Analysis
-
max time kernel
150s -
max time network
105s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
30/06/2024, 22:08
Static task
static1
Behavioral task
behavioral1
Sample
1de0d2f56e61a044f68fcb9bd111982a6c68bbcefc0587e81e9495bacecb7232_NeikiAnalytics.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
1de0d2f56e61a044f68fcb9bd111982a6c68bbcefc0587e81e9495bacecb7232_NeikiAnalytics.exe
Resource
win10v2004-20240611-en
General
-
Target
1de0d2f56e61a044f68fcb9bd111982a6c68bbcefc0587e81e9495bacecb7232_NeikiAnalytics.exe
-
Size
3.5MB
-
MD5
e96f5b3730e7b90512efb76120718ac0
-
SHA1
20e74ac3342fc556a478d5c996532e6f664f3952
-
SHA256
1de0d2f56e61a044f68fcb9bd111982a6c68bbcefc0587e81e9495bacecb7232
-
SHA512
c65bb48f47d46f954949c65d517d382dd4cea21eb2684a7282fdae36b9afb8d8d5c7e9e933da1709013cf2291b5778e7d285f86fc2921f6412627703943f61f8
-
SSDEEP
98304:P66Nzf0vCNnowJAHzdZHG6efh3Bbob3+mFiP:7NTD+pZHG6efh3BDm0P
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-200405930-3877336739-3533750831-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-200405930-3877336739-3533750831-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" svchost.exe -
Executes dropped EXE 6 IoCs
pid Process 1868 1de0d2f56e61a044f68fcb9bd111982a6c68bbcefc0587e81e9495bacecb7232_neikianalytics.exe 1528 icsys.icn.exe 3440 explorer.exe 2872 spoolsv.exe 4572 svchost.exe 4976 spoolsv.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\resources\\themes\\explorer.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\resources\\svchost.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\resources\\themes\\explorer.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\resources\\svchost.exe RO" svchost.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\explorer.exe explorer.exe File opened for modification C:\Windows\SysWOW64\explorer.exe svchost.exe -
Drops file in Windows directory 5 IoCs
description ioc Process File opened for modification C:\Windows\Resources\Themes\icsys.icn.exe 1de0d2f56e61a044f68fcb9bd111982a6c68bbcefc0587e81e9495bacecb7232_NeikiAnalytics.exe File opened for modification \??\c:\windows\resources\themes\explorer.exe icsys.icn.exe File opened for modification \??\c:\windows\resources\spoolsv.exe explorer.exe File opened for modification \??\c:\windows\resources\svchost.exe spoolsv.exe File opened for modification C:\Windows\Resources\tjud.exe explorer.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1676 1de0d2f56e61a044f68fcb9bd111982a6c68bbcefc0587e81e9495bacecb7232_NeikiAnalytics.exe 1676 1de0d2f56e61a044f68fcb9bd111982a6c68bbcefc0587e81e9495bacecb7232_NeikiAnalytics.exe 1676 1de0d2f56e61a044f68fcb9bd111982a6c68bbcefc0587e81e9495bacecb7232_NeikiAnalytics.exe 1676 1de0d2f56e61a044f68fcb9bd111982a6c68bbcefc0587e81e9495bacecb7232_NeikiAnalytics.exe 1676 1de0d2f56e61a044f68fcb9bd111982a6c68bbcefc0587e81e9495bacecb7232_NeikiAnalytics.exe 1676 1de0d2f56e61a044f68fcb9bd111982a6c68bbcefc0587e81e9495bacecb7232_NeikiAnalytics.exe 1676 1de0d2f56e61a044f68fcb9bd111982a6c68bbcefc0587e81e9495bacecb7232_NeikiAnalytics.exe 1676 1de0d2f56e61a044f68fcb9bd111982a6c68bbcefc0587e81e9495bacecb7232_NeikiAnalytics.exe 1676 1de0d2f56e61a044f68fcb9bd111982a6c68bbcefc0587e81e9495bacecb7232_NeikiAnalytics.exe 1676 1de0d2f56e61a044f68fcb9bd111982a6c68bbcefc0587e81e9495bacecb7232_NeikiAnalytics.exe 1676 1de0d2f56e61a044f68fcb9bd111982a6c68bbcefc0587e81e9495bacecb7232_NeikiAnalytics.exe 1676 1de0d2f56e61a044f68fcb9bd111982a6c68bbcefc0587e81e9495bacecb7232_NeikiAnalytics.exe 1676 1de0d2f56e61a044f68fcb9bd111982a6c68bbcefc0587e81e9495bacecb7232_NeikiAnalytics.exe 1676 