Analysis
-
max time kernel
151s -
max time network
159s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
28-06-2024 13:09
Static task
static1
Behavioral task
behavioral1
Sample
0208ce58440e22189132e995568b36519b3e8233a98d3fd384a2e27406638487_NeikiAnalytics.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
0208ce58440e22189132e995568b36519b3e8233a98d3fd384a2e27406638487_NeikiAnalytics.exe
Resource
win10v2004-20240226-en
General
-
Target
0208ce58440e22189132e995568b36519b3e8233a98d3fd384a2e27406638487_NeikiAnalytics.exe
-
Size
225KB
-
MD5
dc9862e215fcef69bce013c37a0a6e80
-
SHA1
b82a77b988adb1cd883806d4bd1a6fe8898f027c
-
SHA256
0208ce58440e22189132e995568b36519b3e8233a98d3fd384a2e27406638487
-
SHA512
7704054733bbb62451de79edc19e179ef398e41c439ddbe50f4f3ca97dbe005767f9c0ae0ec6749e140025c9a890bb2f638b1182000411e63b301db65ec5ab93
-
SSDEEP
6144:xA2P27yTAnKGw0hjFhSR/W11yAJ9v0pMtRCpYM:xATuTAnKGwUAW3ycQqgf
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
winver.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\CFFF5C3A = "C:\\Users\\Admin\\AppData\\Roaming\\CFFF5C3A\\bin.exe" winver.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies data under HKEY_USERS 1 IoCs
Processes:
svchost.exedescription ioc process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@%SystemRoot%\system32\hnetcfgclient.dll,-201 = "HNetCfg Client" svchost.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
winver.exepid process 4600 winver.exe 4600 winver.exe 4600 winver.exe 4600 winver.exe 4600 winver.exe 4600 winver.exe 4600 winver.exe 4600 winver.exe 4600 winver.exe 4600 winver.exe 4600 winver.exe 4600 winver.exe 4600 winver.exe 4600 winver.exe 4600 winver.exe 4600 winver.exe 4600 winver.exe 4600 winver.exe 4600 winver.exe 4600 winver.exe 4600 winver.exe 4600 winver.exe 4600 winver.exe 4600 winver.exe 4600 winver.exe 4600 winver.exe 4600 winver.exe 4600 winver.exe 4600 winver.exe 4600 winver.exe 4600 winver.exe 4600 winver.exe 4600 winver.exe 4600 winver.exe 4600 winver.exe 4600 winver.exe 4600 winver.exe 4600 winver.exe 4600 winver.exe 4600 winver.exe 4600 winver.exe 4600 winver.exe 4600 winver.exe 4600 winver.exe 4600 winver.exe 4600 winver.exe 4600 winver.exe 4600 winver.exe 4600 winver.exe 4600 winver.exe 4600 winver.exe 4600 winver.exe 4600 winver.exe 4600 winver.exe 4600 winver.exe 4600 winver.exe 4600 winver.exe 4600 winver.exe 4600 winver.exe 4600 winver.exe 4600 winver.exe 4600 winver.exe 4600 winver.exe 4600 winver.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
winver.exepid process 4600 winver.exe -
Suspicious use of WriteProcessMemory 27 IoCs
Processes:
0208ce58440e22189132e995568b36519b3e8233a98d3fd384a2e27406638487_NeikiAnalytics.exewinver.exedescription pid process target process PID 3292 wrote to memory of 4600 3292 0208ce58440e22189132e995568b36519b3e8233a98d3fd384a2e27406638487_NeikiAnalytics.exe winver.exe PID 3292 wrote to memory of 4600 3292 0208ce58440e22189132e995568b36519b3e8233a98d3fd384a2e27406638487_NeikiAnalytics.exe winver.exe PID 3292 wrote to memory of 4600 3292 0208ce58440e22189132e995568b36519b3e8233a98d3fd384a2e27406638487_NeikiAnalytics.exe winver.exe PID 3292 wrote to memory of 4600 3292 0208ce58440e22189132e995568b36519b3e8233a98d3fd384a2e27406638487_NeikiAnalytics.exe winver.exe PID 4600 wrote to memory of 3332 4600 winver.exe Explorer.EXE PID 4600 wrote to memory of 2572 4600 winver.exe sihost.exe PID 4600 wrote to memory of 2580 4600 winver.exe svchost.exe PID 4600 wrote to