Resubmissions
16/07/2024, 16:17
240716-trljes1akl 1016/07/2024, 16:15
240716-tqbb3azhpn 1017/05/2024, 19:31
240517-x8wmhafa6s 10Analysis
-
max time kernel
224s -
max time network
197s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
16/07/2024, 16:17
Static task
static1
Behavioral task
behavioral1
Sample
21353d65b457518570bffc8a03038ee0_NeikiAnalytics.exe
Resource
win10v2004-20240709-en
General
-
Target
21353d65b457518570bffc8a03038ee0_NeikiAnalytics.exe
-
Size
6.0MB
-
MD5
21353d65b457518570bffc8a03038ee0
-
SHA1
b0c2e8ff737a4d3c331a5a581f7042eed4f69a9d
-
SHA256
98cc01dcd4c36c47fc13e4853777ca170c734613564a5a764e4d2541a6924d39
-
SHA512
a3a478a92fd5a1762e00f1adcac2d9f8ac8868b82c0e2e3cbddbc441333697d82e079fe3526ae4b67c5a674b4ff39229cb9c85f60f278525346c0f2d8804c282
-
SSDEEP
98304:xCl55swBqKJJLlcu2vwYyCfD8+tetZOVN+zhDH+dYaEoSu:qnBqxlxfD8+tetZYMzNH+dYaHS
Malware Config
Extracted
C:\Users\Public\Libraries\HOW_TO_RECOVER_FILES.txt
http://embargobe3n5okxyzqphpmk3moinoap2snz5k6765mvtkk7hhi544jid.onion/
http://5ntlvn7lmkezscee2vhatjaigkcu2rzj3bwhqaz32snmqc4jha3gcjad.onion/#/37f1061d6f6281a4598f130979ad77c8
Signatures
-
Modifies boot configuration data using bcdedit 1 TTPs 1 IoCs
pid Process 1976 bcdedit.exe -
Renames multiple (7430) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Drops startup file 1 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\HOW_TO_RECOVER_FILES.txt 21353d65b457518570bffc8a03038ee0_NeikiAnalytics.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates connected drives 3 TTPs 2 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\F: 21353d65b457518570bffc8a03038ee0_NeikiAnalytics.exe File opened (read-only) \??\A: 21353d65b457518570bffc8a03038ee0_NeikiAnalytics.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\combinepdf\HOW_TO_RECOVER_FILES.txt 21353d65b457518570bffc8a03038ee0_NeikiAnalytics.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\TellMePowerPoint.nrr 21353d65b457518570bffc8a03038ee0_NeikiAnalytics.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ProjectStdO365R_SubTrial-ul-oob.xrm-ms 21353d65b457518570bffc8a03038ee0_NeikiAnalytics.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\PublisherR_Retail-ppd.xrm-ms 21353d65b457518570bffc8a03038ee0_NeikiAnalytics.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\viewer\nls\cs-cz\HOW_TO_RECOVER_FILES.txt 21353d65b457518570bffc8a03038ee0_NeikiAnalytics.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\plugins\tracked-send\images\cstm_brand_preview2x.png 21353d65b457518570bffc8a03038ee0_NeikiAnalytics.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\aicuc\js\nls\en-gb\ui-strings.js 21353d65b457518570bffc8a03038ee0_NeikiAnalytics.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\ADDINS\PowerPivot Excel Add-in\Cartridges\HOW_TO_RECOVER_FILES.txt 21353d65b457518570bffc8a03038ee0_NeikiAnalytics.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\files\dev\nls\nb-no\ui-strings.js 21353d65b457518570bffc8a03038ee0_NeikiAnalytics.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer\images\illustrations.png 21353d65b457518570bffc8a03038ee0_NeikiAnalytics.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\HomeStudentVNextR_Trial-ppd.xrm-ms 21353d65b457518570bffc8a03038ee0_NeikiAnalytics.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\js\nls\fi-fi\HOW_TO_RECOVER_FILES.txt 21353d65b457518570bffc8a03038ee0_NeikiAnalytics.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer\js\nls\fr-fr\HOW_TO_RECOVER_FILES.txt 21353d65b457518570bffc8a03038ee0_NeikiAnalytics.