Analysis
-
max time kernel
149s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
24-06-2024 02:15
Static task
static1
Behavioral task
behavioral1
Sample
2fc06a20fb9bfabe762bfccd23028c33c3ace035e8c7974e6f49981d96030834_NeikiAnalytics.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2fc06a20fb9bfabe762bfccd23028c33c3ace035e8c7974e6f49981d96030834_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
2fc06a20fb9bfabe762bfccd23028c33c3ace035e8c7974e6f49981d96030834_NeikiAnalytics.exe
-
Size
4.1MB
-
MD5
8f1369ae44d1518767649e616da8d5c0
-
SHA1
34021d0e54e5d3485606a7f3beee2f915b18cdcc
-
SHA256
2fc06a20fb9bfabe762bfccd23028c33c3ace035e8c7974e6f49981d96030834
-
SHA512
448b9aaca2dfc52f760a3c6e20633aa6a8ce9405ada1d65de268d17b97aaab43a2efa70fa3e36bac3bf6ef5e48a5ef53e50782266372d1128a832edad2a93913
-
SSDEEP
98304:+R0pI/IQlUoMPdmpSp34ADtnkgvNWlw6aTfN41v:+R0pIAQhMPdm05n9klRKN41v
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1212 devbodsys.exe -
Loads dropped DLL 1 IoCs
pid Process 1740 2fc06a20fb9bfabe762bfccd23028c33c3ace035e8c7974e6f49981d96030834_NeikiAnalytics.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Run\Parametr = "C:\\IntelprocRQ\\devbodsys.exe" 2fc06a20fb9bfabe762bfccd23028c33c3ace035e8c7974e6f49981d96030834_NeikiAnalytics.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\Parametr = "C:\\VidS7\\bodaec.exe" 2fc06a20fb9bfabe762bfccd23028c33c3ace035e8c7974e6f49981d96030834_NeikiAnalytics.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1740 2fc06a20fb9bfabe762bfccd23028c33c3ace035e8c7974e6f49981d96030834_NeikiAnalytics.exe 1740 2fc06a20fb9bfabe762bfccd23028c33c3ace035e8c7974e6f49981d96030834_NeikiAnalytics.exe 1212 devbodsys.exe 1740 2fc06a20fb9bfabe762bfccd23028c33c3ace035e8c7974e6f49981d96030834_NeikiAnalytics.exe 1212 devbodsys.exe 1740 2fc06a20fb9bfabe762bfccd23028c33c3ace035e8c7974e6f49981d96030834_NeikiAnalytics.exe 1212 devbodsys.exe 1740 2fc06a20fb9bfabe762bfccd23028c33c3ace035e8c7974e6f49981d96030834_NeikiAnalytics.exe 1212 devbodsys.exe 1740 2fc06a20fb9bfabe762bfccd23028c33c3ace035e8c7974e6f49981d96030834_NeikiAnalytics.exe 1212 devbodsys.exe 1740 2fc06a20fb9bfabe762bfccd23028c33c3ace035e8c7974e6f49981d96030834_NeikiAnalytics.exe 1212 devbodsys.exe 1740 2fc06a20fb9bfabe762bfccd23028c33c3ace035e8c7974e6f49981d96030834_NeikiAnalytics.exe 1212 devbodsys.exe 1740 2fc06a20fb9bfabe762bfccd23028c33c3ace035e8c7974e6f49981d96030834_NeikiAnalytics.exe 1212 devbodsys.exe 1740 2fc06a20fb9bfabe762bfccd23028c33c3ace035e8c7974e6f49981d96030834_NeikiAnalytics.exe 1212 devbodsys.exe 1740 2fc06a20fb9bfabe762bfccd23028c33c3ace035e8c7974e6f49981d96030834_NeikiAnalytics.exe 1212 devbodsys.exe 1740 2fc06a20fb9bfabe762bfccd23028c33c3ace035e8c7974e6f49981d96030834_NeikiAnalytics.exe 1212 devbodsys.exe 1740 2fc06a20fb9bfabe762bfccd23028c33c3ace035e8c7974e6f49981d96030834_NeikiAnalytics.exe 1212 devbodsys.exe 1740 2fc06a20fb9bfabe762bfccd23028c33c3ace035e8c7974e6f49981d96030834_NeikiAnalytics.exe 1212 devbodsys.exe 1740 2fc06a20fb9bfabe762bfccd23028c33c3ace035e8c7974e6f49981d96030834_NeikiAnalytics.exe 1212 devbodsys.exe 1740 2fc06a20fb9bfabe762bfccd23028c33c3ace035e8c7974e6f49981d96030834_NeikiAnalytics.exe 1212 devbodsys.exe 1740 2fc06a20fb9bfabe762bfccd23028c33c3ace035e8c7974e6f49981d96030834_NeikiAnalytics.exe 1212 devbodsys.exe 1740 2fc06a20fb9bfabe762bfccd23028c33c3ace035e8c7974e6f49981d96030834_NeikiAnalytics.exe 1212 devbodsys.exe 1740 2fc06a20fb9bfabe762bfccd23028c33c3ace035e8c7974e6f49981d96030834_NeikiAnalytics.exe 