Analysis
-
max time kernel
148s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
22-06-2024 04:36
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
7f85cf546a684f757bc33dc4be00b794c76bafdc6cb07e8305922cc1cce812fe_NeikiAnalytics.exe
Resource
win7-20240221-en
3 signatures
150 seconds
General
-
Target
7f85cf546a684f757bc33dc4be00b794c76bafdc6cb07e8305922cc1cce812fe_NeikiAnalytics.exe
-
Size
1.3MB
-
MD5
a7b1c4fcf3ad5d820a2b4a8ab63430a0
-
SHA1
bf811c5917965bd443f56f19003f9fe5b938061f
-
SHA256
7f85cf546a684f757bc33dc4be00b794c76bafdc6cb07e8305922cc1cce812fe
-
SHA512
5a3aad5f09686d497e22783971d0243d0441dceaaecb4d2d5a9f5154bba6f2b9478843af5bb6f28888f5a7565c08de305495570eb1d9fa172ab69e42ecc45831
-
SSDEEP
24576:n/Lza6uCtmB57lkNPQJfX7eaFHiwQkRHW/nSrzkN+:n/PNbtmB570ge+HilkR2/SXkN
Malware Config
Extracted
Family
risepro
C2
147.45.47.126:58709
Signatures
-
Suspicious use of NtSetInformationThreadHideFromDebugger 15 IoCs
pid Process 3900 7f85cf546a684f757bc33dc4be00b794c76bafdc6cb07e8305922cc1cce812fe_NeikiAnalytics.exe 3900 7f85cf546a684f757bc33dc4be00b794c76bafdc6cb07e8305922cc1cce812fe_NeikiAnalytics.exe 3900 7f85cf546a684f757bc33dc4be00b794c76bafdc6cb07e8305922cc1cce812fe_NeikiAnalytics.exe 3900 7f85cf546a684f757bc33dc4be00b794c76bafdc6cb07e8305922cc1cce812fe_NeikiAnalytics.exe 3900 7f85cf546a684f757bc33dc4be00b794c76bafdc6cb07e8305922cc1cce812fe_NeikiAnalytics.exe 3900 7f85cf546a684f757bc33dc4be00b794c76bafdc6cb07e8305922cc1cce812fe_NeikiAnalytics.exe 3900 7f85cf546a684f757bc33dc4be00b794c76bafdc6cb07e8305922cc1cce812fe_NeikiAnalytics.exe 3900 7f85cf546a684f757bc33dc4be00b794c76bafdc6cb07e8305922cc1cce812fe_NeikiAnalytics.exe 3900 7f85cf546a684f757bc33dc4be00b794c76bafdc6cb07e8305922cc1cce812fe_NeikiAnalytics.exe 3900 7f85cf546a684f757bc33dc4be00b794c76bafdc6cb07e8305922cc1cce812fe_NeikiAnalytics.exe 3900 7f85cf546a684f757bc33dc4be00b794c76bafdc6cb07e8305922cc1cce812fe_NeikiAnalytics.exe 3900 7f85cf546a684f757bc33dc4be00b794c76bafdc6cb07e8305922cc1cce812fe_NeikiAnalytics.exe 3900 7f85cf546a684f757bc33dc4be00b794c76bafdc6cb07e8305922cc1cce812fe_NeikiAnalytics.exe 3900 7f85cf546a684f757bc33dc4be00b794c76bafdc6cb07e8305922cc1cce812fe_NeikiAnalytics.exe 3900 7f85cf546a684f757bc33dc4be00b794c76bafdc6cb07e8305922cc1cce812fe_NeikiAnalytics.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3900 7f85cf546a684f757bc33dc4be00b794c76bafdc6cb07e8305922cc1cce812fe_NeikiAnalytics.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\7f85cf546a684f757bc33dc4be00b794c76bafdc6cb07e8305922cc1cce812fe_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\7f85cf546a684f757bc33dc4be00b794c76bafdc6cb07e8305922cc1cce812fe_NeikiAnalytics.exe"1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetWindowsHookEx
PID:3900
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --field-trial-handle=1040,i,4686244434963378549,11462511444150484980,262144 --variations-seed-version --mojo-platform-channel-handle=4356 /prefetch:81⤵PID:1056