Analysis
-
max time kernel
147s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
28/06/2024, 23:55
Static task
static1
Behavioral task
behavioral1
Sample
357e826628e7ff17de461568dd5e589d6c7f44b77ea218f92b100a23aca1cf1b_NeikiAnalytics.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
357e826628e7ff17de461568dd5e589d6c7f44b77ea218f92b100a23aca1cf1b_NeikiAnalytics.exe
Resource
win10v2004-20240611-en
General
-
Target
357e826628e7ff17de461568dd5e589d6c7f44b77ea218f92b100a23aca1cf1b_NeikiAnalytics.exe
-
Size
688KB
-
MD5
71085241bc90a1b54107e258884b26b0
-
SHA1
866142121778ed0e6ae44c0563e6c4b14ce024d5
-
SHA256
357e826628e7ff17de461568dd5e589d6c7f44b77ea218f92b100a23aca1cf1b
-
SHA512
f69de7ebd6184f2eeb883b9e73a762d6c952daa3a345387775fdf2fdef04b00c59d738df671ae7a33c4f68792db490efbbfd511bf47930087e14c24da5ea2328
-
SSDEEP
12288:S1/aGLDCMNpNAkoSzZWD8ayX2MQCw7D0n5wdov5RNC2TSDS0YnZRZQsQG2n7Y:S1/aGLDCM4D8ayGMLqdov5RNC2TSDS0K
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3008 vgejy.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3665033694-1447845302-680750983-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Microsoft® Windows® Operating System = "C:\\ProgramData\\vgejy.exe" vgejy.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2044 wrote to memory of 3008 2044 357e826628e7ff17de461568dd5e589d6c7f44b77ea218f92b100a23aca1cf1b_NeikiAnalytics.exe 90 PID 2044 wrote to memory of 3008 2044 357e826628e7ff17de461568dd5e589d6c7f44b77ea218f92b100a23aca1cf1b_NeikiAnalytics.exe 90 PID 2044 wrote to memory of 3008 2044 357e826628e7ff17de461568dd5e589d6c7f44b77ea218f92b100a23aca1cf1b_NeikiAnalytics.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\357e826628e7ff17de461568dd5e589d6c7f44b77ea218f92b100a23aca1cf1b_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\357e826628e7ff17de461568dd5e589d6c7f44b77ea218f92b100a23aca1cf1b_NeikiAnalytics.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2044 -
C:\ProgramData\vgejy.exe"C:\ProgramData\vgejy.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:3008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=1308,i,3144109701624127473,12586215149656995128,262144 --variations-seed-version --mojo-platform-channel-handle=4240 /prefetch:81⤵PID:2408
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
688KB
MD58942eb55d157757e6d2c13e26643678a
SHA1a2f771e2a5a9a3ff3b65996f33cad8ce61319954
SHA256a753c06c18d02f8c1914f15894eea2ba7109f77cec9eba0602c15906ce617bb9
SHA512d90484289d0dbb3e8eea376630b7c7dbae3dac04bce66f1e7559d74eac29b9316cc869b316ec4436a0fc7ec99c2badee52c886b6337b239f8806a100f5a1773b
-
Filesize
269KB
MD5ca9dfac0aff393d7ad3732c18bf722be
SHA10bbb7be6293e7fd953293d9e7d5ad0cbfbc81e75
SHA256dc2214022e8be1e51c69f9554ad5e5da74e9a9f7ec8fd2f08b3e5c9f0bb01423
SHA51285d4e203983608671fdeb61cdc7e6bd79389001a4c427f1d473de5298a737e65c6f0c6f1243a64b5608349684a180c79516519632beb33a67b44ff3e446d75c3
-
Filesize
418KB
MD5f7b7d709ea7ccb6b809ebeeea30d6c52
SHA1062438bb6560b542a29a886f8344c4678d40fcc2
SHA2561acfdc079f779c07ef8769ae56f5e4882088d9492958724fd94630d0cc738957
SHA51255bae64b38567f8119ec06caf961e04208deafd1ab879a494e0b2b68271d8e616cf7b8f353bc95ee3c283cfa365c975330fc7106d280b70c632227e20e06dfb0