Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
28-06-2024 00:30
Behavioral task
behavioral1
Sample
4c312c136c3d3630e6a7819073151abe2bec245e293fa02c864d455a8c5362f4_NeikiAnalytics.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
4c312c136c3d3630e6a7819073151abe2bec245e293fa02c864d455a8c5362f4_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
4c312c136c3d3630e6a7819073151abe2bec245e293fa02c864d455a8c5362f4_NeikiAnalytics.exe
-
Size
2.6MB
-
MD5
cd5e3e4dae1c6a68f46963b0feb76770
-
SHA1
d2bac6409ec52448379093ba990f4edde2624eb7
-
SHA256
4c312c136c3d3630e6a7819073151abe2bec245e293fa02c864d455a8c5362f4
-
SHA512
b5c9596501801e896d6a49e8f65d0ecc5a721bfc4e5530d468560a9112c0623175012b7acfe18594fe8d0a647e2b89a9c20380305f14a78f2d824a329cff121e
-
SSDEEP
12288:qCMYGmkOqYYf01bInqzHWI9WFEeapp3TXn8YoWSXLGzEoqAb8/DjUHhsAennZ5/I:qCmIYSbEDJUrTDw6aZWjvFtta8BuOh
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation 4c312c136c3d3630e6a7819073151abe2bec245e293fa02c864d455a8c5362f4_NeikiAnalytics.exe -
Executes dropped EXE 3 IoCs
pid Process 4764 taskmgr.exe 432 taskmgr.exe 884 taskmgr.exe -
resource yara_rule behavioral2/memory/3960-1-0x0000000000400000-0x0000000000699000-memory.dmp upx behavioral2/files/0x000700000002340e-16.dat upx behavioral2/memory/3960-30-0x0000000000400000-0x0000000000699000-memory.dmp upx behavioral2/memory/884-37-0x0000000000400000-0x0000000000409000-memory.dmp upx behavioral2/memory/884-41-0x0000000000400000-0x0000000000409000-memory.dmp upx behavioral2/memory/884-40-0x0000000000400000-0x0000000000409000-memory.dmp upx behavioral2/memory/4764-43-0x0000000000400000-0x0000000000699000-memory.dmp upx behavioral2/memory/884-57-0x0000000000400000-0x0000000000409000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Windows Task Manager = "C:\\Users\\Admin\\AppData\\Roaming\\Windows Task Manager\\taskmgr.exe" reg.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 4764 set thread context of 432 4764 taskmgr.exe 85 PID 4764 set thread context of 884 4764 taskmgr.exe 86 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 432 taskmgr.exe 432 taskmgr.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 432 taskmgr.exe Token: SeDebugPrivilege 432 taskmgr.exe Token: SeDebugPrivilege 884 taskmgr.exe Token: SeDebugPrivilege 2480 iexplore.exe Token: SeDebugPrivilege 2480 iexplore.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 3960 4c312c136c3d3630e6a7819073151abe2bec245e293fa02c864d455a8c5362f4_NeikiAnalytics.exe 4764 taskmgr.exe 884 taskmgr.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3960 wrote to memory of 2284 3960 4c312c136c3d3630e6a7819073151abe2bec245e293fa02c864d455a8c5362f4_NeikiAnalytics.exe 80 PID 3960 wrote to memory of 2284 3960 4c312c136c3d3630e6a7819073151abe2bec245e293fa02c864d455a8c5362f4_NeikiAnalytics.exe 80 PID 3960 wrote to memory of 2284 3960 4c312c136c3d3630e6a7819073151abe2bec245e293fa02c864d455a8c5362f4_NeikiAnalytics.exe 80 PID 2284 wrote to memory of 2844 2284 cmd.exe 83 PID 2284 wrote to memory of 2844 2284 cmd.exe 83 PID 2284 wrote to memory of 2844 2284 cmd.exe 83 PID 3960 wrote to memory of 4764 3960 4c312c136c3d3630e6a7819073151abe2bec245e293fa02c864d455a8c5362f4_NeikiAnalytics.exe 84 PID 3960 wrote to memory of 4764 3960 4c312c136c3d3630e6a7819073151abe2bec245e293fa02c864d455a8c5362f4_NeikiAnalytics.exe 84 PID 3960 wrote to memory of 4764 3960 4c312c136c3d3630e6a7819073151abe2bec245e293fa02c864d455a8c5362f4_NeikiAnalytics.exe 84 PID 4764 wrote to memory of 432 4764 taskmgr.exe 85 PID 4764 wrote to memory of 432 4764 taskmgr.exe 85 PID 4764 wrote to memory of 432 4764 taskmgr.exe 85 PID 4764 wrote to memory of 432 4764 taskmgr.exe 85 PID 4764 wrote to memory of 432 4764 taskmgr.exe 85 PID 4764 wrote to memory of 432 4764 taskmgr.exe 85 PID 4764 wrote to memory of 432 4764 taskmgr.exe 85 PID 4764 wrote to memory of 432 4764 taskmgr.exe 85 PID 4764 wrote to memory of 432 4764 taskmgr.exe 85 PID 4764 wrote to memory of 432 4764 taskmgr.exe 85 PID 4764 wrote to memory of 432 4764 taskmgr.exe 85 PID 4764 wrote to memory of 432 4764 taskmgr.exe 85 PID 4764 wrote to memory of 432 4764 taskmgr.exe 85 PID 4764 wrote to memory of 884 4764 taskmgr.exe 86 PID 4764 wrote to memory of 884 