-0x000000000323E000-memory.dmpFilesize
16.6MB
-
memory/1696-58-0x00000000021B0000-0x000000000323E000-memory.dmpFilesize
16.6MB
-
memory/1696-59-0x00000000021B0000-0x000000000323E000-memory.dmpFilesize
16.6MB
-
memory/1696-60-0x00000000021B0000-0x000000000323E000-memory.dmpFilesize
16.6MB
-
memory/1696-63-0x00000000021B0000-0x000000000323E000-memory.dmpFilesize
16.6MB
-
memory/1696-65-0x00000000021B0000-0x000000000323E000-memory.dmpFilesize
16.6MB
-
memory/1696-67-0x00000000021B0000-0x000000000323E000-memory.dmpFilesize
16.6MB
-
memory/1696-68-0x00000000007F0000-0x00000000007F2000-memory.dmpFilesize
8KB
-
memory/1696-28-0x00000000021B0000-0x000000000323E000-memory.dmpFilesize
16.6MB
-
memory/1696-7-0x0000000000800000-0x0000000000801000-memory.dmpFilesize
4KB