Analysis
-
max time kernel
123s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
19-06-2024 01:59
Static task
static1
Behavioral task
behavioral1
Sample
77da93699a35376456421b2ed5e6ce90_NeikiAnalytics.exe
Resource
win7-20240611-en
General
-
Target
77da93699a35376456421b2ed5e6ce90_NeikiAnalytics.exe
-
Size
999KB
-
MD5
77da93699a35376456421b2ed5e6ce90
-
SHA1
7100f453d4c6e82cf714e9f131074135aa80df6e
-
SHA256
63aabe74b886ff7819f632fe8e901f54635925210d5cb097fed975d61eccef12
-
SHA512
8957ca1400bba55df453996ea995ead32ae768112a8e62503b3209cc982f230cb1965e819df48bc7bfcfe7305fd3c8c27facb4f06d9121c418e952a143d29ed9
-
SSDEEP
24576:S1chJKBPsXhk1Ve18QW5J3i+Z18i/SC/tROyfo/yA5ZSHwKziWijIVj:Phk1Ve18QWJ3i+fB6C/bOD6AeHhiW0Oj
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
http://www.klkjwre9fqwieluoi.info/
http://kukutrustnet777888.info/
Signatures
-
Modifies firewall policy service 3 TTPs 3 IoCs
Processes:
77da93699a35376456421b2ed5e6ce90_NeikiAnalytics.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" 77da93699a35376456421b2ed5e6ce90_NeikiAnalytics.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" 77da93699a35376456421b2ed5e6ce90_NeikiAnalytics.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "1" 77da93699a35376456421b2ed5e6ce90_NeikiAnalytics.exe -
Processes:
77da93699a35376456421b2ed5e6ce90_NeikiAnalytics.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 77da93699a35376456421b2ed5e6ce90_NeikiAnalytics.exe -
Processes:
77da93699a35376456421b2ed5e6ce90_NeikiAnalytics.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" 77da93699a35376456421b2ed5e6ce90_NeikiAnalytics.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" 77da93699a35376456421b2ed5e6ce90_NeikiAnalytics.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" 77da93699a35376456421b2ed5e6ce90_NeikiAnalytics.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" 77da93699a35376456421b2ed5e6ce90_NeikiAnalytics.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" 77da93699a35376456421b2ed5e6ce90_NeikiAnalytics.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UacDisableNotify = "1" 77da93699a35376456421b2ed5e6ce90_NeikiAnalytics.exe -
Processes:
resource yara_rule behavioral2/memory/3408-7-0x00000000028E0000-0x000000000396E000-memory.dmp upx behavioral2/memory/3408-8-0x00000000028E0000-0x000000000396E000-memory.dmp upx behavioral2/memory/3408-5-0x00000000028E0000-0x000000000396E000-memory.dmp upx behavioral2/memory/3408-9-0x00000000028E0000-0x000000000396E000-memory.dmp upx behavioral2/memory/3408-6-0x00000000028E0000-0x000000000396E000-memory.dmp upx behavioral2/memory/3408-4-0x00000000028E0000-0x000000000396E000-memory.dmp upx behavioral2/memory/3408-3-0x00000000028E0000-0x000000000396E000-memory.dmp upx behavioral2/memory/3408-1-0x00000000028E0000-0x000000000396E000-memory.dmp upx behavioral2/memory/3408-12-0x00000000028E0000-0x000000000396E000-memory.dmp upx behavioral2/memory/3408-15-0x00000000028E0000-0x000000000396E000-memory.dmp upx behavioral2/memory/3408-16-0x00000000028E0000-0x000000000396E000-memory.dmp upx behavioral2/memory/3408-17-0x00000000028E0000-0x000000000396E000-memory.dmp upx behavioral2/memory/3408-18-0x00000000028E0000-0x000000000396E000-memory.dmp upx behavioral2/memory/3408-19-0x00000000028E0000-0x000000000396E000-memory.dmp upx behavioral2/memory/3408-21-0x00000000028E0000-0x000000000396E000-memory.dmp upx behavioral2/memory/3408-23-0x00000000028E0000-0x000000000396E000-memory.dmp upx behavioral2/memory/3408-25-0x00000000028E0000-0x000000000396E000-memory.dmp upx behavioral2/memory/3408-26-0x00000000028E0000-0x000000000396E000-memory.dmp upx behavioral2/memory/3408-27-0x00000000028E0000-0x000000000396E000-memory.dmp upx behavioral2/memory/3408-29-0x00000000028E0000-0x000000000396E000-memory.dmp upx behavioral2/memory/3408-31-0x00000000028E0000-0x000000000396E000-memory.dmp upx behavioral2/memory/3408-33-0x00000000028E0000-0x000000000396E000-memory.dmp upx behavioral2/memory/3408-37-0x00000000028E0000-0x000000000396E000-memory.dmp upx behavioral2/memory/3408-39-0x00000000028E0000-0x000000000396E000-memory.dmp upx