memory of 2824 4600 winver.exe taskhostw.exe PID 4600 wrote to memory of 3332 4600 winver.exe Explorer.EXE PID 4600 wrote to memory of 3512 4600 winver.exe svchost.exe PID 4600 wrote to memory of 3712 4600 winver.exe DllHost.exe PID 4600 wrote to memory of 3856 4600 winver.exe StartMenuExperienceHost.exe PID 4600 wrote to memory of 3932 4600 winver.exe RuntimeBroker.exe PID 4600 wrote to memory of 4016 4600 winver.exe SearchApp.exe PID 4600 wrote to memory of 3444 4600 winver.exe RuntimeBroker.exe PID 4600 wrote to memory of 4704 4600 winver.exe RuntimeBroker.exe PID 4600 wrote to memory of 4332 4600 winver.exe TextInputHost.exe PID 4600 wrote to memory of 2368 4600 winver.exe RuntimeBroker.exe PID 4600 wrote to memory of 3008 4600 winver.exe msedge.exe PID 4600 wrote to memory of 4916 4600 winver.exe msedge.exe PID 4600 wrote to memory of 3580 4600 winver.exe msedge.exe PID 4600 wrote to memory of 2724 4600 winver.exe msedge.exe PID 4600 wrote to memory of 3452 4600 winver.exe msedge.exe PID 4600 wrote to memory of 3032 4600 winver.exe msedge.exe PID 4600 wrote to memory of 3920 4600 winver.exe msedge.exe PID 4600 wrote to memory of 3292 4600 winver.exe 0208ce58440e22189132e995568b36519b3e8233a98d3fd384a2e27406638487_NeikiAnalytics.exe PID 4600 wrote to memory of 4940 4600 winver.exe msedge.exe
Processes
-
C:\Windows\system32\sihost.exesihost.exe1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc1⤵
-
C:\Windows\system32\taskhostw.exetaskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}1⤵
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
-
C:\Users\Admin\AppData\Local\Temp\0208ce58440e22189132e995568b36519b3e8233a98d3fd384a2e27406638487_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\0208ce58440e22189132e995568b36519b3e8233a98d3fd384a2e27406638487_NeikiAnalytics.exe"2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\winver.exewinver3⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k ClipboardSvcGroup -p -s cbdhsvc1⤵
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵
-
C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\InputApp\TextInputHost.exe"C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\InputApp\TextInputHost.exe" -ServerName:InputApp.AppX9jnwykgrccxc8by3hsrsh07r423xzvav.mca1⤵
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --no-startup-window1⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=122.0.6261.70 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=122.0.2365.52 --initial-client-data=0x23c,0x240,0x244,0x238,0x260,0x7ffc9b282e98,0x7ffc9b282ea4,0x7ffc9b282eb02⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAAAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --mojo-platform-channel-handle=2652 --field-trial-handle=2656,i,16940681401824032220,151921362336696246,262144 --variations-seed-version /prefetch:22⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --mojo-platform-channel-handle=2756 --field-trial-handle=2656,i,16940681401824032220,151921362336696246,262144 --variations-seed-version /prefetch:32⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --mojo-platform-channel-handle=2860 --field-trial-handle=2656,i,16940681401824032220,151921362336696246,262144 --variations-seed-version /prefetch:82⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --instant-process --no-appcompat-clear --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=11 --mojo-platform-channel-handle=5424 --field-trial-handle=2656,i,16940681401824032220,151921362336696246,262144 --variations-seed-version /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --no-appcompat-clear --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=12 --mojo-platform-channel-handle=5580 --field-trial-handle=2656,i,16940681401824032220,151921362336696246,262144 --variations-seed-version /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=5072 --field-trial-handle=2656,i,16940681401824032220,151921362336696246,262144 --variations-seed-version /prefetch:82⤵
