Analysis
-
max time kernel
140s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
24/06/2024, 11:04
Behavioral task
behavioral1
Sample
68fe5cf2ec309dab4c6e0fa89d85a993c44b11aaab8f181413a578ea17ede7d4_NeikiAnalytics.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
68fe5cf2ec309dab4c6e0fa89d85a993c44b11aaab8f181413a578ea17ede7d4_NeikiAnalytics.exe
Resource
win10v2004-20240611-en
General
-
Target
68fe5cf2ec309dab4c6e0fa89d85a993c44b11aaab8f181413a578ea17ede7d4_NeikiAnalytics.exe
-
Size
232KB
-
MD5
79984e48f7339a7221f3ee987cbefb80
-
SHA1
b7e91f643ce79059e95a4056b76c71f0f7124001
-
SHA256
68fe5cf2ec309dab4c6e0fa89d85a993c44b11aaab8f181413a578ea17ede7d4
-
SHA512
76fd98175024e94132de5d2451641297b6ba6ee5bb4f0a7315cd027c7af886b9f77f922b1c3d7b3d1e056c1f1cd673932a48f404fee017398b9f62098de01a1b
-
SSDEEP
3072:l1i/NU8bOMYcYYcmy51VRgiFCpCIXUWOLTsEsigcL3P6xxc1VOz1i/NU82OMYcYU:Xi/NjO5xbg/CSUFLTwMjs6oi/N+O7
Malware Config
Signatures
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 2 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{A0XC6A98-A14C-J35H-46UD-F5AR862J2AH5} 68fe5cf2ec309dab4c6e0fa89d85a993c44b11aaab8f181413a578ea17ede7d4_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{A0XC6A98-A14C-J35H-46UD-F5AR862J2AH5}\StubPath = "C:\\system.exe" 68fe5cf2ec309dab4c6e0fa89d85a993c44b11aaab8f181413a578ea17ede7d4_NeikiAnalytics.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-200405930-3877336739-3533750831-1000\Control Panel\International\Geo\Nation 68fe5cf2ec309dab4c6e0fa89d85a993c44b11aaab8f181413a578ea17ede7d4_NeikiAnalytics.exe -
resource yara_rule behavioral2/memory/3020-0-0x0000000000400000-0x000000000043A000-memory.dmp upx behavioral2/files/0x000900000002351a-11.dat upx behavioral2/files/0x0007000000023526-12.dat upx behavioral2/memory/3020-343-0x0000000000400000-0x000000000043A000-memory.dmp upx -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\WINDOWS\SysWOW64\ie.bat 68fe5cf2ec309dab4c6e0fa89d85a993c44b11aaab8f181413a578ea17ede7d4_NeikiAnalytics.exe File created C:\WINDOWS\SysWOW64\qx.bat 68fe5cf2ec309dab4c6e0fa89d85a993c44b11aaab8f181413a578ea17ede7d4_NeikiAnalytics.exe -
Hide Artifacts: Hidden Files and Directories 1 TTPs 7 IoCs
pid Process 5088 cmd.exe 4580 cmd.exe 3032 cmd.exe 1972 cmd.exe 2664 cmd.exe 656 cmd.exe 2912 cmd.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\WINDOWS\windows.exe 68fe5cf2ec309dab4c6e0fa89d85a993c44b11aaab8f181413a578ea17ede7d4_NeikiAnalytics.exe File opened for modification C:\WINDOWS\windows.exe 68fe5cf2ec309dab4c6e0fa89d85a993c44b11aaab8f181413a578ea17ede7d4_NeikiAnalytics.exe File opened for modification C:\WINDOWS\windows.exe attrib.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-200405930-3877336739-3533750831-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-200405930-3877336739-3533750831-1000\SOFTWARE\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-200405930-3877336739-3533750831-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000092879b20bf700e4c81ff82d1ae3b836600000000020000000000106600000001000020000000d1592e00206241abf5c116579fb84856143a512f82868e5f0e36a3c3f302f630000000000e8000000002000020000000921efbf0f685d92da925c6998b384f19fc9b749d266d95ece0de7349b8752cbe200000007c2c6a852ba99fcd1617c447e66171bc570195ffc12e047142978482f467371040000000ce0574ed03d10208ca8a669e111b2de69f0e7886c48943f19603f051fa9ed006fd92350433460ed29405725b90953d290146584859b51d9453215e9277c3cc40 