behavioral2/memory/3408-42-0x00000000028E0000-0x000000000396E000-memory.dmp upx behavioral2/memory/3408-43-0x00000000028E0000-0x000000000396E000-memory.dmp upx behavioral2/memory/3408-45-0x00000000028E0000-0x000000000396E000-memory.dmp upx behavioral2/memory/3408-46-0x00000000028E0000-0x000000000396E000-memory.dmp upx behavioral2/memory/3408-48-0x00000000028E0000-0x000000000396E000-memory.dmp upx behavioral2/memory/3408-55-0x00000000028E0000-0x000000000396E000-memory.dmp upx behavioral2/memory/3408-56-0x00000000028E0000-0x000000000396E000-memory.dmp upx behavioral2/memory/3408-58-0x00000000028E0000-0x000000000396E000-memory.dmp upx behavioral2/memory/3408-60-0x00000000028E0000-0x000000000396E000-memory.dmp upx behavioral2/memory/3408-61-0x00000000028E0000-0x000000000396E000-memory.dmp upx behavioral2/memory/3408-63-0x00000000028E0000-0x000000000396E000-memory.dmp upx behavioral2/memory/3408-66-0x00000000028E0000-0x000000000396E000-memory.dmp upx behavioral2/memory/3408-68-0x00000000028E0000-0x000000000396E000-memory.dmp upx behavioral2/memory/3408-69-0x00000000028E0000-0x000000000396E000-memory.dmp upx behavioral2/memory/3408-71-0x00000000028E0000-0x000000000396E000-memory.dmp upx -
Processes:
77da93699a35376456421b2ed5e6ce90_NeikiAnalytics.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" 77da93699a35376456421b2ed5e6ce90_NeikiAnalytics.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" 77da93699a35376456421b2ed5e6ce90_NeikiAnalytics.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" 77da93699a35376456421b2ed5e6ce90_NeikiAnalytics.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" 77da93699a35376456421b2ed5e6ce90_NeikiAnalytics.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" 77da93699a35376456421b2ed5e6ce90_NeikiAnalytics.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UacDisableNotify = "1" 77da93699a35376456421b2ed5e6ce90_NeikiAnalytics.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\Svc 77da93699a35376456421b2ed5e6ce90_NeikiAnalytics.exe -
Processes:
77da93699a35376456421b2ed5e6ce90_NeikiAnalytics.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 77da93699a35376456421b2ed5e6ce90_NeikiAnalytics.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
77da93699a35376456421b2ed5e6ce90_NeikiAnalytics.exedescription ioc process File opened (read-only) \??\W: 77da93699a35376456421b2ed5e6ce90_NeikiAnalytics.exe File opened (read-only) \??\X: 77da93699a35376456421b2ed5e6ce90_NeikiAnalytics.exe File opened (read-only) \??\K: 77da93699a35376456421b2ed5e6ce90_NeikiAnalytics.exe File opened (read-only) \??\O: 77da93699a35376456421b2ed5e6ce90_NeikiAnalytics.exe File opened (read-only) \??\H: 77da93699a35376456421b2ed5e6ce90_NeikiAnalytics.exe File opened (read-only) \??\J: 77da93699a35376456421b2ed5e6ce90_NeikiAnalytics.exe File opened (read-only) \??\V: 77da93699a35376456421b2ed5e6ce90_NeikiAnalytics.exe File opened (read-only) \??\E: 77da93699a35376456421b2ed5e6ce90_NeikiAnalytics.exe File opened (read-only) \??\G: 77da93699a35376456421b2ed5e6ce90_NeikiAnalytics.exe File opened (read-only) \??\R: 77da93699a35376456421b2ed5e6ce90_NeikiAnalytics.exe File opened (read-only) \??\Y: 77da93699a35376456421b2ed5e6ce90_NeikiAnalytics.exe File opened (read-only) \??\L: 77da93699a35376456421b2ed5e6ce90_NeikiAnalytics.exe File opened (read-only) \??\M: 77da93699a35376456421b2ed5e6ce90_NeikiAnalytics.exe File opened (read-only) \??\P: 77da93699a35376456421b2ed5e6ce90_NeikiAnalytics.exe File opened (read-only) \??\Q: 77da93699a35376456421b2ed5e6ce90_NeikiAnalytics.exe File opened (read-only) \??\S: 77da93699a35376456421b2ed5e6ce90_NeikiAnalytics.exe File opened (read-only) \??\T: 77da93699a35376456421b2ed5e6ce90_NeikiAnalytics.exe File opened (read-only) \??\U: 77da93699a35376456421b2ed5e6ce90_NeikiAnalytics.exe File opened (read-only) \??\Z: 77da93699a35376456421b2ed5e6ce90_NeikiAnalytics.exe File opened (read-only) \??\I: 77da93699a35376456421b2ed5e6ce90_NeikiAnalytics.exe File opened (read-only) \??\N: 77da93699a35376456421b2ed5e6ce90_NeikiAnalytics.exe -
Drops autorun.inf file 1 TTPs 2 IoCs
Malware can abuse Windows Autorun to spread further via attached volumes.