1de0d2f56e61a044f68fcb9bd111982a6c68bbcefc0587e81e9495bacecb7232_NeikiAnalytics.exe 1676 1de0d2f56e61a044f68fcb9bd111982a6c68bbcefc0587e81e9495bacecb7232_NeikiAnalytics.exe 1676 1de0d2f56e61a044f68fcb9bd111982a6c68bbcefc0587e81e9495bacecb7232_NeikiAnalytics.exe 1676 1de0d2f56e61a044f68fcb9bd111982a6c68bbcefc0587e81e9495bacecb7232_NeikiAnalytics.exe 1676 1de0d2f56e61a044f68fcb9bd111982a6c68bbcefc0587e81e9495bacecb7232_NeikiAnalytics.exe 1676 1de0d2f56e61a044f68fcb9bd111982a6c68bbcefc0587e81e9495bacecb7232_NeikiAnalytics.exe 1676 1de0d2f56e61a044f68fcb9bd111982a6c68bbcefc0587e81e9495bacecb7232_NeikiAnalytics.exe 1676 1de0d2f56e61a044f68fcb9bd111982a6c68bbcefc0587e81e9495bacecb7232_NeikiAnalytics.exe 1676 1de0d2f56e61a044f68fcb9bd111982a6c68bbcefc0587e81e9495bacecb7232_NeikiAnalytics.exe 1676 1de0d2f56e61a044f68fcb9bd111982a6c68bbcefc0587e81e9495bacecb7232_NeikiAnalytics.exe 1676 1de0d2f56e61a044f68fcb9bd111982a6c68bbcefc0587e81e9495bacecb7232_NeikiAnalytics.exe 1676 1de0d2f56e61a044f68fcb9bd111982a6c68bbcefc0587e81e9495bacecb7232_NeikiAnalytics.exe 1676 1de0d2f56e61a044f68fcb9bd111982a6c68bbcefc0587e81e9495bacecb7232_NeikiAnalytics.exe 1676 1de0d2f56e61a044f68fcb9bd111982a6c68bbcefc0587e81e9495bacecb7232_NeikiAnalytics.exe 1676 1de0d2f56e61a044f68fcb9bd111982a6c68bbcefc0587e81e9495bacecb7232_NeikiAnalytics.exe 1676 1de0d2f56e61a044f68fcb9bd111982a6c68bbcefc0587e81e9495bacecb7232_NeikiAnalytics.exe 1676 1de0d2f56e61a044f68fcb9bd111982a6c68bbcefc0587e81e9495bacecb7232_NeikiAnalytics.exe 1676 1de0d2f56e61a044f68fcb9bd111982a6c68bbcefc0587e81e9495bacecb7232_NeikiAnalytics.exe 1676 1de0d2f56e61a044f68fcb9bd111982a6c68bbcefc0587e81e9495bacecb7232_NeikiAnalytics.exe 1868 1de0d2f56e61a044f68fcb9bd111982a6c68bbcefc0587e81e9495bacecb7232_neikianalytics.exe 1868 1de0d2f56e61a044f68fcb9bd111982a6c68bbcefc0587e81e9495bacecb7232_neikianalytics.exe 1528 icsys.icn.exe 1528 icsys.icn.exe 1528 icsys.icn.exe 1528 icsys.icn.exe 1528 icsys.icn.exe 1528 icsys.icn.exe 1528 icsys.icn.exe 1528 icsys.icn.exe 1528 icsys.icn.exe 1528 icsys.icn.exe 1528 icsys.icn.exe 1528 icsys.icn.exe 1528 icsys.icn.exe 1528 icsys.icn.exe 1528 icsys.icn.exe 1528 icsys.icn.exe 1528 icsys.icn.exe 1528 icsys.icn.exe 1528 icsys.icn.exe 1528 icsys.icn.exe 1528 icsys.icn.exe 1528 icsys.icn.exe 1528 icsys.icn.exe 1528 icsys.icn.exe 1528 icsys.icn.exe 1528 icsys.icn.exe 1528 icsys.icn.exe 1528 icsys.icn.exe 1528 icsys.icn.exe 1528 icsys.icn.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 3440 explorer.exe 4572 svchost.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 1676 1de0d2f56e61a044f68fcb9bd111982a6c68bbcefc0587e81e9495bacecb7232_NeikiAnalytics.exe 1676 1de0d2f56e61a044f68fcb9bd111982a6c68bbcefc0587e81e9495bacecb7232_NeikiAnalytics.exe 1528 icsys.icn.exe 1528 icsys.icn.exe 3440 explorer.exe 3440 explorer.exe 2872 spoolsv.exe 2872 spoolsv.exe 4572 svchost.exe 4572 svchost.exe 4976 spoolsv.exe 4976 spoolsv.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 1676 wrote to memory of 1868 1676 1de0d2f56e61a044f68fcb9bd111982a6c68bbcefc0587e81e9495bacecb7232_NeikiAnalytics.exe 82 PID 1676 wrote to memory of 1868 1676 1de0d2f56e61a044f68fcb9bd111982a6c68bbcefc0587e81e9495bacecb7232_NeikiAnalytics.exe 82 PID 1676 wrote to memory of 1868 1676 1de0d2f56e61a044f68fcb9bd111982a6c68bbcefc0587e81e9495bacecb7232_NeikiAnalytics.exe 82 PID 1676 wrote to memory of 1528 1676 1de0d2f56e61a044f68fcb9bd111982a6c68bbcefc0587e81e9495bacecb7232_NeikiAnalytics.exe 83 PID 1676 wrote to memory of 1528 1676 1de0d2f56e61a044f68fcb9bd111982a6c68bbcefc0587e81e9495bacecb7232_NeikiAnalytics.exe 83 PID 1676 wrote to memory of 1528 1676 