Analysis
-
max time kernel
150s -
max time network
94s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
29/06/2024, 15:08
Static task
static1
Behavioral task
behavioral1
Sample
b09fe17984461dec2f9beece4166a5f9ce67346791acc785dd7d1da907ac77e0_NeikiAnalytics.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
b09fe17984461dec2f9beece4166a5f9ce67346791acc785dd7d1da907ac77e0_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
b09fe17984461dec2f9beece4166a5f9ce67346791acc785dd7d1da907ac77e0_NeikiAnalytics.exe
-
Size
741KB
-
MD5
99a7ec08d91b74be23c646b7ea720f20
-
SHA1
6b5120be77f269614904f4fc3c44d3f665abdfea
-
SHA256
b09fe17984461dec2f9beece4166a5f9ce67346791acc785dd7d1da907ac77e0
-
SHA512
1a484e56098d65ffadf36b85c3558d7a268883e14ac0e7fa2a322744a876af692567b6486acc691b2a96e3ee4a8e65152fbe5f98679e416d946c0c7d8e0878f4
-
SSDEEP
12288:ltTuhrf45I8jWtJ8OgL27rd69bk5NCgGhSFB79gYhLIf6EQ9EYcw1Fn:lIt4kt0Kd6F6CNzYhUiEWEYcwP
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" svchost.exe -
Executes dropped EXE 4 IoCs
pid Process 1132 explorer.exe 4168 spoolsv.exe 3564 svchost.exe 4616 spoolsv.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\resources\\themes\\explorer.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\resources\\svchost.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\resources\\themes\\explorer.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\resources\\svchost.exe RO" svchost.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\explorer.exe svchost.exe File opened for modification C:\Windows\SysWOW64\explorer.exe explorer.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 17 IoCs
pid Process 1508 b09fe17984461dec2f9beece4166a5f9ce67346791acc785dd7d1da907ac77e0_NeikiAnalytics.exe 1132 explorer.exe 4168 spoolsv.exe 3564 svchost.exe 4616 spoolsv.exe 1132 explorer.exe 3564 svchost.exe 1132 explorer.exe 3564 svchost.exe 1132 explorer.exe 3564 svchost.exe 1132 explorer.exe 3564 svchost.exe 1132 explorer.exe 3564 svchost.exe 1132 explorer.exe 3564 svchost.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification \??\c:\windows\resources\themes\explorer.exe b09fe17984461dec2f9beece4166a5f9ce67346791acc785dd7d1da907ac77e0_NeikiAnalytics.exe File opened for modification \??\c:\windows\resources\spoolsv.exe explorer.exe File opened for modification \??\c:\windows\resources\svchost.exe spoolsv.exe File opened for modification C:\Windows\Resources\tjud.exe explorer.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1508 b09fe17984461dec2f9beece4166a5f9ce67346791acc785dd7d1da907ac77e0_NeikiAnalytics.exe 1508 b09fe17984461dec2f9beece4166a5f9ce67346791acc785dd7d1da907ac77e0_NeikiAnalytics.exe 1508 b09fe17984461dec2f9beece4166a5f9ce67346791acc785dd7d1da907ac77e0_NeikiAnalytics.exe 1508 b09fe17984461dec2f9beece4166a5f9ce67346791acc785dd7d1da907ac77e0_NeikiAnalytics.exe 1508 b09fe17984461dec2f9beece4166a5f9ce67346791acc785dd7d1da907ac77e0_NeikiAnalytics.exe 1508 b09fe17984461dec2f9beece4166a5f9ce67346791acc785dd7d1da907ac77e0_NeikiAnalytics.exe 1508 b09fe17984461dec2f9beece4166a5f9ce67346791acc785dd7d1da907ac77e0_NeikiAnalytics.exe 1508 b09fe17984461dec2f9beece4166a5f9ce67346791acc785dd7d1da907ac77e0_NeikiAnalytics.exe 1508 b09fe17984461dec2f9beece4166a5f9ce67346791acc785dd7d1da907ac77e0_NeikiAnalytics.exe 1508 