Processes:
77da93699a35376456421b2ed5e6ce90_NeikiAnalytics.exedescription ioc process File opened for modification C:\autorun.inf 77da93699a35376456421b2ed5e6ce90_NeikiAnalytics.exe File opened for modification F:\autorun.inf 77da93699a35376456421b2ed5e6ce90_NeikiAnalytics.exe -
Drops file in Program Files directory 12 IoCs
Processes:
77da93699a35376456421b2ed5e6ce90_NeikiAnalytics.exedescription ioc process File opened for modification C:\PROGRAM FILES\COMMON FILES\MICROSOFT SHARED\CLICKTORUN\OfficeClickToRun.exe 77da93699a35376456421b2ed5e6ce90_NeikiAnalytics.exe File opened for modification C:\PROGRAM FILES\7-ZIP\7zFM.exe 77da93699a35376456421b2ed5e6ce90_NeikiAnalytics.exe File opened for modification C:\PROGRAM FILES\7-ZIP\7zG.exe 77da93699a35376456421b2ed5e6ce90_NeikiAnalytics.exe File opened for modification C:\PROGRAM FILES\COMMON FILES\MICROSOFT SHARED\CLICKTORUN\InspectorOfficeGadget.exe 77da93699a35376456421b2ed5e6ce90_NeikiAnalytics.exe File opened for modification C:\PROGRAM FILES\COMMON FILES\MICROSOFT SHARED\CLICKTORUN\OfficeC2RClient.exe 77da93699a35376456421b2ed5e6ce90_NeikiAnalytics.exe File opened for modification C:\PROGRAM FILES\COMMON FILES\MICROSOFT SHARED\CLICKTORUN\AppVShNotify.exe 77da93699a35376456421b2ed5e6ce90_NeikiAnalytics.exe File opened for modification C:\PROGRAM FILES\COMMON FILES\MICROSOFT SHARED\CLICKTORUN\IntegratedOffice.exe 77da93699a35376456421b2ed5e6ce90_NeikiAnalytics.exe File opened for modification C:\PROGRAM FILES\COMMON FILES\MICROSOFT SHARED\CLICKTORUN\MavInject32.exe 77da93699a35376456421b2ed5e6ce90_NeikiAnalytics.exe File opened for modification C:\PROGRAM FILES\7-ZIP\7z.exe 77da93699a35376456421b2ed5e6ce90_NeikiAnalytics.exe File opened for modification C:\PROGRAM FILES\7-ZIP\Uninstall.exe 77da93699a35376456421b2ed5e6ce90_NeikiAnalytics.exe File opened for modification C:\Program Files (x86)\Common Files\Java\Java Update\jusched.exe 77da93699a35376456421b2ed5e6ce90_NeikiAnalytics.exe File opened for modification C:\PROGRAM FILES\COMMON FILES\MICROSOFT SHARED\CLICKTORUN\appvcleaner.exe 77da93699a35376456421b2ed5e6ce90_NeikiAnalytics.exe -
Drops file in Windows directory 1 IoCs
Processes:
77da93699a35376456421b2ed5e6ce90_NeikiAnalytics.exedescription ioc process File opened for modification C:\Windows\SYSTEM.INI 77da93699a35376456421b2ed5e6ce90_NeikiAnalytics.exe -
Suspicious behavior: EnumeratesProcesses 24 IoCs
Processes:
77da93699a35376456421b2ed5e6ce90_NeikiAnalytics.exepid process 3408 77da93699a35376456421b2ed5e6ce90_NeikiAnalytics.exe 3408 77da93699a35376456421b2ed5e6ce90_NeikiAnalytics.exe 3408 77da93699a35376456421b2ed5e6ce90_NeikiAnalytics.exe 3408 77da93699a35376456421b2ed5e6ce90_NeikiAnalytics.exe 3408 77da93699a35376456421b2ed5e6ce90_NeikiAnalytics.exe 3408 77da93699a35376456421b2ed5e6ce90_NeikiAnalytics.exe 3408 77da93699a35376456421b2ed5e6ce90_NeikiAnalytics.exe 3408 77da93699a35376456421b2ed5e6ce90_NeikiAnalytics.exe 3408 77da93699a35376456421b2ed5e6ce90_NeikiAnalytics.exe 3408 77da93699a35376456421b2ed5e6ce90_NeikiAnalytics.exe 3408 77da93699a35376456421b2ed5e6ce90_NeikiAnalytics.exe 3408 77da93699a35376456421b2ed5e6ce90_NeikiAnalytics.exe 3408 77da93699a35376456421b2ed5e6ce90_NeikiAnalytics.exe 3408 77da93699a35376456421b2ed5e6ce90_NeikiAnalytics.exe 3408 77da93699a35376456421b2ed5e6ce90_NeikiAnalytics.exe 3408 77da93699a35376456421b2ed5e6ce90_NeikiAnalytics.exe 3408 77da93699a35376456421b2ed5e6ce90_NeikiAnalytics.exe 3408 77da93699a35376456421b2ed5e6ce90_NeikiAnalytics.exe 3408 77da93699a35376456421b2ed5e6ce90_NeikiAnalytics.exe 3408 77da93699a35376456421b2ed5e6ce90_NeikiAnalytics.exe 3408 77da93699a35376456421b2ed5e6ce90_NeikiAnalytics.exe 3408 77da93699a35376456421b2ed5e6ce90_NeikiAnalytics.exe 3408 77da93699a35376456421b2ed5e6ce90_NeikiAnalytics.exe 3408 77da93699a35376456421b2ed5e6ce90_NeikiAnalytics.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
