Analysis
-
max time kernel
149s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
01/07/2024, 01:50
Static task
static1
Behavioral task
behavioral1
Sample
2c819b787adb7d4aa9afa047db6f197dedad006601dbcab2e0db899b03c1d216_NeikiAnalytics.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
2c819b787adb7d4aa9afa047db6f197dedad006601dbcab2e0db899b03c1d216_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
2c819b787adb7d4aa9afa047db6f197dedad006601dbcab2e0db899b03c1d216_NeikiAnalytics.exe
-
Size
86KB
-
MD5
7f8257f68ab0a12756b9b691dd067430
-
SHA1
2bb7ab637ed8aae4fc6f54f7ba34ae05d65f9147
-
SHA256
2c819b787adb7d4aa9afa047db6f197dedad006601dbcab2e0db899b03c1d216
-
SHA512
6f7bee1027fd7ed515e26334ebfdcc0339479306fa17632369e0c01ffde92d6b8913746cf93dfc3d796f4f723dee1c6ea3482ad998be401c8d81687b7d39f180
-
SSDEEP
1536:3Gk8BAFEn4lWeogUNwIJj8NWeF9hISBHSCVEwF8DrdMZkWhp:35874DokIJQQeFDIgyCV98DrGCWhp
Malware Config
Signatures
-
Executes dropped EXE 4 IoCs
pid Process 2312 wmpscfgs.exe 2692 wmpscfgs.exe 884 wmpscfgs.exe 2172 wmpscfgs.exe -
Loads dropped DLL 6 IoCs
pid Process 2400 2c819b787adb7d4aa9afa047db6f197dedad006601dbcab2e0db899b03c1d216_NeikiAnalytics.exe 2400 2c819b787adb7d4aa9afa047db6f197dedad006601dbcab2e0db899b03c1d216_NeikiAnalytics.exe 2400 2c819b787adb7d4aa9afa047db6f197dedad006601dbcab2e0db899b03c1d216_NeikiAnalytics.exe 2400 2c819b787adb7d4aa9afa047db6f197dedad006601dbcab2e0db899b03c1d216_NeikiAnalytics.exe 2312 wmpscfgs.exe 2312 wmpscfgs.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Adobe_Reader = "c:\\users\\admin\\appdata\\local\\temp\\\\wmpscfgs.exe" 2c819b787adb7d4aa9afa047db6f197dedad006601dbcab2e0db899b03c1d216_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Adobe_Reader = "c:\\users\\admin\\appdata\\local\\temp\\\\wmpscfgs.exe" wmpscfgs.exe -
Drops file in Program Files directory 10 IoCs
description ioc Process File created \??\c:\program files (x86)\internet explorer\wmpscfgs.exe 2c819b787adb7d4aa9afa047db6f197dedad006601dbcab2e0db899b03c1d216_NeikiAnalytics.exe File created C:\Program Files (x86)\259420583.dat wmpscfgs.exe File created C:\Program Files (x86)\259420614.dat wmpscfgs.exe File created \??\c:\program files (x86)\microsoft office\office14\bcssync.exe wmpscfgs.exe File opened for modification \??\c:\program files (x86)\adobe\acrotray .exe wmpscfgs.exe File created \??\c:\program files (x86)\internet explorer\wmpscfgs.exe wmpscfgs.exe File created \??\c:\program files (x86)\adobe\acrotray.exe 2c819b787adb7d4aa9afa047db6f197dedad006601dbcab2e0db899b03c1d216_NeikiAnalytics.exe File created \??\c:\program files (x86)\adobe\acrotray .exe 2c819b787adb7d4aa9afa047db6f197dedad006601dbcab2e0db899b03c1d216_NeikiAnalytics.exe File opened for modification \??\c:\program files (x86)\adobe\acrotray.exe wmpscfgs.exe File created \??\c:\program files (x86)\microsoft office\office14\bcssync.exe 2c819b787adb7d4aa9afa047db6f197dedad006601dbcab2e0db899b03c1d216_NeikiAnalytics.