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sign-services-auth\js\nls\ar-ae\HOW_TO_RECOVER_FILES.txt 21353d65b457518570bffc8a03038ee0_NeikiAnalytics.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\officeinventoryagentfallback.xml 21353d65b457518570bffc8a03038ee0_NeikiAnalytics.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sign-services-auth\js\nls\sk-sk\ui-strings.js 21353d65b457518570bffc8a03038ee0_NeikiAnalytics.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\combinepdf\js\nls\it-it\HOW_TO_RECOVER_FILES.txt 21353d65b457518570bffc8a03038ee0_NeikiAnalytics.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\activity-badge\js\nls\ru-ru\ui-strings.js 21353d65b457518570bffc8a03038ee0_NeikiAnalytics.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\THEMES16\CONCRETE\CONCRETE.INF 21353d65b457518570bffc8a03038ee0_NeikiAnalytics.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\signatures\js\nls\ko-kr\ui-strings.js 21353d65b457518570bffc8a03038ee0_NeikiAnalytics.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\send-for-sign\js\nls\sl-sl\ui-strings.js 21353d65b457518570bffc8a03038ee0_NeikiAnalytics.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\createpdfupsell-app\js\nls\fi-fi\HOW_TO_RECOVER_FILES.txt 21353d65b457518570bffc8a03038ee0_NeikiAnalytics.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\app-center\js\nls\sl-si\HOW_TO_RECOVER_FILES.txt 21353d65b457518570bffc8a03038ee0_NeikiAnalytics.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\app-center\css\main-selector.css 21353d65b457518570bffc8a03038ee0_NeikiAnalytics.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\Close.png 21353d65b457518570bffc8a03038ee0_NeikiAnalytics.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\plug_ins\HOW_TO_RECOVER_FILES.txt 21353d65b457518570bffc8a03038ee0_NeikiAnalytics.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\PAGESIZE\PGLBL106.XML 21353d65b457518570bffc8a03038ee0_NeikiAnalytics.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\ADDINS\Microsoft Power Query for Excel Integrated\bin\Microsoft.Mashup.Container.NetFX45.exe.config 21353d65b457518570bffc8a03038ee0_NeikiAnalytics.exe File opened for modification C:\Program Files\Java\jre-1.8\lib\applet\HOW_TO_RECOVER_FILES.txt 21353d65b457518570bffc8a03038ee0_NeikiAnalytics.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer\js\nls\he-il\ui-strings.js 21353d65b457518570bffc8a03038ee0_NeikiAnalytics.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\dc-annotations\js\plugin.js 21353d65b457518570bffc8a03038ee0_NeikiAnalytics.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\TRANSLAT\ENFR\HOW_TO_RECOVER_FILES.txt 21353d65b457518570bffc8a03038ee0_NeikiAnalytics.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\uss-search\js\nls\ja-jp\HOW_TO_RECOVER_FILES.txt 21353d65b457518570bffc8a03038ee0_NeikiAnalytics.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\images\themeless\zh-tw_get.svg 21353d65b457518570bffc8a03038ee0_NeikiAnalytics.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ProPlus2019R_OEM_Perp2-ppd.xrm-ms 21353d65b457518570bffc8a03038ee0_NeikiAnalytics.exe File opened for modification C:\Program Files\Mozilla Firefox\browser\VisualElements\VisualElements_150.png 21353d65b457518570bffc8a03038ee0_NeikiAnalytics.exe File opened for modification C:\Program Files\Microsoft Office\root\rsod\onenote.x-none.msi.16.x-none.boot.tree.dat 21353d65b457518570bffc8a03038ee0_NeikiAnalytics.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\PROOF\MSGR8ES.LEX 21353d65b457518570bffc8a03038ee0_NeikiAnalytics.exe File opened for modification C:\Program Files\Mozilla Firefox\dependentlibs.list 21353d65b457518570bffc8a03038ee0_NeikiAnalytics.