Analysis Overview
SHA256
eaf29f0cd1709461f128369a6903512e147e1bbf864966d8d96fb28dabd53d2f
Threat Level: Known bad
The file b4268b57bcbe3b9578472a91d10c4200_NeikiAnalytics.exe was found to be: Known bad.
Malicious Activity Summary
Neshta
Detect Neshta payload
Neshta family
Checks computer location settings
Loads dropped DLL
Modifies system executable filetype association
Reads user/profile data of web browsers
Drops file in Program Files directory
Drops file in Windows directory
Unsigned PE
Enumerates physical storage devices
Modifies registry class
MITRE ATT&CK Matrix V13
Analysis: static1
Detonation Overview
Reported
2024-06-19 10:20
Signatures
Detect Neshta payload
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Neshta family
Unsigned PE
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Analysis: behavioral1
Detonation Overview
Submitted
2024-06-19 10:20
Reported
2024-06-19 10:23
Platform
win7-20240508-en
Max time kernel
117s
Max time network
117s
Command Line
Signatures
Detect Neshta payload
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
Neshta
Loads dropped DLL
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\b4268b57bcbe3b9578472a91d10c4200_NeikiAnalytics.exe | N/A |
Modifies system executable filetype association
| Description | Indicator | Process | Target |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" | C:\Users\Admin\AppData\Local\Temp\b4268b57bcbe3b9578472a91d10c4200_NeikiAnalytics.exe | N/A |
Reads user/profile data of web browsers
Drops file in Program Files directory
Drops file in Windows directory
| Description | Indicator | Process | Target |
| File opened for modification | C:\Windows\svchost.com | C:\Users\Admin\AppData\Local\Temp\b4268b57bcbe3b9578472a91d10c4200_NeikiAnalytics.exe | N/A |
Enumerates physical storage devices
Modifies registry class
| Description | Indicator | Process | Target |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" | C:\Users\Admin\AppData\Local\Temp\b4268b57bcbe3b9578472a91d10c4200_NeikiAnalytics.exe | N/A |
Processes
C:\Users\Admin\AppData\Local\Temp\b4268b57bcbe3b9578472a91d10c4200_NeikiAnalytics.exe
"C:\Users\Admin\AppData\Local\Temp\b4268b57bcbe3b9578472a91d10c4200_NeikiAnalytics.exe"
Network
Files
C:\MSOCache\ALLUSE~1\{9A861~1\setup.exe
| MD5 | 566ed4f62fdc96f175afedd811fa0370 |
| SHA1 | d4b47adc40e0d5a9391d3f6f2942d1889dd2a451 |
| SHA256 | e17cd94c08fc0e001a49f43a0801cea4625fb9aee211b6dfebebec446c21f460 |
| SHA512 | cdf8f508d396a1a0d2e0fc25f2ae46398b25039a0dafa0919737cc44e3e926ebae4c3aa26f1a3441511430f1a36241f8e61c515a5d9bd98ad4740d4d0f7b8db7 |
\PROGRA~2\Adobe\READER~1.0\Reader\LOGTRA~1.EXE
| MD5 | 9e2b9928c89a9d0da1d3e8f4bd96afa7 |
| SHA1 | ec66cda99f44b62470c6930e5afda061579cde35 |
| SHA256 | 8899b4ed3446b7d55b54defbc1acb7c5392a4b3bc8ec2cdc7c31171708965043 |
| SHA512 | 2ca5ad1d0e12a8049de885b90b7f56fe77c868e0d6dae4ec4b6f3bc0bf7b2e73295cc9b1328c2b45357ffb0d7804622ab3f91a56140b098e93b691032d508156 |
memory/1644-79-0x0000000000400000-0x000000000041B000-memory.dmp
memory/1644-81-0x0000000000400000-0x000000000041B000-memory.dmp
Analysis: behavioral2
Detonation Overview
Submitted
2024-06-19 10:20
Reported
2024-06-19 10:23
Platform
win10v2004-20240508-en
Max time kernel
149s
Max time network
150s
Command Line
Signatures
Detect Neshta payload
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
Neshta
Checks computer location settings
| Description | Indicator | Process | Target |
| Key value queried | \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation | C:\Users\Admin\AppData\Local\Temp\b4268b57bcbe3b9578472a91d10c4200_NeikiAnalytics.exe | N/A |
Modifies system executable filetype association
| Description | Indicator | Process | Target |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" | C:\Users\Admin\AppData\Local\Temp\b4268b57bcbe3b9578472a91d10c4200_NeikiAnalytics.exe | N/A |
Reads user/profile data of web browsers
Drops file in Program Files directory
Drops file in Windows directory
| Description | Indicator | Process | Target |
| File opened for modification | C:\Windows\svchost.com | C:\Users\Admin\AppData\Local\Temp\b4268b57bcbe3b9578472a91d10c4200_NeikiAnalytics.exe | N/A |
Enumerates physical storage devices
Modifies registry class
| Description | Indicator | Process | Target |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" | C:\Users\Admin\AppData\Local\Temp\b4268b57bcbe3b9578472a91d10c4200_NeikiAnalytics.exe | N/A |
Processes
C:\Users\Admin\AppData\Local\Temp\b4268b57bcbe3b9578472a91d10c4200_NeikiAnalytics.exe
"C:\Users\Admin\AppData\Local\Temp\b4268b57bcbe3b9578472a91d10c4200_NeikiAnalytics.exe"
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | 203.107.17.2.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 232.168.11.51.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 68.32.126.40.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 133.211.185.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 183.59.114.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 206.23.85.13.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 0.204.248.87.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 138.107.17.2.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 13.227.111.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 198.111.78.13.in-addr.arpa | udp |
Files
C:\Users\Admin\AppData\Local\Temp\3582-490\b4268b57bcbe3b9578472a91d10c4200_NeikiAnalytics.exe
| MD5 | d370fbec9be325d944fe2e3caf1dd3ec |
| SHA1 | 51a7119c754edde68cc3265a326c58aed5afa07c |
| SHA256 | 9ce922021bf686ae9bc8e2cccd5a18d5ce0e7053a19e375cb2b379eb9b349447 |
| SHA512 | 743b73ca7d6b896736229531be0db7408a704bd2b67a08e0c1ff5357c6fadbab344efc5717d0206d203a4c53a59cffc3e860795618e4b94e48c6e7a0b9d8e66f |
memory/1236-93-0x0000000000400000-0x000000000041B000-memory.dmp
memory/1236-94-0x0000000000400000-0x000000000041B000-memory.dmp
memory/1236-96-0x0000000000400000-0x000000000041B000-memory.dmp