Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
01-07-2024 06:11
Static task
static1
Behavioral task
behavioral1
Sample
3b0daa2c54108b4427106ec84e5c864fd0d95f349940bbbf329cb30f83e3df48_NeikiAnalytics.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
3b0daa2c54108b4427106ec84e5c864fd0d95f349940bbbf329cb30f83e3df48_NeikiAnalytics.exe
Resource
win10v2004-20240226-en
General
-
Target
3b0daa2c54108b4427106ec84e5c864fd0d95f349940bbbf329cb30f83e3df48_NeikiAnalytics.exe
-
Size
32KB
-
MD5
ee12b036af35633f514c32eb26573290
-
SHA1
e89ccca2741e1ff6358d5b64a120e3a97c8ef64b
-
SHA256
3b0daa2c54108b4427106ec84e5c864fd0d95f349940bbbf329cb30f83e3df48
-
SHA512
25d6e7db064e48dd41e22a8b6962ee4c21f841d2e78efb28ac490b2271d3b61333ff9a4f3fa4c11a222eb27980f7507a29c468d73f5db2e216bd522fcb66cf73
-
SSDEEP
384:Q98xUHQA18Vy4Ng8zLeirerI2Z1JQad0k5yQhbj/djEVvUPX4fOg:Twi/gopT22Kjj1wVvUPX8Og
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Windows\CurrentVersion\Run\AeLookupSvc = "C:\\Users\\Admin\\AppData\\Local\\AeLookupSvc.exe" regedit.exe -
Runs .reg file with regedit 1 IoCs
pid Process 1768 regedit.exe -
Suspicious behavior: RenamesItself 2 IoCs
pid Process 352 3b0daa2c54108b4427106ec84e5c864fd0d95f349940bbbf329cb30f83e3df48_NeikiAnalytics.exe 352 3b0daa2c54108b4427106ec84e5c864fd0d95f349940bbbf329cb30f83e3df48_NeikiAnalytics.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 352 wrote to memory of 1768 352 3b0daa2c54108b4427106ec84e5c864fd0d95f349940bbbf329cb30f83e3df48_NeikiAnalytics.exe 28 PID 352 wrote to memory of 1768 352 3b0daa2c54108b4427106ec84e5c864fd0d95f349940bbbf329cb30f83e3df48_NeikiAnalytics.exe 28 PID 352 wrote to memory of 1768 352 3b0daa2c54108b4427106ec84e5c864fd0d95f349940bbbf329cb30f83e3df48_NeikiAnalytics.exe 28 PID 352 wrote to memory of 1768 352 3b0daa2c54108b4427106ec84e5c864fd0d95f349940bbbf329cb30f83e3df48_NeikiAnalytics.exe 28 PID 352 wrote to memory of 1768 352 3b0daa2c54108b4427106ec84e5c864fd0d95f349940bbbf329cb30f83e3df48_NeikiAnalytics.exe 28 PID 352 wrote to memory of 1768 352 3b0daa2c54108b4427106ec84e5c864fd0d95f349940bbbf329cb30f83e3df48_NeikiAnalytics.exe 28 PID 352 wrote to memory of 1768 352 3b0daa2c54108b4427106ec84e5c864fd0d95f349940bbbf329cb30f83e3df48_NeikiAnalytics.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\3b0daa2c54108b4427106ec84e5c864fd0d95f349940bbbf329cb30f83e3df48_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\3b0daa2c54108b4427106ec84e5c864fd0d95f349940bbbf329cb30f83e3df48_NeikiAnalytics.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:352 -
C:\Windows\SysWOW64\regedit.exeregedit.exe /s C:\Users\Admin\AppData\Local\Temp\~dfds3.reg2⤵
- Adds Run key to start application
- Runs .reg file with regedit
PID:1768
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
32KB
MD539f53522be482461a29fee811dd0dc03
SHA1541f609733c014aa2096e4149d82013ca05aadea
SHA2569956d0d69d8e18fa5cc2103a368959e7e178f66d260b34911d47455cc928a99f
SHA51291f4a0965d7517cd13a4b51ac1afb97caf37da6eb2b4b944380381d7e68591172862966e2d5e2b7dd6c02b51b9d04327fb672a52e6467869a2a83babe78870ad
-
Filesize
174B
MD58c22944c5ba3c55d17fbcc34afb817f8
SHA1d8c04aea262c3db91473ad412ae653dc16eed885
SHA2562fdaf5ba61fb94c57d70d515520bf83103e3e85629c6fb1180b8e0313e81ac23
SHA51218ca896ba5e866fd7486969fa22d438b7a1f46ee36bb89cbbdb84fc2e7ad6b1b5969b4d21d72d93a62575ed09b39531c010757132ea6ab86868999c6171218ad