Analysis
-
max time kernel
51s -
max time network
51s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
24-06-2024 20:58
Static task
static1
Behavioral task
behavioral1
Sample
02d1da142850d8a3498ab6a2703e386a8a1b8386ad2c9f487f17482015c8074e_NeikiAnalytics.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
02d1da142850d8a3498ab6a2703e386a8a1b8386ad2c9f487f17482015c8074e_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
02d1da142850d8a3498ab6a2703e386a8a1b8386ad2c9f487f17482015c8074e_NeikiAnalytics.exe
-
Size
7.0MB
-
MD5
c6c1d15625dd359bda30d90f77229730
-
SHA1
e500b051e7562ed7daf598e975a3cc53eb3e048c
-
SHA256
02d1da142850d8a3498ab6a2703e386a8a1b8386ad2c9f487f17482015c8074e
-
SHA512
1ba3a2450f2b46f94fd0c0b926f698da6284ebc549167696f727ab9387acdf9f74776f8acc5a91abc0da57d58705bdb02c9557356002d6f542cdb2fe722099cc
-
SSDEEP
98304:BKP0BVz9DqrVDGYG9zWdYtgg5blzoa8kHorAa3riymKA4JrJrHv9QciYZ0MNCrGG:BKPmVz9eJPYmUb90kHC0NYJbvRCrXgaV
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 4572 mirxkpn.exe -
Executes dropped EXE 2 IoCs
pid Process 4572 mirxkpn.exe 3288 176¸´¹ÅС¼«Æ·.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3288 176¸´¹ÅС¼«Æ·.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3288 176¸´¹ÅС¼«Æ·.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1088 wrote to memory of 4572 1088 02d1da142850d8a3498ab6a2703e386a8a1b8386ad2c9f487f17482015c8074e_NeikiAnalytics.exe 81 PID 1088 wrote to memory of 4572 1088 02d1da142850d8a3498ab6a2703e386a8a1b8386ad2c9f487f17482015c8074e_NeikiAnalytics.exe 81 PID 1088 wrote to memory of 4572 1088 02d1da142850d8a3498ab6a2703e386a8a1b8386ad2c9f487f17482015c8074e_NeikiAnalytics.exe 81 PID 4572 wrote to memory of 3288 4572 mirxkpn.exe 82 PID 4572 wrote to memory of 3288 4572 mirxkpn.exe 82 PID 4572 wrote to memory of 3288 4572 mirxkpn.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\02d1da142850d8a3498ab6a2703e386a8a1b8386ad2c9f487f17482015c8074e_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\02d1da142850d8a3498ab6a2703e386a8a1b8386ad2c9f487f17482015c8074e_NeikiAnalytics.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1088 -
C:\mirxkpn.exeC:\mirxkpn.exe C:\Users\Admin\AppData\Local\Temp\02d1da142850d8a3498ab6a2703e386a8a1b8386ad2c9f487f17482015c8074e_NeikiAnalytics.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4572 -
C:\Users\Admin\Desktop\176¸´¹ÅС¼«Æ·.exeC:\Users\Admin\Desktop\176¸´¹ÅС¼«Æ·.exe3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:3288
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6.9MB
MD5809d5ab576d38f680c072a75f2451b1d
SHA1cae8d330a2992fd48eda7f22c77d0f506d7b3476
SHA2562006cc931b5e063bee89d8e100e25498f7531afdeeb4116379207559091b4c37
SHA51215f5c8175468bfeeb39adbdb16199203ac8c7d33fdea821da85a47fc4fdc021ad8837a3df6e8d1aef4ec11880d54fa46f3960c8fd5bd1ebe3d32ed917cebbdd7
-
Filesize
7.0MB
MD5c6c1d15625dd359bda30d90f77229730
SHA1e500b051e7562ed7daf598e975a3cc53eb3e048c
SHA25602d1da142850d8a3498ab6a2703e386a8a1b8386ad2c9f487f17482015c8074e
SHA5121ba3a2450f2b46f94fd0c0b926f698da6284ebc549167696f727ab9387acdf9f74776f8acc5a91abc0da57d58705bdb02c9557356002d6f542cdb2fe722099cc