4764 taskmgr.exe 86 PID 4764 wrote to memory of 884 4764 taskmgr.exe 86 PID 4764 wrote to memory of 884 4764 taskmgr.exe 86 PID 4764 wrote to memory of 884 4764 taskmgr.exe 86 PID 4764 wrote to memory of 884 4764 taskmgr.exe 86 PID 4764 wrote to memory of 884 4764 taskmgr.exe 86 PID 4764 wrote to memory of 884 4764 taskmgr.exe 86 PID 432 wrote to memory of 2480 432 taskmgr.exe 87 PID 432 wrote to memory of 2480 432 taskmgr.exe 87 PID 432 wrote to memory of 2480 432 taskmgr.exe 87 PID 432 wrote to memory of 2480 432 taskmgr.exe 87 PID 432 wrote to memory of 2480 432 taskmgr.exe 87 PID 432 wrote to memory of 2480 432 taskmgr.exe 87 PID 432 wrote to memory of 2480 432 taskmgr.exe 87 PID 432 wrote to memory of 2480 432 taskmgr.exe 87 PID 432 wrote to memory of 2480 432 taskmgr.exe 87 PID 432 wrote to memory of 2480 432 taskmgr.exe 87 PID 432 wrote to memory of 2480 432 taskmgr.exe 87 PID 432 wrote to memory of 2480 432 taskmgr.exe 87 PID 432 wrote to memory of 2480 432 taskmgr.exe 87 PID 432 wrote to memory of 2480 432 taskmgr.exe 87 PID 432 wrote to memory of 2480 432 taskmgr.exe 87 PID 432 wrote to memory of 2480 432 taskmgr.exe 87 PID 432 wrote to memory of 2480 432 taskmgr.exe 87 PID 432 wrote to memory of 2480 432 taskmgr.exe 87 PID 432 wrote to memory of 2480 432 taskmgr.exe 87 PID 432 wrote to memory of 2480 432 taskmgr.exe 87 PID 432 wrote to memory of 2480 432 taskmgr.exe 87 PID 432 wrote to memory of 2480 432 taskmgr.exe 87 PID 432 wrote to memory of 2480 432 taskmgr.exe 87 PID 432 wrote to memory of 2480 432 taskmgr.exe 87 PID 432 wrote to memory of 2480 432 taskmgr.exe 87 PID 432 wrote to memory of 2480 432 taskmgr.exe 87 PID 432 wrote to memory of 2480 432 taskmgr.exe 87 PID 432 wrote to memory of 2480 432 taskmgr.exe 87 PID 432 wrote to memory of 2480 432 taskmgr.exe 87 PID 432 wrote to memory of 2480 432 taskmgr.exe 87 PID 432 wrote to memory of 2480 432 taskmgr.exe 87 PID 432 wrote to memory of 2480 432 taskmgr.exe 87 PID 432 wrote to memory of 2480 432 taskmgr.exe 87 PID 432 wrote to memory of 2480 432 taskmgr.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\4c312c136c3d3630e6a7819073151abe2bec245e293fa02c864d455a8c5362f4_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\4c312c136c3d3630e6a7819073151abe2bec245e293fa02c864d455a8c5362f4_NeikiAnalytics.exe"1⤵
- Checks computer location settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3960 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\ZEDol.bat" "2⤵
- Suspicious use of WriteProcessMemory
PID:2284 -
C:\Windows\SysWOW64\reg.exeREG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "Windows Task Manager" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\Windows Task Manager\taskmgr.exe" /f3⤵
- Adds Run key to start application
PID:2844
-
-
-
C:\Users\Admin\AppData\Roaming\Windows Task Manager\taskmgr.exe"C:\Users\Admin\AppData\Roaming\Windows Task Manager\taskmgr.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4764 -
C:\Users\Admin\AppData\Roaming\Windows Task Manager\taskmgr.exe"C:\Users\Admin\AppData\Roaming\Windows Task Manager\taskmgr.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:432 -
C:\Program Files (x86)\Internet Explorer\iexplore.exe"C:\Program Files (x86)\Internet Explorer\iexplore.exe" "C:\Users\Admin\AppData\Roaming\Windows Task Manager\taskmgr.exe"4⤵
- Suspicious use of AdjustPrivilegeToken
PID:2480
-
-
-
C:\Users\Admin\AppData\Roaming\Windows Task Manager\taskmgr.exe"C:\Users\Admin\AppData\Roaming\Windows Task Manager\taskmgr.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:884
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
170B
MD5e612e66a93150f09e419dc23aa6ad30b
SHA1aac69550ea153ff1b4550261675221c144b2da54
SHA256c505222bbd299a60df2b8c9049866bc49e355f117a12f55fb1f5406d882f14ce
SHA51251b236bc6b7c02a7babf61a1918a8f554f3d69762051943c8f712a68a7c1494e0a979efd6ebe49f1b4daae47d0e4c12652dcb16ac3e500565ba2dcbd16764e9f
-
Filesize
2.6MB
MD585d8ded2d2c0802ddf7d973ec951b1fa
SHA1c12755be8556ca14ffb85fdbd3ae90c452b10d8f
SHA2560680446b4474985652e884c1c4002f55b1970c3343082ba0625f7e10f11425e4
SHA512adf2f8fbd88e276d000b4d3aee289a171aba9072b03f00f9848e088704a8264b37feba6bd5c0a593a34a3f73601fdfa6126c30f35fe9a9ba4e1a94b1364a9787