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\digsig\js\nls\nb-no\ui-strings.js 21353d65b457518570bffc8a03038ee0_NeikiAnalytics.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sample-files\js\nls\sk-sk\HOW_TO_RECOVER_FILES.txt 21353d65b457518570bffc8a03038ee0_NeikiAnalytics.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\unified-share\images\themes\dark\s_checkbox_selected_18.svg 21353d65b457518570bffc8a03038ee0_NeikiAnalytics.exe File opened for modification C:\Program Files\Java\jre-1.8\legal\jdk\dynalink.md 21353d65b457518570bffc8a03038ee0_NeikiAnalytics.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\js\nls\ru-ru\ui-strings.js 21353d65b457518570bffc8a03038ee0_NeikiAnalytics.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\combinepdf\images\themes\dark\rhp_world_icon_hover.png 21353d65b457518570bffc8a03038ee0_NeikiAnalytics.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\createpdfupsell-app\js\nls\de-de\ui-strings.js 21353d65b457518570bffc8a03038ee0_NeikiAnalytics.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\themes\dark\s_nothumbnail_34.svg 21353d65b457518570bffc8a03038ee0_NeikiAnalytics.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\themes\dark\s_move_18.svg 21353d65b457518570bffc8a03038ee0_NeikiAnalytics.exe File opened for modification C:\Program Files\Mozilla Firefox\uninstall\shortcuts_log.ini 21353d65b457518570bffc8a03038ee0_NeikiAnalytics.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\7.0.16\de\HOW_TO_RECOVER_FILES.txt 21353d65b457518570bffc8a03038ee0_NeikiAnalytics.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer-select\js\nls\en-ae\ui-strings.js 21353d65b457518570bffc8a03038ee0_NeikiAnalytics.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\MANIFEST.XML 21353d65b457518570bffc8a03038ee0_NeikiAnalytics.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\Fonts\private\MSYH.TTC 21353d65b457518570bffc8a03038ee0_NeikiAnalytics.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\sdxs\sdxs.xml 21353d65b457518570bffc8a03038ee0_NeikiAnalytics.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\reviews\js\nls\tr-tr\HOW_TO_RECOVER_FILES.txt 21353d65b457518570bffc8a03038ee0_NeikiAnalytics.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\http\css\ui-lightness\images\ui-icons_222222_256x240.png 21353d65b457518570bffc8a03038ee0_NeikiAnalytics.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\scan-files\images\themeless\Appstore\Download_on_the_App_Store_Badge_tr_135x40.svg 21353d65b457518570bffc8a03038ee0_NeikiAnalytics.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\add-account\images\themes\dark\illustrations.png 21353d65b457518570bffc8a03038ee0_NeikiAnalytics.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\sdxs\FA000000027\assets\Icons\Send2Fluent.White.png 21353d65b457518570bffc8a03038ee0_NeikiAnalytics.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ProPlus2019R_OEM_Perp4-pl.xrm-ms 21353d65b457518570bffc8a03038ee0_NeikiAnalytics.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\plugins\tracked-send\js\nls\sk-sk\HOW_TO_RECOVER_FILES.txt 21353d65b457518570bffc8a03038ee0_NeikiAnalytics.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\images\themeless\pdf-ownership-rdr-ja_jp_2x.gif 21353d65b457518570bffc8a03038ee0_NeikiAnalytics.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\editpdf\js\nls\sk-sk\ui-strings.js 21353d65b457518570bffc8a03038ee0_NeikiAnalytics.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\win8-scrollbar\themes\dark\arrow-right.gif 21353d65b457518570bffc8a03038ee0_NeikiAnalytics.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Opens file in notepad (likely ransom note) 3 IoCs
