Analysis
-
max time kernel
149s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
24/06/2024, 12:10
Static task
static1
Behavioral task
behavioral1
Sample
705c3235d6fc1e0b0924456aba0101ce50e432aa76197b946ce39c63d6955cae_NeikiAnalytics.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
705c3235d6fc1e0b0924456aba0101ce50e432aa76197b946ce39c63d6955cae_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
705c3235d6fc1e0b0924456aba0101ce50e432aa76197b946ce39c63d6955cae_NeikiAnalytics.exe
-
Size
2.7MB
-
MD5
7c8d7b5bda7bf10e94a2ff905c7af8a0
-
SHA1
f6e6d467f3c3a36e0c2df396a7c0d8b0e8154dd2
-
SHA256
705c3235d6fc1e0b0924456aba0101ce50e432aa76197b946ce39c63d6955cae
-
SHA512
8cd2444f140a27d83f9c85cf883f71b8172ce88e92b5727225ffd1f3edf8fa97afcf34d4f2567f80ab9211590b8e0d6ff02788f45cba1ae17dce11f5ae6fa7fa
-
SSDEEP
49152:+R0p8xHycIq+GI27nGroMPTJPer1c2HSjpjK3LBA9w4Sx:+R0pI/IQlUoMPdmpSpO4
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2920 devbodloc.exe -
Loads dropped DLL 1 IoCs
pid Process 1976 705c3235d6fc1e0b0924456aba0101ce50e432aa76197b946ce39c63d6955cae_NeikiAnalytics.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\Parametr = "C:\\GalaxBI\\dobdevloc.exe" 705c3235d6fc1e0b0924456aba0101ce50e432aa76197b946ce39c63d6955cae_NeikiAnalytics.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Run\Parametr = "C:\\UserDot5R\\devbodloc.exe" 705c3235d6fc1e0b0924456aba0101ce50e432aa76197b946ce39c63d6955cae_NeikiAnalytics.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1976 705c3235d6fc1e0b0924456aba0101ce50e432aa76197b946ce39c63d6955cae_NeikiAnalytics.exe 1976 705c3235d6fc1e0b0924456aba0101ce50e432aa76197b946ce39c63d6955cae_NeikiAnalytics.exe 2920 devbodloc.exe 1976 705c3235d6fc1e0b0924456aba0101ce50e432aa76197b946ce39c63d6955cae_NeikiAnalytics.exe 2920 devbodloc.exe 1976 705c3235d6fc1e0b0924456aba0101ce50e432aa76197b946ce39c63d6955cae_NeikiAnalytics.exe 2920 devbodloc.exe 1976 705c3235d6fc1e0b0924456aba0101ce50e432aa76197b946ce39c63d6955cae_NeikiAnalytics.exe 2920 devbodloc.exe 1976 705c3235d6fc1e0b0924456aba0101ce50e432aa76197b946ce39c63d6955cae_NeikiAnalytics.exe 2920 devbodloc.exe 1976 705c3235d6fc1e0b0924456aba0101ce50e432aa76197b946ce39c63d6955cae_NeikiAnalytics.exe 2920 devbodloc.exe 1976 705c3235d6fc1e0b0924456aba0101ce50e432aa76197b946ce39c63d6955cae_NeikiAnalytics.exe 2920 devbodloc.exe 1976 705c3235d6fc1e0b0924456aba0101ce50e432aa76197b946ce39c63d6955cae_NeikiAnalytics.exe 2920 devbodloc.exe 1976 705c3235d6fc1e0b0924456aba0101ce50e432aa76197b946ce39c63d6955cae_NeikiAnalytics.exe 2920 devbodloc.exe 1976 705c3235d6fc1e0b0924456aba0101ce50e432aa76197b946ce39c63d6955cae_NeikiAnalytics.exe 2920 devbodloc.exe 1976 705c3235d6fc1e0b0924456aba0101ce50e432aa76197b946ce39c63d6955cae_NeikiAnalytics.exe 2920 devbodloc.exe 1976 705c3235d6fc1e0b0924456aba0101ce50e432aa76197b946ce39c63d6955cae_NeikiAnalytics.exe 2920 devbodloc.exe 1976 705c3235d6fc1e0b0924456aba0101ce50e432aa76197b946ce39c63d6955cae_NeikiAnalytics.exe 2920 devbodloc.exe 1976 705c3235d6fc1e0b0924456aba0101ce50e432aa76197b946ce39c63d6955cae_NeikiAnalytics.exe 2920 devbodloc.exe 1976 705c3235d6fc1e0b0924456aba0101ce50e432aa76197b946ce39c63d6955cae_NeikiAnalytics.exe 2920 devbodloc.exe 1976 705c3235d6fc1e0b0924456aba0101ce50e432aa76197b946ce39c63d6955cae_NeikiAnalytics.exe 2920 devbodloc.exe 1976 705c3235d6fc1e0b0924456aba0101ce50e432aa76197b946ce39c63d6955cae_NeikiAnalytics.exe 2920 devbodloc.exe 1976 705c3235d6fc1e0b0924456aba0101ce50e432aa76197b946ce39c63d6955cae_NeikiAnalytics.exe 2920 devbodloc.exe 1976 705c3235d6fc1e0b0924456aba0101ce50e432aa76197b946ce39c63d6955cae_NeikiAnalytics.exe 2920 