Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
02-07-2024 13:39
Static task
static1
Behavioral task
behavioral1
Sample
4a5cdd39b3860030a8a0b63f63e2b0f10c4cde2f5846b1778f32cde197924f53_NeikiAnalytics.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
4a5cdd39b3860030a8a0b63f63e2b0f10c4cde2f5846b1778f32cde197924f53_NeikiAnalytics.exe
Resource
win10v2004-20240611-en
General
-
Target
4a5cdd39b3860030a8a0b63f63e2b0f10c4cde2f5846b1778f32cde197924f53_NeikiAnalytics.exe
-
Size
225KB
-
MD5
8d28bbb82c16008c86c5441e819f7e20
-
SHA1
9146d8b3cf3bc6f4d596610a813e589b65869cce
-
SHA256
4a5cdd39b3860030a8a0b63f63e2b0f10c4cde2f5846b1778f32cde197924f53
-
SHA512
2fc18ea9a334f04ec504111956839e8123cdbf1bc3842f99346b930f2f5a99bd028596b364dc54dfacf4212a33ef0929030ad75ad4f13305672452d5d2e18e32
-
SSDEEP
6144:MA2P27yTAnKGw0hjFhSR/W11yAJ9v0pMtRCpYM:MATuTAnKGwUAW3ycQqgf
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
winver.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Windows\CurrentVersion\Run\92ACDCF9 = "C:\\Users\\Admin\\AppData\\Roaming\\92ACDCF9\\bin.exe" winver.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 61 IoCs
Processes:
winver.exepid process 3032 winver.exe 3032 winver.exe 3032 winver.exe 3032 winver.exe 3032 winver.exe 3032 winver.exe 3032 winver.exe 3032 winver.exe 3032 winver.exe 3032 winver.exe 3032 winver.exe 3032 winver.exe 3032 winver.exe 3032 winver.exe 3032 winver.exe 3032 winver.exe 3032 winver.exe 3032 winver.exe 3032 winver.exe 3032 winver.exe 3032 winver.exe 3032 winver.exe 3032 winver.exe 3032 winver.exe 3032 winver.exe 3032 winver.exe 3032 winver.exe 3032 winver.exe 3032 winver.exe 3032 winver.exe 3032 winver.exe 3032 winver.exe 3032 winver.exe 3032 winver.exe 3032 winver.exe 3032 winver.exe 3032 winver.exe 3032 winver.exe 3032 winver.exe 3032 winver.exe 3032 winver.exe 3032 winver.exe 3032 winver.exe 3032 winver.exe 3032 winver.exe 3032 winver.exe 3032 winver.exe 3032 winver.exe 3032 winver.exe 3032 winver.exe 3032 winver.exe 3032 winver.exe 3032 winver.exe 3032 winver.exe 3032 winver.exe 3032 winver.exe 3032 winver.exe 3032 winver.exe 3032 winver.exe 3032 winver.exe 3032 winver.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
winver.exepid process 3032 winver.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
4a5cdd39b3860030a8a0b63f63e2b0f10c4cde2f5846b1778f32cde197924f53_NeikiAnalytics.exewinver.exedescription pid process target process PID 2132 wrote to memory of 3032 2132 4a5cdd39b3860030a8a0b63f63e2b0f10c4cde2f5846b1778f32cde197924f53_NeikiAnalytics.exe winver.exe PID 2132 wrote to memory of 3032 2132 4a5cdd39b3860030a8a0b63f63e2b0f10c4cde2f5846b1778f32cde197924f53_NeikiAnalytics.exe winver.exe PID 2132 wrote to memory of 3032 2132 4a5cdd39b3860030a8a0b63f63e2b0f10c4cde2f5846b1778f32cde197924f53_NeikiAnalytics.exe winver.exe PID 2132 wrote to memory of 3032 2132 4a5cdd39b3860030a8a0b63f63e2b0f10c4cde2f5846b1778f32cde197924f53_NeikiAnalytics.exe winver.exe PID 2132 wrote to memory of 3032 2132 4a5cdd39b3860030a8a0b63f63e2b0f10c4cde2f5846b1778f32cde197924f53_NeikiAnalytics.exe winver.exe PID 3032 wrote to memory of 1204 3032 winver.exe Explorer.EXE PID 3032 wrote to memory of 1096 3032 winver.exe taskhost.exe PID 3032 wrote to memory of 1160 3032 winver.exe Dwm.exe PID 3032 wrote to memory of 1204 3032 winver.exe Explorer.EXE
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
-
C:\Users\Admin\AppData\Local\Temp\4a5cdd39b3860030a8a0b63f63e2b0f10c4cde2f5846b1778f32cde197924f53_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\4a5cdd39b3860030a8a0b63f63e2b0f10c4cde2f5846b1778f32cde197924f53_NeikiAnalytics.exe"2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\winver.exewinver3⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1096-21-0x0000000000260000-0x0000000000266000-memory.dmpFilesize
24KB
-
memory/1096-11-0x0000000000260000-0x0000000000266000-memory.dmpFilesize
24KB
-
memory/1160-14-0x0000000000140000-0x0000000000146000-memory.dmpFilesize
24KB
-
memory/1160-23-0x0000000000140000-0x0000000000146000-memory.dmpFilesize
24KB
-
memory/1204-3-0x00000000020C0000-0x00000000020C6000-memory.dmpFilesize
24KB
-
memory/1204-17-0x0000000002970000-0x0000000002976000-memory.dmpFilesize
24KB
-
memory/1204-1-0x00000000020C0000-0x00000000020C6000-memory.dmpFilesize
24KB
-
memory/1204-6-0x00000000020C0000-0x00000000020C6000-memory.dmpFilesize
24KB
-
memory/1204-22-0x0000000002970000-0x0000000002976000-memory.dmpFilesize
24KB
-
memory/2132-8-0x0000000000400000-0x000000000043C000-memory.dmpFilesize
240KB
-
memory/3032-20-0x00000000002D0000-0x00000000002D6000-memory.dmpFilesize
24KB
-
memory/3032-4-0x0000000000160000-0x0000000000166000-memory.dmpFilesize
24KB
-
memory/3032-25-0x00000000002D0000-0x00000000002D6000-memory.dmpFilesize
24KB