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-200405930-3877336739-3533750831-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-200405930-3877336739-3533750831-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "425992037" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-200405930-3877336739-3533750831-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-200405930-3877336739-3533750831-1000\SOFTWARE\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-200405930-3877336739-3533750831-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "1466316617" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-200405930-3877336739-3533750831-1000\Software\Microsoft\Internet Explorer\Main 68fe5cf2ec309dab4c6e0fa89d85a993c44b11aaab8f181413a578ea17ede7d4_NeikiAnalytics.exe Key created \REGISTRY\USER\S-1-5-21-200405930-3877336739-3533750831-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-200405930-3877336739-3533750831-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-200405930-3877336739-3533750831-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-200405930-3877336739-3533750831-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e081a36d26c6da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-200405930-3877336739-3533750831-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-200405930-3877336739-3533750831-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "1467566680" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-200405930-3877336739-3533750831-1000\SOFTWARE\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-200405930-3877336739-3533750831-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31114790" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-200405930-3877336739-3533750831-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-200405930-3877336739-3533750831-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-200405930-3877336739-3533750831-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "1466316617" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-200405930-3877336739-3533750831-1000\SOFTWARE\Microsoft\Internet Explorer\IESettingSync\SlowSettingTypesChanged = "2" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-200405930-3877336739-3533750831-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-200405930-3877336739-3533750831-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-200405930-3877336739-3533750831-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-200405930-3877336739-3533750831-1000\SOFTWARE\Microsoft\Internet Explorer\GPU\AdapterInfo = "vendorId=\"0x10de\",deviceID=\"0x8c\",subSysID=\"0x0\",revision=\"0x0\",version=\"10.0.19041.546\"hypervisor=\"No Hypervisor (No SLAT)\"" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-200405930-3877336739-3533750831-1000\SOFTWARE\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-200405930-3877336739-3533750831-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLLowDateTime = "1251635200" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-200405930-3877336739-3533750831-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-200405930-3877336739-3533750831-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-200405930-3877336739-3533750831-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-200405930-3877336739-3533750831-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-200405930-3877336739-3533750831-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "31114790" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-200405930-3877336739-3533750831-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-200405930-3877336739-3533750831-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-200405930-3877336739-3533750831-1000\Software\Microsoft\Internet