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{685D4581-374C-11EF-8962-7678A7DAE141} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000760f6fb6d7365248881a38bcea68cf8b00000000020000000000106600000001000020000000e843c386c61e6a3a0e12513a464de2957ea431405c98b2eff5c923410c7786e5000000000e8000000002000020000000b4844ba321e3b24f0e24d03366b445c48d3fb8997fe5c315b9b06bbddb94d6e0200000005c09b65ee18b234dcad3762eb021f91005705b5bfdb52fba3d50645e2f04290a400000004c8e063eb78af5fd4001ff6c834c9930754b8a50fdf9b28152354dc984c8701f25bb5e99622372338152dd83f22f879d2ecc93cc5e173b51989ff15fb8ba6d72 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "425960568" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000000000001000000ffffffffffffffffffffffffffffffff3d0000003d000000c3040000a2020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a00dd53a59cbda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\MINIE iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\MINIE\TabBandWidth = "500" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000000000001000000ffffffffffffffffffffffffffffffff5600000000000000dc04000065020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000000000001000000ffffffffffffffffffffffffffffffff6f00000019000000f50400007e020000 iexplore.exe -
Suspicious behavior: EnumeratesProcesses 7 IoCs
pid Process 2400 2c819b787adb7d4aa9afa047db6f197dedad006601dbcab2e0db899b03c1d216_NeikiAnalytics.exe 2312 wmpscfgs.exe 2312 wmpscfgs.exe 2692 wmpscfgs.exe 2692 wmpscfgs.exe 884 wmpscfgs.exe 2172 wmpscfgs.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 2400 2c819b787adb7d4aa9afa047db6f197dedad006601dbcab2e0db899b03c1d216_NeikiAnalytics.exe Token: SeDebugPrivilege 2312 wmpscfgs.exe Token: SeDebugPrivilege 2692 wmpscfgs.exe Token: SeDebugPrivilege 884 wmpscfgs.exe Token: SeDebugPrivilege 2172 wmpscfgs.exe -
Suspicious use of FindShellTrayWindow 4 IoCs
pid Process 2376 iexplore.exe 2376 iexplore.exe 2376 iexplore.exe 2376 iexplore.exe -
Suspicious use of SetWindowsHookEx 16 IoCs
pid Process 2376 iexplore.exe 2376 iexplore.exe 1596 IEXPLORE.EXE 1596 IEXPLORE.EXE 2376 iexplore.exe 2376 iexplore.exe 1896 IEXPLORE.EXE 1896 IEXPLORE.EXE 2376 iexplore.exe 2376 iexplore.exe 1596 IEXPLORE.EXE 1596 IEXPLORE.EXE 2376 iexplore.exe 2376 iexplore.exe 1596 IEXPLORE.EXE 1596 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 2400 wrote to memory of 2312 2400 2c819b787adb7d4aa9afa047db6f197dedad006601dbcab2e0db899b03c1d216_NeikiAnalytics.exe 28 PID 2400 wrote to memory of 2312 2400 2c819b787adb7d4aa9afa047db6f197dedad006601dbcab2e0db899b03c1d216_NeikiAnalytics.exe 28 PID 2400 wrote to memory of 2312 2400 2c819b787adb7d4aa9afa047db6f197dedad006601dbcab2e0db899b03c1d216_NeikiAnalytics.exe 28 PID 2400 wrote to memory of 2312 2400 2c819b787adb7d4aa9afa047db6f197dedad006601dbcab2e0db899b03c1d216_NeikiAnalytics.exe 28 PID 2400 wrote to memory of 2692 2400 2c819b787adb7d4aa9afa047db6f197dedad006601dbcab2e0db899b03c1d216_NeikiAnalytics.exe 29 PID 2400 wrote to memory of 2692 2400 2c819b787adb7d4aa9afa047db6f197dedad006601dbcab2e0db899b03c1d216_NeikiAnalytics.exe 29 PID 2400 wrote to memory of 2692 2400 2c819b787adb7d4aa9afa047db6f197dedad006601dbcab2e0db899b03c1d216_NeikiAnalytics.exe 29 PID 2400 wrote to memory of 2692 2400 2c819b787adb7d4aa9afa047db6f197dedad006601dbcab2e0db899b03c1d216_NeikiAnalytics.exe 29 PID 2376 wrote to memory of 1596 2376 iexplore.exe 32 PID 2376 wrote to memory of 1596 2376 iexplore.exe 32 PID 2376 wrote to memory of 1596 2376 