Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
29/06/2024, 12:28
Static task
static1
Behavioral task
behavioral1
Sample
ab7632d9f027d04574ddbe06bedb7fc2751df074c9bd29af59ed1d406e7f93c9_NeikiAnalytics.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
ab7632d9f027d04574ddbe06bedb7fc2751df074c9bd29af59ed1d406e7f93c9_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
ab7632d9f027d04574ddbe06bedb7fc2751df074c9bd29af59ed1d406e7f93c9_NeikiAnalytics.exe
-
Size
88KB
-
MD5
c9b98951f8968714f90ea401d94a3b90
-
SHA1
85b7427f3dbcff7c62e7b59b0965690fdbae83ef
-
SHA256
ab7632d9f027d04574ddbe06bedb7fc2751df074c9bd29af59ed1d406e7f93c9
-
SHA512
97e32752ae7ca3973332d39c35f346fd25ac21d8aca4c784c4027ed67e5b393688b16407e608f44c3fcf8bd90a201945ccdb3254aefe2dd410500e9744e670b6
-
SSDEEP
1536:ahUDofByDJWbMGcEFLPEPKOJUsy1+VMA:aIofBHbKMP0PvMA
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation explorer.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation ab7632d9f027d04574ddbe06bedb7fc2751df074c9bd29af59ed1d406e7f93c9_NeikiAnalytics.exe -
Executes dropped EXE 4 IoCs
pid Process 2784 explorer.exe 3712 explorer.exe 2532 explorer.exe 1428 explorer.exe -
resource yara_rule behavioral2/memory/3368-2-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/memory/3368-22-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/memory/4460-9-0x0000000002900000-0x0000000002901000-memory.dmp upx behavioral2/memory/3368-4-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/memory/3368-63-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/memory/3712-94-0x0000000000400000-0x000000000040B000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Video Driver = "C:\\Users\\Admin\\AppData\\Roaming\\config\\explorer.exe" reg.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 4460 set thread context of 3368 4460 ab7632d9f027d04574ddbe06bedb7fc2751df074c9bd29af59ed1d406e7f93c9_NeikiAnalytics.exe 81 PID 2784 set thread context of 3712 2784 explorer.exe 89 PID 2784 set thread context of 2532 2784 explorer.exe 90 PID 2532 set thread context of 1428 2532 explorer.exe 93 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 3712 explorer.exe Token: SeDebugPrivilege 3712 explorer.exe Token: SeDebugPrivilege 3712 explorer.exe Token: SeDebugPrivilege 3712 explorer.exe Token: SeDebugPrivilege 3712 explorer.exe Token: SeDebugPrivilege 3712 explorer.exe Token: SeDebugPrivilege 3712 explorer.exe Token: SeDebugPrivilege 3712 explorer.exe Token: SeDebugPrivilege 3712 explorer.exe Token: SeDebugPrivilege 3712 explorer.exe Token: SeDebugPrivilege 3712 explorer.exe Token: SeDebugPrivilege 3712 explorer.exe Token: SeDebugPrivilege 3712 explorer.exe Token: SeDebugPrivilege 3712 explorer.exe Token: SeDebugPrivilege 3712 explorer.exe Token: SeDebugPrivilege 3712 explorer.exe Token: SeDebugPrivilege 3712 explorer.exe Token: SeDebugPrivilege 3712 explorer.exe Token: SeDebugPrivilege 3712 explorer.exe Token: SeDebugPrivilege 3712 explorer.exe Token: SeDebugPrivilege 3712 explorer.exe Token: SeDebugPrivilege 3712 explorer.exe Token: SeDebugPrivilege 3712 explorer.exe Token: SeDebugPrivilege 3712 explorer.exe Token: SeDebugPrivilege 3712 explorer.exe Token: SeDebugPrivilege 3712 explorer.exe Token: SeDebugPrivilege 3712 explorer.exe Token: SeDebugPrivilege 3712 explorer.exe Token: SeDebugPrivilege 3712 explorer.exe Token: SeDebugPrivilege 3712 explorer.exe Token: SeDebugPrivilege 3712 explorer.exe Token: SeDebugPrivilege 3712 explorer.exe Token: SeDebugPrivilege 3712 explorer.exe Token: SeDebugPrivilege 3712 explorer.exe Token: SeDebugPrivilege 3712 explorer.exe Token: SeDebugPrivilege 