pid Process 4852 NOTEPAD.EXE 6856 NOTEPAD.EXE 2060 NOTEPAD.EXE -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 1552 PING.EXE -
Suspicious behavior: EnumeratesProcesses 38 IoCs
pid Process 1160 21353d65b457518570bffc8a03038ee0_NeikiAnalytics.exe 1160 21353d65b457518570bffc8a03038ee0_NeikiAnalytics.exe 1160 21353d65b457518570bffc8a03038ee0_NeikiAnalytics.exe 1160 21353d65b457518570bffc8a03038ee0_NeikiAnalytics.exe 1160 21353d65b457518570bffc8a03038ee0_NeikiAnalytics.exe 1160 21353d65b457518570bffc8a03038ee0_NeikiAnalytics.exe 1160 21353d65b457518570bffc8a03038ee0_NeikiAnalytics.exe 1160 21353d65b457518570bffc8a03038ee0_NeikiAnalytics.exe 1160 21353d65b457518570bffc8a03038ee0_NeikiAnalytics.exe 1160 21353d65b457518570bffc8a03038ee0_NeikiAnalytics.exe 1160 21353d65b457518570bffc8a03038ee0_NeikiAnalytics.exe 1160 21353d65b457518570bffc8a03038ee0_NeikiAnalytics.exe 1160 21353d65b457518570bffc8a03038ee0_NeikiAnalytics.exe 1160 21353d65b457518570bffc8a03038ee0_NeikiAnalytics.exe 1160 21353d65b457518570bffc8a03038ee0_NeikiAnalytics.exe 1160 21353d65b457518570bffc8a03038ee0_NeikiAnalytics.exe 1160 21353d65b457518570bffc8a03038ee0_NeikiAnalytics.exe 1160 21353d65b457518570bffc8a03038ee0_NeikiAnalytics.exe 1160 21353d65b457518570bffc8a03038ee0_NeikiAnalytics.exe 1160 21353d65b457518570bffc8a03038ee0_NeikiAnalytics.exe 1160 21353d65b457518570bffc8a03038ee0_NeikiAnalytics.exe 1160 21353d65b457518570bffc8a03038ee0_NeikiAnalytics.exe 1160 21353d65b457518570bffc8a03038ee0_NeikiAnalytics.exe 1160 21353d65b457518570bffc8a03038ee0_NeikiAnalytics.exe 1160 21353d65b457518570bffc8a03038ee0_NeikiAnalytics.exe 1160 21353d65b457518570bffc8a03038ee0_NeikiAnalytics.exe 1160 21353d65b457518570bffc8a03038ee0_NeikiAnalytics.exe 1160 21353d65b457518570bffc8a03038ee0_NeikiAnalytics.exe 1160 21353d65b457518570bffc8a03038ee0_NeikiAnalytics.exe 1160 21353d65b457518570bffc8a03038ee0_NeikiAnalytics.exe 1160 21353d65b457518570bffc8a03038ee0_NeikiAnalytics.exe 1160 21353d65b457518570bffc8a03038ee0_NeikiAnalytics.exe 1160 21353d65b457518570bffc8a03038ee0_NeikiAnalytics.exe 1160 21353d65b457518570bffc8a03038ee0_NeikiAnalytics.exe 1160 21353d65b457518570bffc8a03038ee0_NeikiAnalytics.exe 1160 21353d65b457518570bffc8a03038ee0_NeikiAnalytics.exe 1160 21353d65b457518570bffc8a03038ee0_NeikiAnalytics.exe 1160 21353d65b457518570bffc8a03038ee0_NeikiAnalytics.exe -
Suspicious use of AdjustPrivilegeToken 7 IoCs
description pid Process Token: SeTakeOwnershipPrivilege 1160 21353d65b457518570bffc8a03038ee0_NeikiAnalytics.exe Token: SeTakeOwnershipPrivilege 1160 21353d65b457518570bffc8a03038ee0_NeikiAnalytics.exe Token: SeTakeOwnershipPrivilege 1160 21353d65b457518570bffc8a03038ee0_NeikiAnalytics.exe Token: SeTakeOwnershipPrivilege 1160 21353d65b457518570bffc8a03038ee0_NeikiAnalytics.exe Token: SeTakeOwnershipPrivilege 1160 21353d65b457518570bffc8a03038ee0_NeikiAnalytics.exe Token: SeTakeOwnershipPrivilege 1160 21353d65b457518570bffc8a03038ee0_NeikiAnalytics.exe Token: SeTakeOwnershipPrivilege 1160 21353d65b457518570bffc8a03038ee0_NeikiAnalytics.exe -
Suspicious use of WriteProcessMemory 19 IoCs