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s Netman1⤵
- Modifies data under HKEY_USERS
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/2368-38-0x00000000001E0000-0x00000000001E6000-memory.dmpFilesize
24KB
-
memory/2368-22-0x00000000001E0000-0x00000000001E6000-memory.dmpFilesize
24KB
-
memory/2572-29-0x00000000007E0000-0x00000000007E6000-memory.dmpFilesize
24KB
-
memory/2572-10-0x00000000007E0000-0x00000000007E6000-memory.dmpFilesize
24KB
-
memory/2580-11-0x0000000000330000-0x0000000000336000-memory.dmpFilesize
24KB
-
memory/2580-27-0x0000000000330000-0x0000000000336000-memory.dmpFilesize
24KB
-
memory/2824-12-0x00000000008A0000-0x00000000008A6000-memory.dmpFilesize
24KB
-
memory/2824-34-0x00000000008A0000-0x00000000008A6000-memory.dmpFilesize
24KB
-
memory/3292-1-0x0000000004590000-0x0000000004BE8000-memory.dmpFilesize
6.3MB
-
memory/3292-4-0x0000000003E40000-0x0000000003E41000-memory.dmpFilesize
4KB
-
memory/3292-3-0x0000000003E40000-0x0000000003E41000-memory.dmpFilesize
4KB
-
memory/3292-26-0x0000000004590000-0x0000000004BE8000-memory.dmpFilesize
6.3MB
-
memory/3292-2-0x0000000003E40000-0x0000000003E41000-memory.dmpFilesize
4KB
-
memory/3292-25-0x0000000000400000-0x000000000043C000-memory.dmpFilesize
240KB
-
memory/3332-9-0x0000000000AA0000-0x0000000000AA6000-memory.dmpFilesize
24KB
-
memory/3332-28-0x0000000000AC0000-0x0000000000AC6000-memory.dmpFilesize
24KB
-
memory/3332-13-0x0000000000AC0000-0x0000000000AC6000-memory.dmpFilesize
24KB
-
memory/3332-6-0x0000000000AA0000-0x0000000000AA6000-memory.dmpFilesize
24KB
-
memory/3444-19-0x0000000000600000-0x0000000000606000-memory.dmpFilesize
24KB
-
memory/3444-37-0x0000000000600000-0x0000000000606000-memory.dmpFilesize
24KB
-
memory/3512-14-0x00000000005B0000-0x00000000005B6000-memory.dmpFilesize
24KB
-
memory/3512-32-0x00000000005B0000-0x00000000005B6000-memory.dmpFilesize
24KB
-
memory/3712-33-0x0000000000860000-0x0000000000866000-memory.dmpFilesize
24KB
-
memory/3712-15-0x0000000000860000-0x0000000000866000-memory.dmpFilesize
24KB
-
memory/3856-31-0x0000000000070000-0x0000000000076000-memory.dmpFilesize
24KB
-
memory/3856-16-0x0000000000070000-0x0000000000076000-memory.dmpFilesize
24KB
-
memory/3932-30-0x0000000000900000-0x0000000000906000-memory.dmpFilesize
24KB
-
memory/3932-17-0x0000000000900000-0x0000000000906000-memory.dmpFilesize
24KB
-
memory/4016-18-0x0000000000C60000-0x0000000000C66000-memory.dmpFilesize
24KB
-
memory/4332-21-0x0000000000850000-0x0000000000856000-memory.dmpFilesize
24KB
-
memory/4332-35-0x0000000000850000-0x0000000000856000-memory.dmpFilesize
24KB
-
memory/4600-23-0x0000000002AE0000-0x0000000002AE6000-memory.dmpFilesize
24KB
-
memory/4600-7-0x0000000002960000-0x0000000002966000-memory.dmpFilesize
24KB
-
memory/4600-40-0x0000000002AE0000-0x0000000002AE6000-memory.dmpFilesize
24KB
-
memory/4704-20-0x00000000007E0000-0x00000000007E6000-memory.dmpFilesize
24KB
-
memory/4704-36-0x00000000007E0000-0x00000000007E6000-memory.dmpFilesize
24KB