3712 explorer.exe Token: SeDebugPrivilege 3712 explorer.exe Token: SeDebugPrivilege 3712 explorer.exe Token: SeDebugPrivilege 3712 explorer.exe Token: SeDebugPrivilege 3712 explorer.exe Token: SeDebugPrivilege 3712 explorer.exe Token: SeDebugPrivilege 3712 explorer.exe Token: SeDebugPrivilege 3712 explorer.exe Token: SeDebugPrivilege 3712 explorer.exe Token: SeDebugPrivilege 3712 explorer.exe Token: SeDebugPrivilege 3712 explorer.exe Token: SeDebugPrivilege 3712 explorer.exe Token: SeDebugPrivilege 3712 explorer.exe Token: SeDebugPrivilege 3712 explorer.exe Token: SeDebugPrivilege 3712 explorer.exe Token: SeDebugPrivilege 3712 explorer.exe Token: SeDebugPrivilege 3712 explorer.exe Token: SeDebugPrivilege 3712 explorer.exe Token: SeDebugPrivilege 3712 explorer.exe Token: SeDebugPrivilege 3712 explorer.exe Token: SeDebugPrivilege 3712 explorer.exe Token: SeDebugPrivilege 3712 explorer.exe Token: SeDebugPrivilege 3712 explorer.exe Token: SeDebugPrivilege 3712 explorer.exe Token: SeDebugPrivilege 3712 explorer.exe Token: SeDebugPrivilege 3712 explorer.exe Token: SeDebugPrivilege 3712 explorer.exe Token: SeDebugPrivilege 3712 explorer.exe Token: SeDebugPrivilege 3712 explorer.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 4460 ab7632d9f027d04574ddbe06bedb7fc2751df074c9bd29af59ed1d406e7f93c9_NeikiAnalytics.exe 3368 ab7632d9f027d04574ddbe06bedb7fc2751df074c9bd29af59ed1d406e7f93c9_NeikiAnalytics.exe 2784 explorer.exe 3712 explorer.exe -
Suspicious use of WriteProcessMemory 39 IoCs
description pid Process procid_target PID 4460 wrote to memory of 3368 4460 ab7632d9f027d04574ddbe06bedb7fc2751df074c9bd29af59ed1d406e7f93c9_NeikiAnalytics.exe 81 PID 4460 wrote to memory of 3368 4460 ab7632d9f027d04574ddbe06bedb7fc2751df074c9bd29af59ed1d406e7f93c9_NeikiAnalytics.exe 81 PID 4460 wrote to memory of 3368 4460 ab7632d9f027d04574ddbe06bedb7fc2751df074c9bd29af59ed1d406e7f93c9_NeikiAnalytics.exe 81 PID 4460 wrote to memory of 3368 4460 ab7632d9f027d04574ddbe06bedb7fc2751df074c9bd29af59ed1d406e7f93c9_NeikiAnalytics.exe 81 PID 4460 wrote to memory of 3368 4460 ab7632d9f027d04574ddbe06bedb7fc2751df074c9bd29af59ed1d406e7f93c9_NeikiAnalytics.exe 81 PID 4460 wrote to memory of 3368 4460 ab7632d9f027d04574ddbe06bedb7fc2751df074c9bd29af59ed1d406e7f93c9_NeikiAnalytics.exe 81 PID 4460 wrote to memory of 3368 4460 ab7632d9f027d04574ddbe06bedb7fc2751df074c9bd29af59ed1d406e7f93c9_NeikiAnalytics.exe 81 PID 4460 wrote to memory of 3368 4460 ab7632d9f027d04574ddbe06bedb7fc2751df074c9bd29af59ed1d406e7f93c9_NeikiAnalytics.exe 81 PID 3368 wrote to memory of 816 3368 ab7632d9f027d04574ddbe06bedb7fc2751df074c9bd29af59ed1d406e7f93c9_NeikiAnalytics.exe 84 PID 3368 wrote to memory of 816 3368 ab7632d9f027d04574ddbe06bedb7fc2751df074c9bd29af59ed1d406e7f93c9_NeikiAnalytics.exe 84 PID 3368 wrote to memory of 816 3368 ab7632d9f027d04574ddbe06bedb7fc2751df074c9bd29af59ed1d406e7f93c9_NeikiAnalytics.exe 84 PID 816 wrote to memory of 928 816 cmd.exe 87 PID 816 wrote to memory of 928 816 cmd.exe 87 PID 816 wrote to memory of 928 816 cmd.exe 87 PID 3368 wrote to memory of 2784 3368 ab7632d9f027d04574ddbe06bedb7fc2751df074c9bd29af59ed1d406e7f93c9_NeikiAnalytics.exe 88 PID 3368 wrote to memory of 2784 3368 ab7632d9f027d04574ddbe06bedb7fc2751df074c9bd29af59ed1d406e7f93c9_NeikiAnalytics.exe 88 PID 3368 wrote to memory of 2784 3368 ab7632d9f027d04574ddbe06bedb7fc2751df074c9bd29af59ed1d406e7f93c9_NeikiAnalytics.exe 88 PID 2784 wrote to memory of 3712 2784 explorer.exe 89 PID 2784 wrote to memory of 3712 2784 explorer.exe 89 PID 2784 wrote to memory of 3712 2784 explorer.exe 89 