Analysis
-
max time kernel
149s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
01-07-2024 05:18
Static task
static1
Behavioral task
behavioral1
Sample
383d4db99ceb0a2fa11f43799476c5dd92bd21a4a3b85c0f6aa58db85cfe9ac9_NeikiAnalytics.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
383d4db99ceb0a2fa11f43799476c5dd92bd21a4a3b85c0f6aa58db85cfe9ac9_NeikiAnalytics.exe
Resource
win10v2004-20240611-en
General
-
Target
383d4db99ceb0a2fa11f43799476c5dd92bd21a4a3b85c0f6aa58db85cfe9ac9_NeikiAnalytics.exe
-
Size
720KB
-
MD5
ef3764f488b725d7665c6bdd0354be20
-
SHA1
4d9c48bf849e41390d74db036968f3ff659031b4
-
SHA256
383d4db99ceb0a2fa11f43799476c5dd92bd21a4a3b85c0f6aa58db85cfe9ac9
-
SHA512
f8daf715f587c5cbdf7baa9cbd6f40ca623d396493676b61ed877107c936a4f85781cf18fc82f3c88e52198586289a01084d9dd3ac127274adcd4fc38448372a
-
SSDEEP
12288:4jauDReWrFRoMdP4wltqA7nMlddOgH15sHQGXJ8pRPB:4DDHP427s4E1CL4
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2100 psobb.exe -
Loads dropped DLL 2 IoCs
pid Process 1632 383d4db99ceb0a2fa11f43799476c5dd92bd21a4a3b85c0f6aa58db85cfe9ac9_NeikiAnalytics.exe 1632 383d4db99ceb0a2fa11f43799476c5dd92bd21a4a3b85c0f6aa58db85cfe9ac9_NeikiAnalytics.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Run\Microsoft® Windows® Operating System = "C:\\ProgramData\\psobb.exe" psobb.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1632 wrote to memory of 2100 1632 383d4db99ceb0a2fa11f43799476c5dd92bd21a4a3b85c0f6aa58db85cfe9ac9_NeikiAnalytics.exe 28 PID 1632 wrote to memory of 2100 1632 383d4db99ceb0a2fa11f43799476c5dd92bd21a4a3b85c0f6aa58db85cfe9ac9_NeikiAnalytics.exe 28 PID 1632 wrote to memory of 2100 1632 383d4db99ceb0a2fa11f43799476c5dd92bd21a4a3b85c0f6aa58db85cfe9ac9_NeikiAnalytics.exe 28 PID 1632 wrote to memory of 2100 1632 383d4db99ceb0a2fa11f43799476c5dd92bd21a4a3b85c0f6aa58db85cfe9ac9_NeikiAnalytics.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\383d4db99ceb0a2fa11f43799476c5dd92bd21a4a3b85c0f6aa58db85cfe9ac9_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\383d4db99ceb0a2fa11f43799476c5dd92bd21a4a3b85c0f6aa58db85cfe9ac9_NeikiAnalytics.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1632 -
C:\ProgramData\psobb.exe"C:\ProgramData\psobb.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:2100
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
720KB
MD5905f0f1b16084a765dfcd7a444654203
SHA1f4462ad05b5aa3cd75a5f5be9802af2c850e9d06
SHA256166c37f888c1879b2ea355e27878c0759b5952f48dc3b601297a4761de558cb5
SHA5127c12ec3c04026410bcf5c9d1e2d3aa5ed82562c90f8b5e161dd71e7be422d4a6a9443159b5e5f7138d64f4d3e521d551bb0815044f15d1dc20b1b4f2c79020c1
-
Filesize
136KB
MD5cb4c442a26bb46671c638c794bf535af
SHA18a742d0b372f2ddd2d1fdf688c3c4ac7f9272abf
SHA256f8d2c17bdf34ccfb58070ac8b131a8d95055340101a329f9a7212ac5240d0c25
SHA512074a31e8da403c0a718f93cbca50574d8b658921193db0e6e20eacd232379286f14a3698cd443dc740d324ad19d74934ae001a7ad64b88897d8afefbc9a3d4e3
-
Filesize
583KB
MD503be08a694255e177643acbc6afa6e27
SHA189780e6c3b198e5f1aa4d3c3607bfe4ed51cf290
SHA256faa91d0180d6de1d8095afef5c199ca64c722e05c58207a1429d083cf8272832
SHA512b1efceb953e1472a159a0359011b4e9fc50eb93ebc631c1fde95cc9df93336902293a4342cab5d8676f5a783e1ba7f674a6239346cc016998861f161164534c6