Explorer\VersionManager iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-200405930-3877336739-3533750831-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f0c69e6d26c6da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-200405930-3877336739-3533750831-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-200405930-3877336739-3533750831-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31114790" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-200405930-3877336739-3533750831-1000\Software\Microsoft\Internet Explorer\VersionManager IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-200405930-3877336739-3533750831-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "1467566680" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-200405930-3877336739-3533750831-1000\Software\Microsoft\Internet Explorer\IESettingSync IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-200405930-3877336739-3533750831-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Key created \REGISTRY\USER\S-1-5-21-200405930-3877336739-3533750831-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-200405930-3877336739-3533750831-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{82EE5D9C-3219-11EF-9D11-7AB36BF646CA} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-200405930-3877336739-3533750831-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "31114790" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-200405930-3877336739-3533750831-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-200405930-3877336739-3533750831-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLHighDateTime = "50" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-200405930-3877336739-3533750831-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000092879b20bf700e4c81ff82d1ae3b83660000000002000000000010660000000100002000000096543ac1e3eb8dc8f952cf18e489fff9f32d4137702be70deebe6cd7626ba8c7000000000e8000000002000020000000723b46455b87bd3ebe9d12142d19671ef1c026d644b4aac076e8663cc0a0cd73200000009ab972f777379e0b0fcac157444bab6dbba477c6189040397a4e22c9512e9ebc4000000000b2d4420fc96207a2ae50b84c94cbc451a834f39724761109de3a536c41008003803dbc56ad584a9c0a73981ec196a7acdd3c965beaaeb40fdf093cf9ab46d3 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-200405930-3877336739-3533750831-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe -
Modifies Internet Explorer start page 1 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-200405930-3877336739-3533750831-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Start Page = "http://dhku.com" 68fe5cf2ec309dab4c6e0fa89d85a993c44b11aaab8f181413a578ea17ede7d4_NeikiAnalytics.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3020 68fe5cf2ec309dab4c6e0fa89d85a993c44b11aaab8f181413a578ea17ede7d4_NeikiAnalytics.exe 3020 68fe5cf2ec309dab4c6e0fa89d85a993c44b11aaab8f181413a578ea17ede7d4_NeikiAnalytics.exe 3020 68fe5cf2ec309dab4c6e0fa89d85a993c44b11aaab8f181413a578ea17ede7d4_NeikiAnalytics.exe 3020 68fe5cf2ec309dab4c6e0fa89d85a993c44b11aaab8f181413a578ea17ede7d4_NeikiAnalytics.exe 3020 68fe5cf2ec309dab4c6e0fa89d85a993c44b11aaab8f181413a578ea17ede7d4_NeikiAnalytics.exe 3020 68fe5cf2ec309dab4c6e0fa89d85a993c44b11aaab8f181413a578ea17ede7d4_NeikiAnalytics.exe 3020 68fe5cf2ec309dab4c6e0fa89d85a993c44b11aaab8f181413a578ea17ede7d4_NeikiAnalytics.exe 3020 68fe5cf2ec309dab4c6e0fa89d85a993c44b11aaab8f181413a578ea17ede7d4_NeikiAnalytics.exe 3020 68fe5cf2ec309dab4c6e0fa89d85a993c44b11aaab8f181413a578ea17ede7d4_NeikiAnalytics.exe 3020 68fe5cf2ec309dab4c6e0fa89d85a993c44b11aaab8f181413a578ea17ede7d4_NeikiAnalytics.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1680 iexplore.exe -