PID 2784 wrote to memory of 3712 2784 explorer.exe 89 PID 2784 wrote to memory of 3712 2784 explorer.exe 89 PID 2784 wrote to memory of 3712 2784 explorer.exe 89 PID 2784 wrote to memory of 3712 2784 explorer.exe 89 PID 2784 wrote to memory of 3712 2784 explorer.exe 89 PID 2784 wrote to memory of 2532 2784 explorer.exe 90 PID 2784 wrote to memory of 2532 2784 explorer.exe 90 PID 2784 wrote to memory of 2532 2784 explorer.exe 90 PID 2784 wrote to memory of 2532 2784 explorer.exe 90 PID 2784 wrote to memory of 2532 2784 explorer.exe 90 PID 2784 wrote to memory of 2532 2784 explorer.exe 90 PID 2784 wrote to memory of 2532 2784 explorer.exe 90 PID 2532 wrote to memory of 1428 2532 explorer.exe 93 PID 2532 wrote to memory of 1428 2532 explorer.exe 93 PID 2532 wrote to memory of 1428 2532 explorer.exe 93 PID 2532 wrote to memory of 1428 2532 explorer.exe 93 PID 2532 wrote to memory of 1428 2532 explorer.exe 93 PID 2532 wrote to memory of 1428 2532 explorer.exe 93 PID 2532 wrote to memory of 1428 2532 explorer.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\ab7632d9f027d04574ddbe06bedb7fc2751df074c9bd29af59ed1d406e7f93c9_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\ab7632d9f027d04574ddbe06bedb7fc2751df074c9bd29af59ed1d406e7f93c9_NeikiAnalytics.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4460 -
C:\Users\Admin\AppData\Local\Temp\ab7632d9f027d04574ddbe06bedb7fc2751df074c9bd29af59ed1d406e7f93c9_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\ab7632d9f027d04574ddbe06bedb7fc2751df074c9bd29af59ed1d406e7f93c9_NeikiAnalytics.exe"2⤵
- Checks computer location settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3368 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\EFBBW.bat" "3⤵
- Suspicious use of WriteProcessMemory
PID:816 -
C:\Windows\SysWOW64\reg.exeREG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "Video Driver" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\config\explorer.exe" /f4⤵
- Adds Run key to start application
PID:928
-
-
-
C:\Users\Admin\AppData\Roaming\config\explorer.exe"C:\Users\Admin\AppData\Roaming\config\explorer.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2784 -
C:\Users\Admin\AppData\Roaming\config\explorer.exe"C:\Users\Admin\AppData\Roaming\config\explorer.exe"4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:3712
-
-
C:\Users\Admin\AppData\Roaming\config\explorer.exe"C:\Users\Admin\AppData\Roaming\config\explorer.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2532 -
C:\Users\Admin\AppData\Roaming\config\explorer.exe"C:\Users\Admin\AppData\Roaming\config\explorer.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
PID:1428
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
326B
MD54a1a891a0bebdec4a7239f29ad395fa9
SHA15814ab807f5329f053f881e2805d917787ba79ff
SHA25616eebbd122411c04eb5f4b581fb27b155cf9147cbe04196a31ab646dc312427a
SHA512b2134fcc5d8c86707298c045d474fb5856121af0f5123bb6349e9ba3f2c90dd850f788a82609a203c8fbc1176e42a6240a39502680bf80e16b5694f71302d961
-
Filesize
149B
MD5fc1798b7c7938454220fda837a76f354
SHA1b232912930b2bc24ff18bf7ecd58f872bbe01ea0
SHA2567f0a5917b5aca9c5beb153aad0ef95bf0aeafb83768da5b086c3f029ba42d7c8
SHA512d1abdd45a8e5d33893b9d19424174a07feed145d2e6b4be318ab5fde503f850579a4a101a010f30e16ecde2c7123f45357a8341214655321ee0f0097ca911331
-
Filesize
88KB
MD52aafb903e03d55223d2ac41f5a1807a6
SHA192262eeb9318b6ba5ed605fe4d060b4ae8498772
SHA2566aeba333ac1c48a31af9e7cbc2338730f16592fbca000804d2e4d50584be5bba
SHA512bdfe276fb8dc99ff9b5d9e2714271fcf2dca3dbad2eb6537f830f0f0143c86f11d885a788a680de5f5e6fa2ecd4da7b1c474909a5e5d4525ceaa80ef56f21d0f