77da93699a35376456421b2ed5e6ce90_NeikiAnalytics.exedescription pid process Token: SeDebugPrivilege 3408 77da93699a35376456421b2ed5e6ce90_NeikiAnalytics.exe Token: SeDebugPrivilege 3408 77da93699a35376456421b2ed5e6ce90_NeikiAnalytics.exe Token: SeDebugPrivilege 3408 77da93699a35376456421b2ed5e6ce90_NeikiAnalytics.exe Token: SeDebugPrivilege 3408 77da93699a35376456421b2ed5e6ce90_NeikiAnalytics.exe Token: SeDebugPrivilege 3408 77da93699a35376456421b2ed5e6ce90_NeikiAnalytics.exe Token: SeDebugPrivilege 3408 77da93699a35376456421b2ed5e6ce90_NeikiAnalytics.exe Token: SeDebugPrivilege 3408 77da93699a35376456421b2ed5e6ce90_NeikiAnalytics.exe Token: SeDebugPrivilege 3408 77da93699a35376456421b2ed5e6ce90_NeikiAnalytics.exe Token: SeDebugPrivilege 3408 77da93699a35376456421b2ed5e6ce90_NeikiAnalytics.exe Token: SeDebugPrivilege 3408 77da93699a35376456421b2ed5e6ce90_NeikiAnalytics.exe Token: SeDebugPrivilege 3408 77da93699a35376456421b2ed5e6ce90_NeikiAnalytics.exe Token: SeDebugPrivilege 3408 77da93699a35376456421b2ed5e6ce90_NeikiAnalytics.exe Token: SeDebugPrivilege 3408 77da93699a35376456421b2ed5e6ce90_NeikiAnalytics.exe Token: SeDebugPrivilege 3408 77da93699a35376456421b2ed5e6ce90_NeikiAnalytics.exe Token: SeDebugPrivilege 3408 77da93699a35376456421b2ed5e6ce90_NeikiAnalytics.exe Token: SeDebugPrivilege 3408 77da93699a35376456421b2ed5e6ce90_NeikiAnalytics.exe Token: SeDebugPrivilege 3408 77da93699a35376456421b2ed5e6ce90_NeikiAnalytics.exe Token: SeDebugPrivilege 3408 77da93699a35376456421b2ed5e6ce90_NeikiAnalytics.exe Token: SeDebugPrivilege 3408 77da93699a35376456421b2ed5e6ce90_NeikiAnalytics.exe Token: SeDebugPrivilege 3408 77da93699a35376456421b2ed5e6ce90_NeikiAnalytics.exe Token: SeDebugPrivilege 3408 77da93699a35376456421b2ed5e6ce90_NeikiAnalytics.exe Token: SeDebugPrivilege 3408 77da93699a35376456421b2ed5e6ce90_NeikiAnalytics.exe Token: SeDebugPrivilege 3408 77da93699a35376456421b2ed5e6ce90_NeikiAnalytics.exe Token: SeDebugPrivilege 3408 77da93699a35376456421b2ed5e6ce90_NeikiAnalytics.exe Token: SeDebugPrivilege 3408 77da93699a35376456421b2ed5e6ce90_NeikiAnalytics.exe Token: SeDebugPrivilege 3408 77da93699a35376456421b2ed5e6ce90_NeikiAnalytics.exe Token: SeDebugPrivilege 3408 77da93699a35376456421b2ed5e6ce90_NeikiAnalytics.exe Token: SeDebugPrivilege 3408 77da93699a35376456421b2ed5e6ce90_NeikiAnalytics.exe Token: SeDebugPrivilege 3408 77da93699a35376456421b2ed5e6ce90_NeikiAnalytics.exe Token: SeDebugPrivilege 3408 77da93699a35376456421b2ed5e6ce90_NeikiAnalytics.exe Token: SeDebugPrivilege 3408 77da93699a35376456421b2ed5e6ce90_NeikiAnalytics.exe Token: SeDebugPrivilege 3408 77da93699a35376456421b2ed5e6ce90_NeikiAnalytics.exe Token: SeDebugPrivilege 3408 77da93699a35376456421b2ed5e6ce90_NeikiAnalytics.exe Token: SeDebugPrivilege 3408 77da93699a35376456421b2ed5e6ce90_NeikiAnalytics.exe Token: SeDebugPrivilege 3408 77da93699a35376456421b2ed5e6ce90_NeikiAnalytics.exe Token: SeDebugPrivilege 3408 77da93699a35376456421b2ed5e6ce90_NeikiAnalytics.exe Token: SeDebugPrivilege 3408 77da93699a35376456421b2ed5e6ce90_NeikiAnalytics.exe Token: SeDebugPrivilege 3408 77da93699a35376456421b2ed5e6ce90_NeikiAnalytics.exe Token: SeDebugPrivilege 3408 77da93699a35376456421b2ed5e6ce90_NeikiAnalytics.exe Token: SeDebugPrivilege 3408 