Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
20-06-2024 06:16
Static task
static1
Behavioral task
behavioral1
Sample
3e04298f6b9c82f684ad9bfcd090a4d0920b78467ce18d5cbf175bfcf81b1c8f_NeikiAnalytics.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
3e04298f6b9c82f684ad9bfcd090a4d0920b78467ce18d5cbf175bfcf81b1c8f_NeikiAnalytics.exe
Resource
win10v2004-20240611-en
General
-
Target
3e04298f6b9c82f684ad9bfcd090a4d0920b78467ce18d5cbf175bfcf81b1c8f_NeikiAnalytics.exe
-
Size
1.1MB
-
MD5
7e84035657ac269612b7deb0d0f10bd0
-
SHA1
835b03f6bc9147f4b5f4401c94a161d012cccb72
-
SHA256
3e04298f6b9c82f684ad9bfcd090a4d0920b78467ce18d5cbf175bfcf81b1c8f
-
SHA512
370d887013bd909508c4fda98a4adce326cf3e382f828b03e75031241a8d696b2a0ab2f8929adf4ee6278b997019d7a7f621972a21fa128b471a0e4e6bf93ece
-
SSDEEP
24576:tDFTGtjAYhIeurbowS5ZpLUH++C76MwB04h:SccdYowS5ZpLY+j76fB08
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 3e04298f6b9c82f684ad9bfcd090a4d0920b78467ce18d5cbf175bfcf81b1c8f_NeikiAnalytics.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 3e04298f6b9c82f684ad9bfcd090a4d0920b78467ce18d5cbf175bfcf81b1c8f_NeikiAnalytics.exe -
Suspicious use of AdjustPrivilegeToken 9 IoCs
description pid Process Token: SeAssignPrimaryTokenPrivilege 1880 3e04298f6b9c82f684ad9bfcd090a4d0920b78467ce18d5cbf175bfcf81b1c8f_NeikiAnalytics.exe Token: SeDebugPrivilege 1880 3e04298f6b9c82f684ad9bfcd090a4d0920b78467ce18d5cbf175bfcf81b1c8f_NeikiAnalytics.exe Token: SeChangeNotifyPrivilege 1880 3e04298f6b9c82f684ad9bfcd090a4d0920b78467ce18d5cbf175bfcf81b1c8f_NeikiAnalytics.exe Token: SeIncBasePriorityPrivilege 1880 3e04298f6b9c82f684ad9bfcd090a4d0920b78467ce18d5cbf175bfcf81b1c8f_NeikiAnalytics.exe Token: SeIncreaseQuotaPrivilege 1880 3e04298f6b9c82f684ad9bfcd090a4d0920b78467ce18d5cbf175bfcf81b1c8f_NeikiAnalytics.exe Token: SeProfSingleProcessPrivilege 1880 3e04298f6b9c82f684ad9bfcd090a4d0920b78467ce18d5cbf175bfcf81b1c8f_NeikiAnalytics.exe Token: SeCreateGlobalPrivilege 1880 3e04298f6b9c82f684ad9bfcd090a4d0920b78467ce18d5cbf175bfcf81b1c8f_NeikiAnalytics.exe Token: SeBackupPrivilege 1880 3e04298f6b9c82f684ad9bfcd090a4d0920b78467ce18d5cbf175bfcf81b1c8f_NeikiAnalytics.exe Token: SeRestorePrivilege 1880 3e04298f6b9c82f684ad9bfcd090a4d0920b78467ce18d5cbf175bfcf81b1c8f_NeikiAnalytics.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\3e04298f6b9c82f684ad9bfcd090a4d0920b78467ce18d5cbf175bfcf81b1c8f_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\3e04298f6b9c82f684ad9bfcd090a4d0920b78467ce18d5cbf175bfcf81b1c8f_NeikiAnalytics.exe"1⤵
- Checks processor information in registry
- Suspicious use of AdjustPrivilegeToken
PID:1880