Analysis
-
max time kernel
120s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
24/06/2024, 22:11
Static task
static1
Behavioral task
behavioral1
Sample
09ba4899b5b72361605b1faae89c6b209742135d1ca29ef7cf82dbd76bd10eb8_NeikiAnalytics.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
09ba4899b5b72361605b1faae89c6b209742135d1ca29ef7cf82dbd76bd10eb8_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
09ba4899b5b72361605b1faae89c6b209742135d1ca29ef7cf82dbd76bd10eb8_NeikiAnalytics.exe
-
Size
28KB
-
MD5
9e7a1241a309aa2bff90fb9792220190
-
SHA1
6e7ac6019fba1a615f6339408008308074751afa
-
SHA256
09ba4899b5b72361605b1faae89c6b209742135d1ca29ef7cf82dbd76bd10eb8
-
SHA512
4058f7d6a18bb23f6e2950f65475c6f0a540c24bdbb8acf25b9215ae9c3a3fc68e129570fd2b7177e3ff291e7637ba1de7afba19feba8407ad5769dc1f6ff620
-
SSDEEP
384:Xng4j8Gs/sRHSv9W705ZqSA7hyTM/0uOhXmaVmLlG4J:XnDj8GsmIlAFyTqUhWaUw4J
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2208 winupd.exe -
Loads dropped DLL 2 IoCs
pid Process 1928 09ba4899b5b72361605b1faae89c6b209742135d1ca29ef7cf82dbd76bd10eb8_NeikiAnalytics.exe 1928 09ba4899b5b72361605b1faae89c6b209742135d1ca29ef7cf82dbd76bd10eb8_NeikiAnalytics.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Run\WinUpdate = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\winupd.exe -notray" reg.exe -
Gathers network information 2 TTPs 1 IoCs
Uses commandline utility to view network configuration.
pid Process 2492 ipconfig.exe -
Modifies registry key 1 TTPs 1 IoCs
pid Process 2840 reg.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1928 09ba4899b5b72361605b1faae89c6b209742135d1ca29ef7cf82dbd76bd10eb8_NeikiAnalytics.exe 2208 winupd.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 1928 wrote to memory of 2208 1928 09ba4899b5b72361605b1faae89c6b209742135d1ca29ef7cf82dbd76bd10eb8_NeikiAnalytics.exe 28 PID 1928 wrote to memory of 2208 1928 09ba4899b5b72361605b1faae89c6b209742135d1ca29ef7cf82dbd76bd10eb8_NeikiAnalytics.exe 28 PID 1928 wrote to memory of 2208 1928 09ba4899b5b72361605b1faae89c6b209742135d1ca29ef7cf82dbd76bd10eb8_NeikiAnalytics.exe 28 PID 1928 wrote to memory of 2208 1928 09ba4899b5b72361605b1faae89c6b209742135d1ca29ef7cf82dbd76bd10eb8_NeikiAnalytics.exe 28 PID 2208 wrote to memory of 2492 2208 winupd.exe 29 PID 2208 wrote to memory of 2492 2208 winupd.exe 29 PID 2208 wrote to memory of 2492 2208 winupd.exe 29 PID 2208 wrote to memory of 2492 2208 winupd.exe 29 PID 2208 wrote to memory of 2492 2208 winupd.exe 29 PID 2208 wrote to memory of 2492 2208 winupd.exe 29 PID 2492 wrote to memory of 2664 2492 ipconfig.exe 31 PID 2492 wrote to memory of 2664 2492 ipconfig.exe 31 PID 2492 wrote to memory of 2664 2492 ipconfig.exe 31 PID 2492 wrote to memory of 2664 2492 ipconfig.exe 31 PID 2664 wrote to memory of 2840 2664 cmd.exe 33 PID 2664 wrote to memory of 2840 2664 cmd.exe 33 PID 2664 wrote to memory of 2840 2664 cmd.exe 33 PID 2664 wrote to memory of 2840 2664 cmd.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\09ba4899b5b72361605b1faae89c6b209742135d1ca29ef7cf82dbd76bd10eb8_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\09ba4899b5b72361605b1faae89c6b209742135d1ca29ef7cf82dbd76bd10eb8_NeikiAnalytics.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1928 -
C:\Users\Admin\AppData\Roaming\Microsoft\winupd.exeC:\Users\Admin\AppData\Roaming\Microsoft\winupd.exe -notray2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2208 -
C:\Windows\SysWOW64\ipconfig.exe"C:\Windows\system32\ipconfig.exe"3⤵
- Gathers network information
- Suspicious use of WriteProcessMemory
PID:2492 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\NFVEMBAB.bat" "4⤵
- Suspicious use of WriteProcessMemory
PID:2664 -
C:\Windows\SysWOW64\reg.exeREG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /v WinUpdate /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\Microsoft\winupd.exe -notray" /f5⤵
- Adds Run key to start application
- Modifies registry key
PID:2840
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
151B
MD5cac890d00365d07b9ca89def17cc3a36
SHA16fa99679ede791c16b5d3e6d243a98e8bbdb7eab
SHA2564f98ddee89760080a5c8a93666d2f5c97be52b741265ef4d1ce9aaebf05f12da
SHA512124dc0b18e13425bde43bcbbe2a99005928e398bffcb458d498aac9e754bc5b92b703270667800876c60b0801343f2de8c6b9a1eebafd80bb4f6d5dc295dd9f1
-
Filesize
28KB
MD5985c076c8f8c1e7ef4f2eed65e4f8110
SHA1a958879b9e07c7565ee7843bc6c22624151657d9
SHA2567688d765620074f803d75a084699a054ff40b475a824b5618175c465a21d7225
SHA5125cf008de7169a75c6f9e45c460b95bc27bbca66d4b0eedd314888e989ce274e420d894a821075b18fbf40300a23e551ee893035dc50bc0fabeffc381edb207f1