77da93699a35376456421b2ed5e6ce90_NeikiAnalytics.exe Token: SeDebugPrivilege 3408 77da93699a35376456421b2ed5e6ce90_NeikiAnalytics.exe Token: SeDebugPrivilege 3408 77da93699a35376456421b2ed5e6ce90_NeikiAnalytics.exe Token: SeDebugPrivilege 3408 77da93699a35376456421b2ed5e6ce90_NeikiAnalytics.exe Token: SeDebugPrivilege 3408 77da93699a35376456421b2ed5e6ce90_NeikiAnalytics.exe Token: SeDebugPrivilege 3408 77da93699a35376456421b2ed5e6ce90_NeikiAnalytics.exe Token: SeDebugPrivilege 3408 77da93699a35376456421b2ed5e6ce90_NeikiAnalytics.exe Token: SeDebugPrivilege 3408 77da93699a35376456421b2ed5e6ce90_NeikiAnalytics.exe Token: SeDebugPrivilege 3408 77da93699a35376456421b2ed5e6ce90_NeikiAnalytics.exe Token: SeDebugPrivilege 3408 77da93699a35376456421b2ed5e6ce90_NeikiAnalytics.exe Token: SeDebugPrivilege 3408 77da93699a35376456421b2ed5e6ce90_NeikiAnalytics.exe Token: SeDebugPrivilege 3408 77da93699a35376456421b2ed5e6ce90_NeikiAnalytics.exe Token: SeDebugPrivilege 3408 77da93699a35376456421b2ed5e6ce90_NeikiAnalytics.exe Token: SeDebugPrivilege 3408 77da93699a35376456421b2ed5e6ce90_NeikiAnalytics.exe Token: SeDebugPrivilege 3408 77da93699a35376456421b2ed5e6ce90_NeikiAnalytics.exe Token: SeDebugPrivilege 3408 77da93699a35376456421b2ed5e6ce90_NeikiAnalytics.exe Token: SeDebugPrivilege 3408 77da93699a35376456421b2ed5e6ce90_NeikiAnalytics.exe Token: SeDebugPrivilege 3408 77da93699a35376456421b2ed5e6ce90_NeikiAnalytics.exe Token: SeDebugPrivilege 3408 77da93699a35376456421b2ed5e6ce90_NeikiAnalytics.exe Token: SeDebugPrivilege 3408 77da93699a35376456421b2ed5e6ce90_NeikiAnalytics.exe Token: SeDebugPrivilege 3408 77da93699a35376456421b2ed5e6ce90_NeikiAnalytics.exe Token: SeDebugPrivilege 3408 77da93699a35376456421b2ed5e6ce90_NeikiAnalytics.exe Token: SeDebugPrivilege 3408 77da93699a35376456421b2ed5e6ce90_NeikiAnalytics.exe Token: SeDebugPrivilege 3408 77da93699a35376456421b2ed5e6ce90_NeikiAnalytics.exe Token: SeDebugPrivilege 3408 77da93699a35376456421b2ed5e6ce90_NeikiAnalytics.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
77da93699a35376456421b2ed5e6ce90_NeikiAnalytics.exedescription pid process target process PID 3408 wrote to memory of 780 3408 77da93699a35376456421b2ed5e6ce90_NeikiAnalytics.exe fontdrvhost.exe PID 3408 wrote to memory of 788 3408 77da93699a35376456421b2ed5e6ce90_NeikiAnalytics.exe fontdrvhost.exe PID 3408 wrote to memory of 380 3408 77da93699a35376456421b2ed5e6ce90_NeikiAnalytics.exe dwm.exe PID 3408 wrote to memory of 2984 3408 77da93699a35376456421b2ed5e6ce90_NeikiAnalytics.exe sihost.exe PID 3408 wrote to memory of 2132 3408 77da93699a35376456421b2ed5e6ce90_NeikiAnalytics.exe svchost.exe PID 3408 wrote to memory of 2760 3408 77da93699a35376456421b2ed5e6ce90_NeikiAnalytics.exe taskhostw.exe PID 3408 wrote to memory of 3424 3408 77da93699a35376456421b2ed5e6ce90_NeikiAnalytics.exe Explorer.EXE PID 3408 wrote to memory of 3540 3408 77da93699a35376456421b2ed5e6ce90_NeikiAnalytics.exe svchost.exe PID 3408 wrote to memory of 3720 3408 77da93699a35376456421b2ed5e6ce90_NeikiAnalytics.exe DllHost.exe PID 3408 wrote to memory of 3816 3408 77da93699a35376456421b2ed5e6ce90_NeikiAnalytics.exe StartMenuExperienceHost.exe PID 3408 wrote to memory of 3884 3408 77da93699a35376456421b2ed5e6ce90_NeikiAnalytics.exe RuntimeBroker.exe PID 3408 wrote to memory of 3968 3408 77da93699a35376456421b2ed5e6ce90_NeikiAnalytics.exe SearchApp.exe PID 3408 wrote to memory of 4192 3408 77da93699a35376456421b2ed5e6ce90_NeikiAnalytics.exe RuntimeBroker.exe PID 3408 wrote to memory of 4684 3408 77da93699a35376456421b2ed5e6ce90_NeikiAnalytics.exe RuntimeBroker.exe PID 3408 wrote