b09fe17984461dec2f9beece4166a5f9ce67346791acc785dd7d1da907ac77e0_NeikiAnalytics.exe 1508 b09fe17984461dec2f9beece4166a5f9ce67346791acc785dd7d1da907ac77e0_NeikiAnalytics.exe 1508 b09fe17984461dec2f9beece4166a5f9ce67346791acc785dd7d1da907ac77e0_NeikiAnalytics.exe 1508 b09fe17984461dec2f9beece4166a5f9ce67346791acc785dd7d1da907ac77e0_NeikiAnalytics.exe 1508 b09fe17984461dec2f9beece4166a5f9ce67346791acc785dd7d1da907ac77e0_NeikiAnalytics.exe 1508 b09fe17984461dec2f9beece4166a5f9ce67346791acc785dd7d1da907ac77e0_NeikiAnalytics.exe 1508 b09fe17984461dec2f9beece4166a5f9ce67346791acc785dd7d1da907ac77e0_NeikiAnalytics.exe 1508 b09fe17984461dec2f9beece4166a5f9ce67346791acc785dd7d1da907ac77e0_NeikiAnalytics.exe 1508 b09fe17984461dec2f9beece4166a5f9ce67346791acc785dd7d1da907ac77e0_NeikiAnalytics.exe 1508 b09fe17984461dec2f9beece4166a5f9ce67346791acc785dd7d1da907ac77e0_NeikiAnalytics.exe 1508 b09fe17984461dec2f9beece4166a5f9ce67346791acc785dd7d1da907ac77e0_NeikiAnalytics.exe 1508 b09fe17984461dec2f9beece4166a5f9ce67346791acc785dd7d1da907ac77e0_NeikiAnalytics.exe 1508 b09fe17984461dec2f9beece4166a5f9ce67346791acc785dd7d1da907ac77e0_NeikiAnalytics.exe 1508 b09fe17984461dec2f9beece4166a5f9ce67346791acc785dd7d1da907ac77e0_NeikiAnalytics.exe 1508 b09fe17984461dec2f9beece4166a5f9ce67346791acc785dd7d1da907ac77e0_NeikiAnalytics.exe 1508 b09fe17984461dec2f9beece4166a5f9ce67346791acc785dd7d1da907ac77e0_NeikiAnalytics.exe 1508 b09fe17984461dec2f9beece4166a5f9ce67346791acc785dd7d1da907ac77e0_NeikiAnalytics.exe 1508 b09fe17984461dec2f9beece4166a5f9ce67346791acc785dd7d1da907ac77e0_NeikiAnalytics.exe 1508 b09fe17984461dec2f9beece4166a5f9ce67346791acc785dd7d1da907ac77e0_NeikiAnalytics.exe 1508 b09fe17984461dec2f9beece4166a5f9ce67346791acc785dd7d1da907ac77e0_NeikiAnalytics.exe 1508 b09fe17984461dec2f9beece4166a5f9ce67346791acc785dd7d1da907ac77e0_NeikiAnalytics.exe 1508 b09fe17984461dec2f9beece4166a5f9ce67346791acc785dd7d1da907ac77e0_NeikiAnalytics.exe 1508 b09fe17984461dec2f9beece4166a5f9ce67346791acc785dd7d1da907ac77e0_NeikiAnalytics.exe 1508 b09fe17984461dec2f9beece4166a5f9ce67346791acc785dd7d1da907ac77e0_NeikiAnalytics.exe 1508 b09fe17984461dec2f9beece4166a5f9ce67346791acc785dd7d1da907ac77e0_NeikiAnalytics.exe 1508 b09fe17984461dec2f9beece4166a5f9ce67346791acc785dd7d1da907ac77e0_NeikiAnalytics.exe 1508 b09fe17984461dec2f9beece4166a5f9ce67346791acc785dd7d1da907ac77e0_NeikiAnalytics.exe 1508 b09fe17984461dec2f9beece4166a5f9ce67346791acc785dd7d1da907ac77e0_NeikiAnalytics.exe 1508 b09fe17984461dec2f9beece4166a5f9ce67346791acc785dd7d1da907ac77e0_NeikiAnalytics.exe 1508 b09fe17984461dec2f9beece4166a5f9ce67346791acc785dd7d1da907ac77e0_NeikiAnalytics.exe 1508 b09fe17984461dec2f9beece4166a5f9ce67346791acc785dd7d1da907ac77e0_NeikiAnalytics.exe 1508 b09fe17984461dec2f9beece4166a5f9ce67346791acc785dd7d1da907ac77e0_NeikiAnalytics.exe 1508 b09fe17984461dec2f9beece4166a5f9ce67346791acc785dd7d1da907ac77e0_NeikiAnalytics.exe 1132 explorer.exe 1132 explorer.exe 1132 explorer.exe 1132 explorer.exe 1132 explorer.exe 1132 explorer.exe 1132 explorer.exe 1132 explorer.exe 1132 explorer.exe 1132 explorer.exe 1132 explorer.exe 1132 explorer.exe 1132 explorer.exe 1132 explorer.exe 1132 explorer.exe 1132 explorer.exe 1132 explorer.exe 1132 explorer.exe 1132 explorer.exe 1132 explorer.exe 1132 explorer.exe 1132 explorer.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 1132 explorer.exe 3564 svchost.exe -
