Analysis
-
max time kernel
149s -
max time network
101s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
27-06-2024 12:04
Static task
static1
Behavioral task
behavioral1
Sample
83f88258bdb36779470dcb270f545e5f2074ebfe46bfbf6206f3a6215fc57878_NeikiAnalytics.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
83f88258bdb36779470dcb270f545e5f2074ebfe46bfbf6206f3a6215fc57878_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
83f88258bdb36779470dcb270f545e5f2074ebfe46bfbf6206f3a6215fc57878_NeikiAnalytics.exe
-
Size
32KB
-
MD5
7c639424b1d7c058a2f8f38850821520
-
SHA1
88cf6580e9328e752a12b65265f78666dfbb84c6
-
SHA256
83f88258bdb36779470dcb270f545e5f2074ebfe46bfbf6206f3a6215fc57878
-
SHA512
5eb054ca991d06b1f5b7ccce1718580108f234c087e4177ee5c7b7be71b7e27882ab749a035044f402d4c29fa6295fec9843a0207e82cb43d76ce1529cd3ceb6
-
SSDEEP
768:RtkSEpBYWOqpRz+Oza7hYUtXz8z7nIV9dr2V9r7Dk9J:LkBpvTz+B7xYY/KV9Q9J
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
winver.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\03CEBE54 = "C:\\Users\\Admin\\AppData\\Roaming\\03CEBE54\\bin.exe" winver.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 3268 3576 WerFault.exe winver.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
winver.exepid process 3576 winver.exe 3576 winver.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
Explorer.EXEdescription pid process Token: SeShutdownPrivilege 3556 Explorer.EXE Token: SeCreatePagefilePrivilege 3556 Explorer.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
winver.exepid process 3576 winver.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
83f88258bdb36779470dcb270f545e5f2074ebfe46bfbf6206f3a6215fc57878_NeikiAnalytics.exewinver.exedescription pid process target process PID 3888 wrote to memory of 3576 3888 83f88258bdb36779470dcb270f545e5f2074ebfe46bfbf6206f3a6215fc57878_NeikiAnalytics.exe winver.exe PID 3888 wrote to memory of 3576 3888 83f88258bdb36779470dcb270f545e5f2074ebfe46bfbf6206f3a6215fc57878_NeikiAnalytics.exe winver.exe PID 3888 wrote to memory of 3576 3888 83f88258bdb36779470dcb270f545e5f2074ebfe46bfbf6206f3a6215fc57878_NeikiAnalytics.exe winver.exe PID 3888 wrote to memory of 3576 3888 83f88258bdb36779470dcb270f545e5f2074ebfe46bfbf6206f3a6215fc57878_NeikiAnalytics.exe winver.exe PID 3576 wrote to memory of 3556 3576 winver.exe Explorer.EXE PID 3576 wrote to memory of 2580 3576 winver.exe sihost.exe
Processes
-
C:\Windows\system32\sihost.exesihost.exe1⤵
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\83f88258bdb36779470dcb270f545e5f2074ebfe46bfbf6206f3a6215fc57878_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\83f88258bdb36779470dcb270f545e5f2074ebfe46bfbf6206f3a6215fc57878_NeikiAnalytics.exe"2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\winver.exewinver3⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3576 -s 3524⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 3576 -ip 35761⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/2580-12-0x0000000000520000-0x0000000000526000-memory.dmpFilesize
24KB
-
memory/3556-3-0x0000000000B70000-0x0000000000B76000-memory.dmpFilesize
24KB
-
memory/3556-2-0x0000000000B70000-0x0000000000B76000-memory.dmpFilesize
24KB
-
memory/3556-6-0x00007FF90C06D000-0x00007FF90C06E000-memory.dmpFilesize
4KB
-
memory/3576-5-0x0000000076F12000-0x0000000076F13000-memory.dmpFilesize
4KB
-
memory/3576-7-0x00007FF90BFD0000-0x00007FF90C1C5000-memory.dmpFilesize
2.0MB
-
memory/3576-10-0x00000000006A0000-0x00000000006A6000-memory.dmpFilesize
24KB
-
memory/3576-13-0x00000000006A0000-0x00000000006A6000-memory.dmpFilesize
24KB
-
memory/3888-0-0x0000000000400000-0x0000000000414000-memory.dmpFilesize
80KB
-
memory/3888-1-0x0000000000680000-0x0000000000681000-memory.dmpFilesize
4KB
-
memory/3888-4-0x0000000002380000-0x0000000002D80000-memory.dmpFilesize
10.0MB
-
memory/3888-8-0x0000000000400000-0x0000000000414000-memory.dmpFilesize
80KB