to memory of 1512 3408 77da93699a35376456421b2ed5e6ce90_NeikiAnalytics.exe TextInputHost.exe PID 3408 wrote to memory of 3708 3408 77da93699a35376456421b2ed5e6ce90_NeikiAnalytics.exe backgroundTaskHost.exe PID 3408 wrote to memory of 780 3408 77da93699a35376456421b2ed5e6ce90_NeikiAnalytics.exe fontdrvhost.exe PID 3408 wrote to memory of 788 3408 77da93699a35376456421b2ed5e6ce90_NeikiAnalytics.exe fontdrvhost.exe PID 3408 wrote to memory of 380 3408 77da93699a35376456421b2ed5e6ce90_NeikiAnalytics.exe dwm.exe PID 3408 wrote to memory of 2984 3408 77da93699a35376456421b2ed5e6ce90_NeikiAnalytics.exe sihost.exe PID 3408 wrote to memory of 2132 3408 77da93699a35376456421b2ed5e6ce90_NeikiAnalytics.exe svchost.exe PID 3408 wrote to memory of 2760 3408 77da93699a35376456421b2ed5e6ce90_NeikiAnalytics.exe taskhostw.exe PID 3408 wrote to memory of 3424 3408 77da93699a35376456421b2ed5e6ce90_NeikiAnalytics.exe Explorer.EXE PID 3408 wrote to memory of 3540 3408 77da93699a35376456421b2ed5e6ce90_NeikiAnalytics.exe svchost.exe PID 3408 wrote to memory of 3720 3408 77da93699a35376456421b2ed5e6ce90_NeikiAnalytics.exe DllHost.exe PID 3408 wrote to memory of 3816 3408 77da93699a35376456421b2ed5e6ce90_NeikiAnalytics.exe StartMenuExperienceHost.exe PID 3408 wrote to memory of 3884 3408 77da93699a35376456421b2ed5e6ce90_NeikiAnalytics.exe RuntimeBroker.exe PID 3408 wrote to memory of 3968 3408 77da93699a35376456421b2ed5e6ce90_NeikiAnalytics.exe SearchApp.exe PID 3408 wrote to memory of 4192 3408 77da93699a35376456421b2ed5e6ce90_NeikiAnalytics.exe RuntimeBroker.exe PID 3408 wrote to memory of 4684 3408 77da93699a35376456421b2ed5e6ce90_NeikiAnalytics.exe RuntimeBroker.exe PID 3408 wrote to memory of 1512 3408 77da93699a35376456421b2ed5e6ce90_NeikiAnalytics.exe TextInputHost.exe PID 3408 wrote to memory of 3708 3408 77da93699a35376456421b2ed5e6ce90_NeikiAnalytics.exe backgroundTaskHost.exe PID 3408 wrote to memory of 2996 3408 77da93699a35376456421b2ed5e6ce90_NeikiAnalytics.exe RuntimeBroker.exe PID 3408 wrote to memory of 4036 3408 77da93699a35376456421b2ed5e6ce90_NeikiAnalytics.exe RuntimeBroker.exe PID 3408 wrote to memory of 780 3408 77da93699a35376456421b2ed5e6ce90_NeikiAnalytics.exe fontdrvhost.exe PID 3408 wrote to memory of 788 3408 77da93699a35376456421b2ed5e6ce90_NeikiAnalytics.exe fontdrvhost.exe PID 3408 wrote to memory of 380 3408 77da93699a35376456421b2ed5e6ce90_NeikiAnalytics.exe dwm.exe PID 3408 wrote to memory of 2984 3408 77da93699a35376456421b2ed5e6ce90_NeikiAnalytics.exe sihost.exe PID 3408 wrote to memory of 2132 3408 77da93699a35376456421b2ed5e6ce90_NeikiAnalytics.exe svchost.exe PID 3408 wrote to memory of 2760 3408 77da93699a35376456421b2ed5e6ce90_NeikiAnalytics.exe taskhostw.exe PID 3408 wrote to memory of 3424 3408 77da93699a35376456421b2ed5e6ce90_NeikiAnalytics.exe Explorer.EXE PID 3408 wrote to memory of 3540 3408 77da93699a35376456421b2ed5e6ce90_NeikiAnalytics.exe svchost.exe PID 3408 wrote to memory of 3720 3408 77da93699a35376456421b2ed5e6ce90_NeikiAnalytics.exe DllHost.exe PID 3408 wrote to memory of 3816 3408 77da93699a35376456421b2ed5e6ce90_NeikiAnalytics.exe StartMenuExperienceHost.exe PID 3408 wrote to memory of 3884 3408 77da93699a35376456421b2ed5e6ce90_NeikiAnalytics.exe RuntimeBroker.exe PID 3408 wrote to memory of 3968 3408 77da93699a35376456421b2ed5e6ce90_NeikiAnalytics.exe SearchApp.exe PID 3408 wrote to memory of 4192 3408 77da93699a35376456421b2ed5e6ce90_NeikiAnalytics.exe RuntimeBroker.exe PID 3408 wrote to memory of 4684 3408 77da93699a35376456421b2ed5e6ce90_NeikiAnalytics.exe RuntimeBroker.exe PID 3408 