Suspicious use of SetWindowsHookEx 7 IoCs
pid Process 3020 68fe5cf2ec309dab4c6e0fa89d85a993c44b11aaab8f181413a578ea17ede7d4_NeikiAnalytics.exe 1680 iexplore.exe 1680 iexplore.exe 1508 IEXPLORE.EXE 1508 IEXPLORE.EXE 1508 IEXPLORE.EXE 1508 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 47 IoCs
description pid Process procid_target PID 3020 wrote to memory of 1680 3020 68fe5cf2ec309dab4c6e0fa89d85a993c44b11aaab8f181413a578ea17ede7d4_NeikiAnalytics.exe 82 PID 3020 wrote to memory of 1680 3020 68fe5cf2ec309dab4c6e0fa89d85a993c44b11aaab8f181413a578ea17ede7d4_NeikiAnalytics.exe 82 PID 1680 wrote to memory of 1508 1680 iexplore.exe 83 PID 1680 wrote to memory of 1508 1680 iexplore.exe 83 PID 1680 wrote to memory of 1508 1680 iexplore.exe 83 PID 3020 wrote to memory of 3032 3020 68fe5cf2ec309dab4c6e0fa89d85a993c44b11aaab8f181413a578ea17ede7d4_NeikiAnalytics.exe 84 PID 3020 wrote to memory of 3032 3020 68fe5cf2ec309dab4c6e0fa89d85a993c44b11aaab8f181413a578ea17ede7d4_NeikiAnalytics.exe 84 PID 3020 wrote to memory of 3032 3020 68fe5cf2ec309dab4c6e0fa89d85a993c44b11aaab8f181413a578ea17ede7d4_NeikiAnalytics.exe 84 PID 3032 wrote to memory of 1756 3032 cmd.exe 86 PID 3032 wrote to memory of 1756 3032 cmd.exe 86 PID 3032 wrote to memory of 1756 3032 cmd.exe 86 PID 3020 wrote to memory of 1972 3020 68fe5cf2ec309dab4c6e0fa89d85a993c44b11aaab8f181413a578ea17ede7d4_NeikiAnalytics.exe 87 PID 3020 wrote to memory of 1972 3020 68fe5cf2ec309dab4c6e0fa89d85a993c44b11aaab8f181413a578ea17ede7d4_NeikiAnalytics.exe 87 PID 3020 wrote to memory of 1972 3020 68fe5cf2ec309dab4c6e0fa89d85a993c44b11aaab8f181413a578ea17ede7d4_NeikiAnalytics.exe 87 PID 1972 wrote to memory of 1420 1972 cmd.exe 89 PID 1972 wrote to memory of 1420 1972 cmd.exe 89 PID 1972 wrote to memory of 1420 1972 cmd.exe 89 PID 3020 wrote to memory of 2664 3020 68fe5cf2ec309dab4c6e0fa89d85a993c44b11aaab8f181413a578ea17ede7d4_NeikiAnalytics.exe 90 PID 3020 wrote to memory of 2664 3020 68fe5cf2ec309dab4c6e0fa89d85a993c44b11aaab8f181413a578ea17ede7d4_NeikiAnalytics.exe 90 PID 3020 wrote to memory of 2664 3020 68fe5cf2ec309dab4c6e0fa89d85a993c44b11aaab8f181413a578ea17ede7d4_NeikiAnalytics.exe 90 PID 2664 wrote to memory of 4252 2664 cmd.exe 92 PID 2664 wrote to memory of 4252 2664 cmd.exe 92 PID 2664 wrote to memory of 4252 2664 cmd.exe 92 PID 3020 wrote to memory of 656 3020 68fe5cf2ec309dab4c6e0fa89d85a993c44b11aaab8f181413a578ea17ede7d4_NeikiAnalytics.exe 93 PID 3020 wrote to memory of 656 3020 68fe5cf2ec309dab4c6e0fa89d85a993c44b11aaab8f181413a578ea17ede7d4_NeikiAnalytics.exe 93 PID 3020 wrote to memory of 656 3020 68fe5cf2ec309dab4c6e0fa89d85a993c44b11aaab8f181413a578ea17ede7d4_NeikiAnalytics.exe 93 PID 656 wrote to memory of 2572 656 cmd.exe 95 PID 656 wrote to memory of 2572 656 cmd.exe 95 PID 656 wrote to memory of 2572 656 cmd.exe 95 PID 3020 wrote to memory of 2912 3020 68fe5cf2ec309dab4c6e0fa89d85a993c44b11aaab8f181413a578ea17ede7d4_NeikiAnalytics.exe 96 PID 3020 wrote to memory of 2912 3020 68fe5cf2ec309dab4c6e0fa89d85a993c44b11aaab8f181413a578ea17ede7d4_NeikiAnalytics.exe 96 PID 3020 wrote to memory of 2912 3020 68fe5cf2ec309dab4c6e0fa89d85a993c44b11aaab8f181413a578ea17ede7d4_NeikiAnalytics.exe 96 PID 2912 wrote to memory of 2748 2912 cmd.exe 98 PID 2912 wrote to memory of 2748 2912 cmd.exe 98 PID 2912 wrote to memory of 2748 2912 cmd.exe 98 PID 3020 wrote to