iexplore.exe 32 PID 2376 wrote to memory of 1596 2376 iexplore.exe 32 PID 2312 wrote to memory of 2172 2312 wmpscfgs.exe 33 PID 2312 wrote to memory of 2172 2312 wmpscfgs.exe 33 PID 2312 wrote to memory of 2172 2312 wmpscfgs.exe 33 PID 2312 wrote to memory of 2172 2312 wmpscfgs.exe 33 PID 2312 wrote to memory of 884 2312 wmpscfgs.exe 34 PID 2312 wrote to memory of 884 2312 wmpscfgs.exe 34 PID 2312 wrote to memory of 884 2312 wmpscfgs.exe 34 PID 2312 wrote to memory of 884 2312 wmpscfgs.exe 34 PID 2376 wrote to memory of 1896 2376 iexplore.exe 35 PID 2376 wrote to memory of 1896 2376 iexplore.exe 35 PID 2376 wrote to memory of 1896 2376 iexplore.exe 35 PID 2376 wrote to memory of 1896 2376 iexplore.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\2c819b787adb7d4aa9afa047db6f197dedad006601dbcab2e0db899b03c1d216_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\2c819b787adb7d4aa9afa047db6f197dedad006601dbcab2e0db899b03c1d216_NeikiAnalytics.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2400 -
\??\c:\users\admin\appdata\local\temp\wmpscfgs.exec:\users\admin\appdata\local\temp\\wmpscfgs.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2312 -
\??\c:\users\admin\appdata\local\temp\wmpscfgs.exec:\users\admin\appdata\local\temp\\wmpscfgs.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2172
-
-
C:\Program Files (x86)\Internet Explorer\wmpscfgs.exeC:\Program Files (x86)\Internet Explorer\wmpscfgs.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:884
-
-
-
C:\Program Files (x86)\Internet Explorer\wmpscfgs.exeC:\Program Files (x86)\Internet Explorer\wmpscfgs.exe2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2692
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2376 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2376 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1596
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2376 CREDAT:406533 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1896
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
104KB
MD5f703ccc5f3d53352d8d42d383a4eb070
SHA17cac9d8a9994cd2bde98f73cf30e12c065013be4
SHA256483c8a4d3ab28b7cd809651f420228d2f234e91acd00b1cfeb99ee333053341a
SHA5123aff3d9675abbebebd9f0a1d51422edc8926d2f6145ee2a04b24afdbbcb9eca45713f97181fca2e3a1127aad03e42eb6763470fdae37f8f5858dda36045346ac
-
Filesize
131KB
MD529ac9dff0fbb5839eab5d2d77a762624
SHA151eccc5765352963d827dd3899fda165f16d33b3
SHA256a81e7c172cc2c1f35aab4a87dcb4812d516f879e16bc699fe3fb4e44e5f6f83a
SHA512f78ebf88b7e0b8112c7eb17ca3f749ae8af7bc67c4a3b851130e1d3452ac98653fed6ec41509d19c51fa594f76ea418b67824160f4d7e788366666675e3199a2
-
Filesize
104KB
MD5661b85508c47c1ae9cc823891d641173
SHA1649101d998f21c5592b61a2b4acb56236e2ff4e0
SHA2563a0539ced33911aa02d6afb141b2fb6e5e865ada68307beec84530856ec2cfae
SHA5124cba808ae4f7e3f6a7169b0bbd1b88421953c9d1b32827cdbdc8cd823f80b0615de7d4f217bb7956030c4c6983863dd940cd5a8f519fc7874f07271738647e4f
-
Filesize
121KB
MD59f5f2278b6752fa4942adf85f8cc4da1
SHA1c4b3cced41f06272cafc2f57da8823e94c2ea035
SHA2568707065dd09e826762791a036d461cee70896a50a0afed3f1d36e407f51908ed
SHA5121c761df9ffe2074f2c80909e15056329ca545c0e9c1269d6bd0b0a4f401cdc20914bbdf485180500253dffc5256743117a56cf7f74b92b57edac8ec7d51eebc8