wrote to memory of 1512 3408 77da93699a35376456421b2ed5e6ce90_NeikiAnalytics.exe TextInputHost.exe PID 3408 wrote to memory of 2996 3408 77da93699a35376456421b2ed5e6ce90_NeikiAnalytics.exe RuntimeBroker.exe PID 3408 wrote to memory of 4036 3408 77da93699a35376456421b2ed5e6ce90_NeikiAnalytics.exe RuntimeBroker.exe PID 3408 wrote to memory of 780 3408 77da93699a35376456421b2ed5e6ce90_NeikiAnalytics.exe fontdrvhost.exe PID 3408 wrote to memory of 788 3408 77da93699a35376456421b2ed5e6ce90_NeikiAnalytics.exe fontdrvhost.exe PID 3408 wrote to memory of 380 3408 77da93699a35376456421b2ed5e6ce90_NeikiAnalytics.exe dwm.exe PID 3408 wrote to memory of 2984 3408 77da93699a35376456421b2ed5e6ce90_NeikiAnalytics.exe sihost.exe PID 3408 wrote to memory of 2132 3408 77da93699a35376456421b2ed5e6ce90_NeikiAnalytics.exe svchost.exe PID 3408 wrote to memory of 2760 3408 77da93699a35376456421b2ed5e6ce90_NeikiAnalytics.exe taskhostw.exe PID 3408 wrote to memory of 3424 3408 77da93699a35376456421b2ed5e6ce90_NeikiAnalytics.exe Explorer.EXE PID 3408 wrote to memory of 3540 3408 77da93699a35376456421b2ed5e6ce90_NeikiAnalytics.exe svchost.exe PID 3408 wrote to memory of 3720 3408 77da93699a35376456421b2ed5e6ce90_NeikiAnalytics.exe DllHost.exe PID 3408 wrote to memory of 3816 3408 77da93699a35376456421b2ed5e6ce90_NeikiAnalytics.exe StartMenuExperienceHost.exe PID 3408 wrote to memory of 3884 3408 77da93699a35376456421b2ed5e6ce90_NeikiAnalytics.exe RuntimeBroker.exe PID 3408 wrote to memory of 3968 3408 77da93699a35376456421b2ed5e6ce90_NeikiAnalytics.exe SearchApp.exe PID 3408 wrote to memory of 4192 3408 77da93699a35376456421b2ed5e6ce90_NeikiAnalytics.exe RuntimeBroker.exe -
System policy modification 1 TTPs 1 IoCs
Processes:
77da93699a35376456421b2ed5e6ce90_NeikiAnalytics.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 77da93699a35376456421b2ed5e6ce90_NeikiAnalytics.exe
Processes
-
C:\Windows\system32\fontdrvhost.exe"fontdrvhost.exe"1⤵
-
C:\Windows\system32\fontdrvhost.exe"fontdrvhost.exe"1⤵
-
C:\Windows\system32\dwm.exe"dwm.exe"1⤵
-
C:\Windows\system32\sihost.exesihost.exe1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc1⤵
-
C:\Windows\system32\taskhostw.exetaskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}1⤵
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
-
C:\Users\Admin\AppData\Local\Temp\77da93699a35376456421b2ed5e6ce90_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\77da93699a35376456421b2ed5e6ce90_NeikiAnalytics.exe"2⤵
- Modifies firewall policy service
- UAC bypass
- Windows security bypass
- Windows security modification
- Checks whether UAC is enabled
- Enumerates connected drives
- Drops autorun.inf file
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k ClipboardSvcGroup -p -s cbdhsvc1⤵
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵
-
C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\InputApp\TextInputHost.exe"C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\InputApp\TextInputHost.exe" -ServerName:InputApp.AppX9jnwykgrccxc8by3hsrsh07r423xzvav.mca1⤵
-
C:\Windows\system32\backgroundTaskHost.exe"C:\Windows\system32\backgroundTaskHost.exe" -ServerName:App.AppXmtcan0h2tfbfy7k9kn8hbxb6dmzz1zh0.mca1⤵
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Privilege Escalation
Create or Modify System Process
1Windows Service
1Abuse Elevation Control Mechanism
1Bypass User Account Control
1Defense Evasion
Modify Registry
5Impair Defenses
4Disable or Modify Tools
3Disable or Modify System Firewall
1Abuse Elevation Control Mechanism
1Bypass User Account Control
1Replay Monitor
Loading Replay Monitor...