Suspicious use of SetWindowsHookEx 15 IoCs
pid Process 1508 b09fe17984461dec2f9beece4166a5f9ce67346791acc785dd7d1da907ac77e0_NeikiAnalytics.exe 1508 b09fe17984461dec2f9beece4166a5f9ce67346791acc785dd7d1da907ac77e0_NeikiAnalytics.exe 1508 b09fe17984461dec2f9beece4166a5f9ce67346791acc785dd7d1da907ac77e0_NeikiAnalytics.exe 1132 explorer.exe 1132 explorer.exe 1132 explorer.exe 4168 spoolsv.exe 4168 spoolsv.exe 4168 spoolsv.exe 3564 svchost.exe 3564 svchost.exe 3564 svchost.exe 4616 spoolsv.exe 4616 spoolsv.exe 4616 spoolsv.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1508 wrote to memory of 1132 1508 b09fe17984461dec2f9beece4166a5f9ce67346791acc785dd7d1da907ac77e0_NeikiAnalytics.exe 80 PID 1508 wrote to memory of 1132 1508 b09fe17984461dec2f9beece4166a5f9ce67346791acc785dd7d1da907ac77e0_NeikiAnalytics.exe 80 PID 1508 wrote to memory of 1132 1508 b09fe17984461dec2f9beece4166a5f9ce67346791acc785dd7d1da907ac77e0_NeikiAnalytics.exe 80 PID 1132 wrote to memory of 4168 1132 explorer.exe 81 PID 1132 wrote to memory of 4168 1132 explorer.exe 81 PID 1132 wrote to memory of 4168 1132 explorer.exe 81 PID 4168 wrote to memory of 3564 4168 spoolsv.exe 82 PID 4168 wrote to memory of 3564 4168 spoolsv.exe 82 PID 4168 wrote to memory of 3564 4168 spoolsv.exe 82 PID 3564 wrote to memory of 4616 3564 svchost.exe 83 PID 3564 wrote to memory of 4616 3564 svchost.exe 83 PID 3564 wrote to memory of 4616 3564 svchost.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\b09fe17984461dec2f9beece4166a5f9ce67346791acc785dd7d1da907ac77e0_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\b09fe17984461dec2f9beece4166a5f9ce67346791acc785dd7d1da907ac77e0_NeikiAnalytics.exe"1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1508 -
\??\c:\windows\resources\themes\explorer.exec:\windows\resources\themes\explorer.exe2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1132 -
\??\c:\windows\resources\spoolsv.exec:\windows\resources\spoolsv.exe SE3⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4168 -
\??\c:\windows\resources\svchost.exec:\windows\resources\svchost.exe4⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3564 -
\??\c:\windows\resources\spoolsv.exec:\windows\resources\spoolsv.exe PR5⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetWindowsHookEx
PID:4616
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
741KB
MD591d70530de3b14370cd5ffb8c9946f5e
SHA14d81c0d458aaae09153b335084dba571c153f8c6
SHA256c330811d772f8436945fb70afbcdb7333f8ada275a68fe03434ae879e7eb76e0
SHA51214ea29b12a7405c49a0358d42581743cef966fecebfe688e5c0428b71f305dc9b5311017baedb026e7f81b2a6917f16062ea5a75c30d8eccbecc59ca69e797aa
-
Filesize
741KB
MD58cd1b15381fc820c74cdbb0fa759331a
SHA142e73ef96f91981c921daf0963f353c270cadf82
SHA2568218095dce67fafc66d7e63bfe988968b08a2cf07bf249f6ab9cff164ab2a155
SHA512909d98f111698e658f222e2862ac5b206377ed3576c40e0e56a913cefd88d82c4203e08ff278cd448ca7cc26cbe61190dc443927b763c77f386458219b1ea289
-
Filesize
741KB
MD5f27fb687e8609409acf2a910bc9c6c6e
SHA14c01e6d192e194835bd6164dacbbf854f909d12c
SHA256dbcb30f2c9b39fa2e8706678dcc781e350255b6d435c6074e93db86c8d9d9ce4
SHA5121680d393750219f6731473165395eab54dad0b19e86640f515d7a19b16e2892a08ccb4d0875e467f4591a231ba118cda973b2d49f1ef6cee33a55dd238683c6f