devbodloc.exe 1976 705c3235d6fc1e0b0924456aba0101ce50e432aa76197b946ce39c63d6955cae_NeikiAnalytics.exe 2920 devbodloc.exe 1976 705c3235d6fc1e0b0924456aba0101ce50e432aa76197b946ce39c63d6955cae_NeikiAnalytics.exe 2920 devbodloc.exe 1976 705c3235d6fc1e0b0924456aba0101ce50e432aa76197b946ce39c63d6955cae_NeikiAnalytics.exe 2920 devbodloc.exe 1976 705c3235d6fc1e0b0924456aba0101ce50e432aa76197b946ce39c63d6955cae_NeikiAnalytics.exe 2920 devbodloc.exe 1976 705c3235d6fc1e0b0924456aba0101ce50e432aa76197b946ce39c63d6955cae_NeikiAnalytics.exe 2920 devbodloc.exe 1976 705c3235d6fc1e0b0924456aba0101ce50e432aa76197b946ce39c63d6955cae_NeikiAnalytics.exe 2920 devbodloc.exe 1976 705c3235d6fc1e0b0924456aba0101ce50e432aa76197b946ce39c63d6955cae_NeikiAnalytics.exe 2920 devbodloc.exe 1976 705c3235d6fc1e0b0924456aba0101ce50e432aa76197b946ce39c63d6955cae_NeikiAnalytics.exe 2920 devbodloc.exe 1976 705c3235d6fc1e0b0924456aba0101ce50e432aa76197b946ce39c63d6955cae_NeikiAnalytics.exe 2920 devbodloc.exe 1976 705c3235d6fc1e0b0924456aba0101ce50e432aa76197b946ce39c63d6955cae_NeikiAnalytics.exe 2920 devbodloc.exe 1976 705c3235d6fc1e0b0924456aba0101ce50e432aa76197b946ce39c63d6955cae_NeikiAnalytics.exe 2920 devbodloc.exe 1976 705c3235d6fc1e0b0924456aba0101ce50e432aa76197b946ce39c63d6955cae_NeikiAnalytics.exe 2920 devbodloc.exe 1976 705c3235d6fc1e0b0924456aba0101ce50e432aa76197b946ce39c63d6955cae_NeikiAnalytics.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1976 wrote to memory of 2920 1976 705c3235d6fc1e0b0924456aba0101ce50e432aa76197b946ce39c63d6955cae_NeikiAnalytics.exe 28 PID 1976 wrote to memory of 2920 1976 705c3235d6fc1e0b0924456aba0101ce50e432aa76197b946ce39c63d6955cae_NeikiAnalytics.exe 28 PID 1976 wrote to memory of 2920 1976 705c3235d6fc1e0b0924456aba0101ce50e432aa76197b946ce39c63d6955cae_NeikiAnalytics.exe 28 PID 1976 wrote to memory of 2920 1976 705c3235d6fc1e0b0924456aba0101ce50e432aa76197b946ce39c63d6955cae_NeikiAnalytics.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\705c3235d6fc1e0b0924456aba0101ce50e432aa76197b946ce39c63d6955cae_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\705c3235d6fc1e0b0924456aba0101ce50e432aa76197b946ce39c63d6955cae_NeikiAnalytics.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1976 -
C:\UserDot5R\devbodloc.exeC:\UserDot5R\devbodloc.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2920
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
837KB
MD55a185fad398e14b086321709f4f4e875
SHA1f9566c1e90abb5759c45dd441769f352440bebad
SHA25656ce6ebdc9f5939a227b0074e15ce22ea9769c5fe182aa9e3f0ce5c2b611a96b
SHA512f1056599c1814fee0c09f5e20d8f53e11b330cdd5ec6fc329d5d0fd6f59e714bd55f380c07c5d02322718ee3620131caf7f6696afe692ea9d4dcaa09d18e65fe
-
Filesize
2.7MB
MD5345d41b778c70c47ee07d2b8a82df385
SHA1420430276abd3c253409a7a6347c10028fa304de
SHA2568fb778d0057ef2d223789cb33bd6f989f4039bb4257d5d5f6f9facadf7010f2a
SHA512509161b6cc7b0edcfc17cfc42b776656700a6c1b80edb8d505318a8a68996a04d90cfee7a534ce7cb4d01d6956682f2f31dd5f2184ba1eb8d01b381178a00443
-
Filesize
208B
MD586f7a60c142b7a14a8a87307f4ee7896
SHA1be2809e18e93d50c1202d8a29ecd1045a1caf3a5
SHA256dad4105c79cc00803c2877eb49e202c147b2f35cc6fa8e59035f0095ada89ec3
SHA512f48fc90af2a87f113970d30027bd813904b41612d7629478f1857851e32028c602de19fb42808cba65836f8be60f732e45ab14cb50ee2505acd634cb8a7d0c9d
-
Filesize
2.7MB
MD53b6c989bc3a7d85a909cfd2bcd06bd8a
SHA1e6454a0e07c43a18e305b70358ab3458fc9f97c9
SHA256dcf2bf177d9cc467824dbb1e963922648314b4ee27845466d2434d479aaf593a
SHA512c5217ae7f9b50e1ccbf4932d851c9ecf6dde23d598ca63ae4b526465034ba05a6c309d980ec5ef05c09d88490aac973c1fb3491bfe73f1f4da7b3cc701b72209