Downloads
-
F:\btjx.exeFilesize
100KB
MD53e71034aa856117859cc886de622af17
SHA19137e160a856936b09a3aa44a65677b2376b8d9f
SHA25661280df2ee3a8665be7c954c7ab4239aeccab2062bb38a1677d35d8a325e92eb
SHA512cc0ec08e45e9ef9a9e807daf9d9fc6aae154dfecfa04b1178edac4e747c8833de5fbb98971682728872f7c94f8e09e3e717db2b4bd85a90265e8a93f86007ea6
-
memory/3408-25-0x00000000028E0000-0x000000000396E000-memory.dmpFilesize
16.6MB
-
memory/3408-71-0x00000000028E0000-0x000000000396E000-memory.dmpFilesize
16.6MB
-
memory/3408-5-0x00000000028E0000-0x000000000396E000-memory.dmpFilesize
16.6MB
-
memory/3408-9-0x00000000028E0000-0x000000000396E000-memory.dmpFilesize
16.6MB
-
memory/3408-14-0x00000000006A0000-0x00000000006A2000-memory.dmpFilesize
8KB
-
memory/3408-13-0x00000000006A0000-0x00000000006A2000-memory.dmpFilesize
8KB
-
memory/3408-11-0x00000000006B0000-0x00000000006B1000-memory.dmpFilesize
4KB
-
memory/3408-10-0x00000000006A0000-0x00000000006A2000-memory.dmpFilesize
8KB
-
memory/3408-6-0x00000000028E0000-0x000000000396E000-memory.dmpFilesize
16.6MB
-
memory/3408-4-0x00000000028E0000-0x000000000396E000-memory.dmpFilesize
16.6MB
-
memory/3408-3-0x00000000028E0000-0x000000000396E000-memory.dmpFilesize
16.6MB
-
memory/3408-1-0x00000000028E0000-0x000000000396E000-memory.dmpFilesize
16.6MB
-
memory/3408-12-0x00000000028E0000-0x000000000396E000-memory.dmpFilesize
16.6MB
-
memory/3408-15-0x00000000028E0000-0x000000000396E000-memory.dmpFilesize
16.6MB
-
memory/3408-16-0x00000000028E0000-0x000000000396E000-memory.dmpFilesize
16.6MB
-
memory/3408-17-0x00000000028E0000-0x000000000396E000-memory.dmpFilesize
16.6MB
-
memory/3408-26-0x00000000028E0000-0x000000000396E000-memory.dmpFilesize
16.6MB
-
memory/3408-19-0x00000000028E0000-0x000000000396E000-memory.dmpFilesize
16.6MB
-
memory/3408-21-0x00000000028E0000-0x000000000396E000-memory.dmpFilesize
16.6MB
-
memory/3408-22-0x0000000000400000-0x000000000045E000-memory.dmpFilesize
376KB
-
memory/3408-23-0x00000000028E0000-0x000000000396E000-memory.dmpFilesize
16.6MB
-
memory/3408-0-0x0000000000400000-0x000000000045E000-memory.dmpFilesize
376KB
-
memory/3408-29-0x00000000028E0000-0x000000000396E000-memory.dmpFilesize
16.6MB
-
memory/3408-8-0x00000000028E0000-0x000000000396E000-memory.dmpFilesize
16.6MB
-
memory/3408-18-0x00000000028E0000-0x000000000396E000-memory.dmpFilesize
16.6MB
-
memory/3408-31-0x00000000028E0000-0x000000000396E000-memory.dmpFilesize
16.6MB
-
memory/3408-33-0x00000000028E0000-0x000000000396E000-memory.dmpFilesize
16.6MB
-
memory/3408-37-0x00000000028E0000-0x000000000396E000-memory.dmpFilesize
16.6MB
-
memory/3408-39-0x00000000028E0000-0x000000000396E000-memory.dmpFilesize
16.6MB
-
memory/3408-42-0x00000000028E0000-0x000000000396E000-memory.dmpFilesize
16.6MB
-
memory/3408-43-0x00000000028E0000-0x000000000396E000-memory.dmpFilesize
16.6MB
-
memory/3408-45-0x00000000028E0000-0x000000000396E000-memory.dmpFilesize
16.6MB
-
memory/3408-46-0x00000000028E0000-0x000000000396E000-memory.dmpFilesize
16.6MB
-
memory/3408-48-0x00000000028E0000-0x000000000396E000-memory.dmpFilesize
16.6MB
-
memory/3408-55-0x00000000028E0000-0x000000000396E000-memory.dmpFilesize
16.6MB
-
memory/3408-56-0x00000000028E0000-0x000000000396E000-memory.dmpFilesize
16.6MB
-
memory/3408-58-0x00000000028E0000-0x000000000396E000-memory.dmpFilesize
16.6MB
-
memory/3408-60-0x00000000028E0000-0x000000000396E000-memory.dmpFilesize
16.6MB
-
memory/3408-61-0x00000000028E0000-0x000000000396E000-memory.dmpFilesize
16.6MB
-
memory/3408-63-0x00000000028E0000-0x000000000396E000-memory.dmpFilesize
16.6MB
-
memory/3408-66-0x00000000028E0000-0x000000000396E000-memory.dmpFilesize
16.6MB
-
memory/3408-68-0x00000000028E0000-0x000000000396E000-memory.dmpFilesize
16.6MB
-
memory/3408-69-0x00000000028E0000-0x000000000396E000-memory.dmpFilesize
16.6MB
-
memory/3408-70-0x00000000006A0000-0x00000000006A2000-memory.dmpFilesize
8KB
-
memory/3408-27-0x00000000028E0000-0x000000000396E000-memory.dmpFilesize
16.6MB
-
memory/3408-7-0x00000000028E0000-0x000000000396E000-memory.dmpFilesize
16.6MB