1212 devbodsys.exe 1740 2fc06a20fb9bfabe762bfccd23028c33c3ace035e8c7974e6f49981d96030834_NeikiAnalytics.exe 1212 devbodsys.exe 1740 2fc06a20fb9bfabe762bfccd23028c33c3ace035e8c7974e6f49981d96030834_NeikiAnalytics.exe 1212 devbodsys.exe 1740 2fc06a20fb9bfabe762bfccd23028c33c3ace035e8c7974e6f49981d96030834_NeikiAnalytics.exe 1212 devbodsys.exe 1740 2fc06a20fb9bfabe762bfccd23028c33c3ace035e8c7974e6f49981d96030834_NeikiAnalytics.exe 1212 devbodsys.exe 1740 2fc06a20fb9bfabe762bfccd23028c33c3ace035e8c7974e6f49981d96030834_NeikiAnalytics.exe 1212 devbodsys.exe 1740 2fc06a20fb9bfabe762bfccd23028c33c3ace035e8c7974e6f49981d96030834_NeikiAnalytics.exe 1212 devbodsys.exe 1740 2fc06a20fb9bfabe762bfccd23028c33c3ace035e8c7974e6f49981d96030834_NeikiAnalytics.exe 1212 devbodsys.exe 1740 2fc06a20fb9bfabe762bfccd23028c33c3ace035e8c7974e6f49981d96030834_NeikiAnalytics.exe 1212 devbodsys.exe 1740 2fc06a20fb9bfabe762bfccd23028c33c3ace035e8c7974e6f49981d96030834_NeikiAnalytics.exe 1212 devbodsys.exe 1740 2fc06a20fb9bfabe762bfccd23028c33c3ace035e8c7974e6f49981d96030834_NeikiAnalytics.exe 1212 devbodsys.exe 1740 2fc06a20fb9bfabe762bfccd23028c33c3ace035e8c7974e6f49981d96030834_NeikiAnalytics.exe 1212 devbodsys.exe 1740 2fc06a20fb9bfabe762bfccd23028c33c3ace035e8c7974e6f49981d96030834_NeikiAnalytics.exe 1212 devbodsys.exe 1740 2fc06a20fb9bfabe762bfccd23028c33c3ace035e8c7974e6f49981d96030834_NeikiAnalytics.exe 1212 devbodsys.exe 1740 2fc06a20fb9bfabe762bfccd23028c33c3ace035e8c7974e6f49981d96030834_NeikiAnalytics.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1740 wrote to memory of 1212 1740 2fc06a20fb9bfabe762bfccd23028c33c3ace035e8c7974e6f49981d96030834_NeikiAnalytics.exe 28 PID 1740 wrote to memory of 1212 1740 2fc06a20fb9bfabe762bfccd23028c33c3ace035e8c7974e6f49981d96030834_NeikiAnalytics.exe 28 PID 1740 wrote to memory of 1212 1740 2fc06a20fb9bfabe762bfccd23028c33c3ace035e8c7974e6f49981d96030834_NeikiAnalytics.exe 28 PID 1740 wrote to memory of 1212 1740 2fc06a20fb9bfabe762bfccd23028c33c3ace035e8c7974e6f49981d96030834_NeikiAnalytics.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2fc06a20fb9bfabe762bfccd23028c33c3ace035e8c7974e6f49981d96030834_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\2fc06a20fb9bfabe762bfccd23028c33c3ace035e8c7974e6f49981d96030834_NeikiAnalytics.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1740 -
C:\IntelprocRQ\devbodsys.exeC:\IntelprocRQ\devbodsys.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:1212
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
206B
MD5ab8cdc63eff5f574e7af23ed097b59c2
SHA1cf54ec9675d01b720a911193e7b72bff11907aec
SHA2569c8bc2ec429cb85bdd14c816da5ef04245129948b81376da397aae87ce8d7b8c
SHA5124f1f01824a025caa4979e0c3ffc1e202d226db3a478886645524b378f6639d88257c40652933d9eb5806c32af07ead7915c30759fc5f82020924d27131c58c99
-
Filesize
4.1MB
MD5ee81fa97bf5467811fe4fad3baa9453f
SHA1d3e9a00ae20b751ddf021103d5a7d5dcf66f025a
SHA256c5b523d48c8a16c84f3929ca10dbe0f600ad8641a74256203b188aa9761ce7d6
SHA512166a4eb41de3b9056d24565dff1fcb15281c452d9d73ad6c399f9b7b704b51f9d61a722e44d1691044d6106aac8e3849889d85a9767b0bd3558ab0bd7a74c0e4
-
Filesize
4.1MB
MD56b1dc3fc2b843c37ed652252df042d6e
SHA149dbcafaee252f3a1396e73b838fa54ccb2875ee
SHA256432600b262ac96c2438d2f0f116c5386a64eb0511f1fec11263836b0a7c7f7de
SHA5123adcb9d626275ac267e86e52c296ea65d89b60e4f8db16b67a4276880fca235a0d2cb29f01627a1da852fe9a81f7041c8d55543e68b6dc2ab4e8417f8c145a33