memory of 5088 3020 68fe5cf2ec309dab4c6e0fa89d85a993c44b11aaab8f181413a578ea17ede7d4_NeikiAnalytics.exe 99 PID 3020 wrote to memory of 5088 3020 68fe5cf2ec309dab4c6e0fa89d85a993c44b11aaab8f181413a578ea17ede7d4_NeikiAnalytics.exe 99 PID 3020 wrote to memory of 5088 3020 68fe5cf2ec309dab4c6e0fa89d85a993c44b11aaab8f181413a578ea17ede7d4_NeikiAnalytics.exe 99 PID 5088 wrote to memory of 4764 5088 cmd.exe 102 PID 5088 wrote to memory of 4764 5088 cmd.exe 102 PID 5088 wrote to memory of 4764 5088 cmd.exe 102 PID 3020 wrote to memory of 4580 3020 68fe5cf2ec309dab4c6e0fa89d85a993c44b11aaab8f181413a578ea17ede7d4_NeikiAnalytics.exe 103 PID 3020 wrote to memory of 4580 3020 68fe5cf2ec309dab4c6e0fa89d85a993c44b11aaab8f181413a578ea17ede7d4_NeikiAnalytics.exe 103 PID 3020 wrote to memory of 4580 3020 68fe5cf2ec309dab4c6e0fa89d85a993c44b11aaab8f181413a578ea17ede7d4_NeikiAnalytics.exe 103 PID 4580 wrote to memory of 4800 4580 cmd.exe 105 PID 4580 wrote to memory of 4800 4580 cmd.exe 105 PID 4580 wrote to memory of 4800 4580 cmd.exe 105 -
Views/modifies file attributes 1 TTPs 7 IoCs
pid Process 4800 attrib.exe 1756 attrib.exe 1420 attrib.exe 4252 attrib.exe 2572 attrib.exe 2748 attrib.exe 4764 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\68fe5cf2ec309dab4c6e0fa89d85a993c44b11aaab8f181413a578ea17ede7d4_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\68fe5cf2ec309dab4c6e0fa89d85a993c44b11aaab8f181413a578ea17ede7d4_NeikiAnalytics.exe"1⤵
- Boot or Logon Autostart Execution: Active Setup
- Checks computer location settings
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Modifies Internet Explorer start page
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3020 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://www.ymtuku.com/xg/?tan2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1680 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1680 CREDAT:17410 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1508
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c attrib +h "C:\Documents and Settings\All Users\桌面\Internet Explorer.lnk"2⤵
- Hide Artifacts: Hidden Files and Directories
- Suspicious use of WriteProcessMemory
PID:3032 -
C:\Windows\SysWOW64\attrib.exeattrib +h "C:\Documents and Settings\All Users\桌面\Internet Explorer.lnk"3⤵
- Views/modifies file attributes
PID:1756
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c attrib +h "C:\Documents and Settings\Admin\桌面\Internet Explorer.lnk"2⤵
- Hide Artifacts: Hidden Files and Directories
- Suspicious use of WriteProcessMemory
PID:1972 -
C:\Windows\SysWOW64\attrib.exeattrib +h "C:\Documents and Settings\Admin\桌面\Internet Explorer.lnk"3⤵
- Views/modifies file attributes
PID:1420
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c attrib +h "C:\Documents and Settings\Admin\Application Data\Microsoft\Internet Explorer\Quick Launch\启动 Internet Explorer 浏览器.lnk"2⤵
- Hide Artifacts: Hidden Files and Directories
- Suspicious use of WriteProcessMemory
PID:2664 -
C:\Windows\SysWOW64\attrib.exeattrib +h "C:\Documents and Settings\Admin\Application Data\Microsoft\Internet Explorer\Quick Launch\启动 Internet Explorer 浏览器.lnk"3⤵
- Views/modifies file attributes
PID:4252
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c attrib +h "C:\Documents and Settings\Admin\Application Data\Microsoft\Internet Explorer\Quick Launch\Internet Explorer.lnk"2⤵
- Hide Artifacts: Hidden Files and Directories
- Suspicious use of WriteProcessMemory
PID:656 -
C:\Windows\SysWOW64\attrib.exeattrib +h "C:\Documents and Settings\Admin\Application Data\Microsoft\Internet Explorer\Quick Launch\Internet Explorer.lnk"3⤵