description pid Process procid_target PID 4972 wrote to memory of 1568 4972 cmd.exe 101 PID 4972 wrote to memory of 1568 4972 cmd.exe 101 PID 4972 wrote to memory of 1568 4972 cmd.exe 101 PID 4972 wrote to memory of 636 4972 cmd.exe 104 PID 4972 wrote to memory of 636 4972 cmd.exe 104 PID 4972 wrote to memory of 636 4972 cmd.exe 104 PID 4972 wrote to memory of 1160 4972 cmd.exe 106 PID 4972 wrote to memory of 1160 4972 cmd.exe 106 PID 4972 wrote to memory of 1160 4972 cmd.exe 106 PID 1160 wrote to memory of 5288 1160 21353d65b457518570bffc8a03038ee0_NeikiAnalytics.exe 107 PID 1160 wrote to memory of 5288 1160 21353d65b457518570bffc8a03038ee0_NeikiAnalytics.exe 107 PID 5288 wrote to memory of 1976 5288 cmd.exe 109 PID 5288 wrote to memory of 1976 5288 cmd.exe 109 PID 1160 wrote to memory of 7152 1160 21353d65b457518570bffc8a03038ee0_NeikiAnalytics.exe 119 PID 1160 wrote to memory of 7152 1160 21353d65b457518570bffc8a03038ee0_NeikiAnalytics.exe 119 PID 1160 wrote to memory of 7152 1160 21353d65b457518570bffc8a03038ee0_NeikiAnalytics.exe 119 PID 7152 wrote to memory of 1552 7152 cmd.exe 121 PID 7152 wrote to memory of 1552 7152 cmd.exe 121 PID 7152 wrote to memory of 1552 7152 cmd.exe 121
Processes
-
C:\Users\Admin\AppData\Local\Temp\21353d65b457518570bffc8a03038ee0_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\21353d65b457518570bffc8a03038ee0_NeikiAnalytics.exe --help1⤵PID:2056
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4972 -
C:\Users\Admin\AppData\Local\Temp\21353d65b457518570bffc8a03038ee0_NeikiAnalytics.exe21353d65b457518570bffc8a03038ee0_NeikiAnalytics.exe -t2⤵PID:1568
-
-
C:\Users\Admin\AppData\Local\Temp\21353d65b457518570bffc8a03038ee0_NeikiAnalytics.exe21353d65b457518570bffc8a03038ee0_NeikiAnalytics.exe --help2⤵PID:636
-
-
C:\Users\Admin\AppData\Local\Temp\21353d65b457518570bffc8a03038ee0_NeikiAnalytics.exe21353d65b457518570bffc8a03038ee0_NeikiAnalytics.exe -l -v -m2⤵
- Drops startup file
- Enumerates connected drives
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1160 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /q /c bcdedit /set {default} recoveryenabled no3⤵
- Suspicious use of WriteProcessMemory
PID:5288 -
C:\Windows\system32\bcdedit.exebcdedit /set {default} recoveryenabled no4⤵
- Modifies boot configuration data using bcdedit
PID:1976
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /q /c ping localhost -n 5 > nul & del C:\Users\Admin\AppData\Local\Temp\21353d65b457518570bffc8a03038ee0_NeikiAnalytics.exe3⤵
- Suspicious use of WriteProcessMemory
PID:7152 -
C:\Windows\SysWOW64\PING.EXEping localhost -n 54⤵
- Runs ping.exe
PID:1552
-
-
-
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:6072
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Windows\debug\NetSetup.LOG1⤵
- Opens file in notepad (likely ransom note)
PID:4852
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Windows\debug\PASSWD.LOG1⤵
- Opens file in notepad (likely ransom note)
PID:6856
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Windows\debug\sammui.log1⤵
- Opens file in notepad (likely ransom note)
PID:2060
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Storage\ext\nmmhkkegccagdldgiimedpiccmgmieda\def\Shared Dictionary\db-journal.564ba1.partial
Filesize160B
MD51d0fc139a677f9c9a1e10220d3511dbd
SHA1cd4bda65c4800034130209efa0239b57b9722701
SHA256358a56c3ca1189c920178e8c6b49ff8b09999412def6652ccde6edd1abf85a17
SHA512e2d1c9bcc0e348b9d41722ec9573418efb715a6ae1cb80b1d9941afd5103cab1a5f37316f34a33d2243952973f07a181c93ed23cb8f8c19be6c142a13d1f5aba
-
Filesize
1KB
MD5760746c6bc18a85e7503567571fa6d8a
SHA10dfdce0bbc0c3aa4fa0507c40d4c14968fb28834
SHA256a9db836bdbf007aa6b13cfb9ad280be457138db4464990356d682128c3d2a0be
SHA512ff3f665660147120ba66bdbe472841a7f96daa81ca760c36c79cafa8216d5e8eb097f202ebfde5e0dc9ab761fb2ce72b3fb09aa854c872f9961e8f388f097ee7