1de0d2f56e61a044f68fcb9bd111982a6c68bbcefc0587e81e9495bacecb7232_NeikiAnalytics.exe 83 PID 1528 wrote to memory of 3440 1528 icsys.icn.exe 84 PID 1528 wrote to memory of 3440 1528 icsys.icn.exe 84 PID 1528 wrote to memory of 3440 1528 icsys.icn.exe 84 PID 3440 wrote to memory of 2872 3440 explorer.exe 86 PID 3440 wrote to memory of 2872 3440 explorer.exe 86 PID 3440 wrote to memory of 2872 3440 explorer.exe 86 PID 2872 wrote to memory of 4572 2872 spoolsv.exe 87 PID 2872 wrote to memory of 4572 2872 spoolsv.exe 87 PID 2872 wrote to memory of 4572 2872 spoolsv.exe 87 PID 4572 wrote to memory of 4976 4572 svchost.exe 88 PID 4572 wrote to memory of 4976 4572 svchost.exe 88 PID 4572 wrote to memory of 4976 4572 svchost.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\1de0d2f56e61a044f68fcb9bd111982a6c68bbcefc0587e81e9495bacecb7232_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\1de0d2f56e61a044f68fcb9bd111982a6c68bbcefc0587e81e9495bacecb7232_NeikiAnalytics.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1676 -
\??\c:\users\admin\appdata\local\temp\1de0d2f56e61a044f68fcb9bd111982a6c68bbcefc0587e81e9495bacecb7232_neikianalytics.exec:\users\admin\appdata\local\temp\1de0d2f56e61a044f68fcb9bd111982a6c68bbcefc0587e81e9495bacecb7232_neikianalytics.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:1868
-
-
C:\Windows\Resources\Themes\icsys.icn.exeC:\Windows\Resources\Themes\icsys.icn.exe2⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1528 -
\??\c:\windows\resources\themes\explorer.exec:\windows\resources\themes\explorer.exe3⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3440 -
\??\c:\windows\resources\spoolsv.exec:\windows\resources\spoolsv.exe SE4⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2872 -
\??\c:\windows\resources\svchost.exec:\windows\resources\svchost.exe5⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4572 -
\??\c:\windows\resources\spoolsv.exec:\windows\resources\spoolsv.exe PR6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4976
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\1de0d2f56e61a044f68fcb9bd111982a6c68bbcefc0587e81e9495bacecb7232_neikianalytics.exe
Filesize3.4MB
MD54ac6b7f3a1f778bfb9e97bdf7d71c0db
SHA1b6fe449294ddafda2d269200fb9930d1b2e7b5f2
SHA2561a90efb3a89c7ef2795d12de927e3123a30b278234c8c92ff0479767021b92a5
SHA5121e44a65df80e240fb39880d6a8da8d6f815b0ac15ecd2838189f0a73ebc2854be0250b2ddb74b193d6f2225f9e3ea9cbeaf96c131400dc9dc11267fa8afc85ef
-
Filesize
135KB
MD52b9c44ca0504e515ee4cc7dcc33ca5d9
SHA18fd0aa1a185b05d85ac806fd3c77facf5a8a81c4
SHA256e9a30225e5f76e34e6a8a25112955abaf6010d43906aa626b5980f6eb79cc278
SHA512a2e720c7df907de24e1d0637b98294127d549269b2f91f1a4e0765f4b905f7473c7df314132249527cc706e3384e30b5e7603ebfc7cef389b93873518f1d0733
-
Filesize
135KB
MD5d932e116a4a1fc19a31d4a03d272cd39
SHA15375297fe87cba5b634d256622a7cc469391d56d
SHA2561469ad8b900424e6124619b278f3315a4b834ca038a7e3d206e3144a62ed11c1
SHA512a1e56ec7c357e11ea495a6684935ea91b2965995abde1dabd1ba123db54f8422195b4620eefc021cf0c31b1542dd3bacbe90216ea34e2ae851b804dedb911149
-
Filesize
135KB
MD55daa7ca767e4ab920acbf64f50dd374e
SHA106b7bde661e174dc29928e77e7ab1d0433161fdc
SHA2561bea11767e80b4746bc057468788285bf906bc16929d88e5138016b909bcd220
SHA512e840ad9337952a8e3819963110408ec2811e3a55103f0c2f4f2f07876c4551a18fa2ce80e18206a8fad094e177aaf2b3153afad479912268387090676574aad1
-
Filesize
135KB
MD5c390567e821a5d35da22a3e34bd29931
SHA145856fe27e4fa8d1da1ee5114455a7a99f8c0ce2
SHA256b06550dfdfec08e6ebe5896c1094fd74ffc1ae0efd5d3252b2b491f0709bb3e0
SHA512a915c58d63b39247eb0a60e2e179275de203ccafc1ae19397755fa229c5e6d97c28db1b2d1c5f19d8b1e335c8101c05760ee355af39ce19b8d87e73cabc9b98e