- Views/modifies file attributes
PID:2572
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c attrib +h "C:\Documents and Settings\Admin\「开始」菜单\程序\Internet Explorer.lnk"2⤵
- Hide Artifacts: Hidden Files and Directories
- Suspicious use of WriteProcessMemory
PID:2912 -
C:\Windows\SysWOW64\attrib.exeattrib +h "C:\Documents and Settings\Admin\「开始」菜单\程序\Internet Explorer.lnk"3⤵
- Views/modifies file attributes
PID:2748
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c attrib +h "C:\WINDOWS\windows.exe"2⤵
- Hide Artifacts: Hidden Files and Directories
- Suspicious use of WriteProcessMemory
PID:5088 -
C:\Windows\SysWOW64\attrib.exeattrib +h "C:\WINDOWS\windows.exe"3⤵
- Drops file in Windows directory
- Views/modifies file attributes
PID:4764
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c attrib +h "c:\system.exe"2⤵
- Hide Artifacts: Hidden Files and Directories
- Suspicious use of WriteProcessMemory
PID:4580 -
C:\Windows\SysWOW64\attrib.exeattrib +h "c:\system.exe"3⤵
- Views/modifies file attributes
PID:4800
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
Filesize471B
MD506f5f3f6abfa0faa19dac83b5346ccb5
SHA128c8b2b412b44c21726132ce9f51aa9e2207f328
SHA2561f08ea567a623c9f9015efd9b209b823cd5bce6d474256440ffceb4f5ccffd8e
SHA512dd94f4ddc9e6cd90f1f4ae6c9175d16a6687329b2d1b928d24510229001a5539966b5ac1685d527606084a2cadc1ea856d14209c2e61b7434a699a293ebba448
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
Filesize404B
MD5631b66bb2361aec8917da43c2b1ab4c6
SHA1379e5f6844f4efbd75ae12f0181f4edcff3e0992
SHA256a693cd31de2b200b797c5c5039de4a05223039cbee70c96aabc146cb6c35990a
SHA512b4e0b6b1e1ce17afb5af8a56148284d1ea00422bf522212aadfe02954845591610c293c398e8a080ad4549535f04993658b29628a39617b1b399fd9f62e5b96a
-
Filesize
15KB
MD51a545d0052b581fbb2ab4c52133846bc
SHA162f3266a9b9925cd6d98658b92adec673cbe3dd3
SHA256557472aeaebf4c1c800b9df14c190f66d62cbabb011300dbedde2dcddd27a6c1
SHA512bd326d111589d87cd6d019378ec725ac9ac7ad4c36f22453941f7d52f90b747ede4783a83dfff6cae1b3bb46690ad49cffa77f2afda019b22863ac485b406e8d
-
Filesize
776B
MD50542ad8156f4dfca7ddcfcb62a6cb452
SHA1485282ba12fc0daf6f6aed96f1ababb8f91a6324
SHA256c90cdefdb6d7ad5a9a132e0d3b74ecdb5b0d5b442da482129ba67925a2f47e8f
SHA5120b41affa129277bf4b17d3e103dc4c241bc2ac338858cc17c22e172ec2ac65539b63e802246efb462cd134d99907d9c5ed9bc03937cadcca3155b703ac6e3195
-
Filesize
17KB
MD55a34cb996293fde2cb7a4ac89587393a
SHA13c96c993500690d1a77873cd62bc639b3a10653f
SHA256c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad
SHA512e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee
-
Filesize
33KB
MD524bb520e9517f2ed3ed987b46aeaf723
SHA1846723563d7dd2bff3954f93633b11af0103adc8
SHA256d1f1bfe698f2ffb7b3e7a885a301d58f9554d45df0a31c3e8b53c84b33c80d27
SHA51231afbcd2ee87c84cc3e56355da8ddc741a69d918c2687984265745d8046deb18c494cbca6aaf8d4eae6b035e888e6f7cf9b0d59a255f2714963d7b3edbb3c87f
-
Filesize
232KB
MD54338c0106187052b509f49003b1849e6
SHA1c7bcbf45f1370f250acc8b34f0ef213c0e702c82
SHA2560bcee432a30677220f07b5b929cc244982d502dbe8a3a9677b41f4dfad4c3da5
SHA512718b8e022629ed8bca402139e5785e6d2020e7cb561e50e53e2b6150082e6acd637a35622036444665c40ee3f539576f11a7406cd9aafa12851beb66d8771808
-
Filesize
232KB
MD5e249034032518e1810416cc7ffa2126d
SHA1d50047fb8ed151dcb8ea09374d8494d135d412b2
SHA2563fba0f84271e35bca8aa3c101a18825022944745f341024f407490d5c90b3d6f
SHA512d815f9d7848de24f9721e4c4b1f7c0ebd82d9f756e100b867b2477f4b6af8b03241b3d8dc058b06222d91931c5b0426c9eff481eecd79001f5d970cbf787d800