Analysis
-
max time kernel
125s -
max time network
123s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
29-06-2024 04:40
Static task
static1
Behavioral task
behavioral1
Sample
6484a1beb77fa93cf21adbf91ba4c0c60985c2dab4be45370c7d8f48eedf0a7d_NeikiAnalytics.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
6484a1beb77fa93cf21adbf91ba4c0c60985c2dab4be45370c7d8f48eedf0a7d_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
6484a1beb77fa93cf21adbf91ba4c0c60985c2dab4be45370c7d8f48eedf0a7d_NeikiAnalytics.exe
-
Size
989KB
-
MD5
991ca34ddd5dd8615fe906a88d80fb30
-
SHA1
9c870be932ba1396d3e33df1e6e455a20ddd99b2
-
SHA256
6484a1beb77fa93cf21adbf91ba4c0c60985c2dab4be45370c7d8f48eedf0a7d
-
SHA512
433f506691da6f04928351287c8cd5bcf658f14513779c949ec66e500b8a68f340e01feb82beefcdb21a30496eaef19d3f8fd94e217cac0bbadc3f1411cc72f4
-
SSDEEP
12288:iDDjV0vdloI9mDZ1vDFki1WT08fcUkuoRm/SIo6I6JT/sRfpdC6M:KjWvsIMZ1hkSuoYaY/sRfXC6M
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
xfiles.exepid process 2124 xfiles.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
reg.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xfiless = "C:\\Users\\Admin\\AppData\\Roaming\\xfiles.exe" reg.exe -
Runs ping.exe 1 TTPs 3 IoCs
Processes:
PING.EXEPING.EXEPING.EXEpid process 1544 PING.EXE 684 PING.EXE 1016 PING.EXE -
Suspicious behavior: EnumeratesProcesses 27 IoCs
Processes:
6484a1beb77fa93cf21adbf91ba4c0c60985c2dab4be45370c7d8f48eedf0a7d_NeikiAnalytics.exexfiles.exepid process 4336 6484a1beb77fa93cf21adbf91ba4c0c60985c2dab4be45370c7d8f48eedf0a7d_NeikiAnalytics.exe 4336 6484a1beb77fa93cf21adbf91ba4c0c60985c2dab4be45370c7d8f48eedf0a7d_NeikiAnalytics.exe 4336 6484a1beb77fa93cf21adbf91ba4c0c60985c2dab4be45370c7d8f48eedf0a7d_NeikiAnalytics.exe 4336 6484a1beb77fa93cf21adbf91ba4c0c60985c2dab4be45370c7d8f48eedf0a7d_NeikiAnalytics.exe 4336 6484a1beb77fa93cf21adbf91ba4c0c60985c2dab4be45370c7d8f48eedf0a7d_NeikiAnalytics.exe 4336 6484a1beb77fa93cf21adbf91ba4c0c60985c2dab4be45370c7d8f48eedf0a7d_NeikiAnalytics.exe 4336 6484a1beb77fa93cf21adbf91ba4c0c60985c2dab4be45370c7d8f48eedf0a7d_NeikiAnalytics.exe 4336 6484a1beb77fa93cf21adbf91ba4c0c60985c2dab4be45370c7d8f48eedf0a7d_NeikiAnalytics.exe 4336 6484a1beb77fa93cf21adbf91ba4c0c60985c2dab4be45370c7d8f48eedf0a7d_NeikiAnalytics.exe 4336 6484a1beb77fa93cf21adbf91ba4c0c60985c2dab4be45370c7d8f48eedf0a7d_NeikiAnalytics.exe 4336 6484a1beb77fa93cf21adbf91ba4c0c60985c2dab4be45370c7d8f48eedf0a7d_NeikiAnalytics.exe 4336 6484a1beb77fa93cf21adbf91ba4c0c60985c2dab4be45370c7d8f48eedf0a7d_NeikiAnalytics.exe 4336 6484a1beb77fa93cf21adbf91ba4c0c60985c2dab4be45370c7d8f48eedf0a7d_NeikiAnalytics.exe 4336 6484a1beb77fa93cf21adbf91ba4c0c60985c2dab4be45370c7d8f48eedf0a7d_NeikiAnalytics.exe 4336 6484a1beb77fa93cf21adbf91ba4c0c60985c2dab4be45370c7d8f48eedf0a7d_NeikiAnalytics.exe 4336 6484a1beb77fa93cf21adbf91ba4c0c60985c2dab4be45370c7d8f48eedf0a7d_NeikiAnalytics.exe 4336 6484a1beb77fa93cf21adbf91ba4c0c60985c2dab4be45370c7d8f48eedf0a7d_NeikiAnalytics.exe 4336 6484a1beb77fa93cf21adbf91ba4c0c60985c2dab4be45370c7d8f48eedf0a7d_NeikiAnalytics.exe 4336 6484a1beb77fa93cf21adbf91ba4c0c60985c2dab4be45370c7d8f48eedf0a7d_NeikiAnalytics.exe 4336 6484a1beb77fa93cf21adbf91ba4c0c60985c2dab4be45370c7d8f48eedf0a7d_NeikiAnalytics.exe 4336 6484a1beb77fa93cf21adbf91ba4c0c60985c2dab4be45370c7d8f48eedf0a7d_NeikiAnalytics.exe 4336 6484a1beb77fa93cf21adbf91ba4c0c60985c2dab4be45370c7d8f48eedf0a7d_NeikiAnalytics.exe 4336 6484a1beb77fa93cf21adbf91ba4c0c60985c2dab4be45370c7d8f48eedf0a7d_NeikiAnalytics.exe 4336 6484a1beb77fa93cf21adbf91ba4c0c60985c2dab4be45370c7d8f48eedf0a7d_NeikiAnalytics.exe 4336 6484a1beb77fa93cf21adbf91ba4c0c60985c2dab4be45370c7d8f48eedf0a7d_NeikiAnalytics.exe 2124 xfiles.exe 2124 xfiles.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
6484a1beb77fa93cf21adbf91ba4c0c60985c2dab4be45370c7d8f48eedf0a7d_NeikiAnalytics.exexfiles.exedescription pid process Token: SeDebugPrivilege 4336 6484a1beb77fa93cf21adbf91ba4c0c60985c2dab4be45370c7d8f48eedf0a7d_NeikiAnalytics.exe Token: SeDebugPrivilege 2124 xfiles.exe -
Suspicious use of WriteProcessMemory 29 IoCs
Processes:
6484a1beb77fa93cf21adbf91ba4c0c60985c2dab4be45370c7d8f48eedf0a7d_NeikiAnalytics.execmd.execmd.exexfiles.exedescription pid process target process PID 4336 wrote to memory of 616 4336 6484a1beb77fa93cf21adbf91ba4c0c60985c2dab4be45370c7d8f48eedf0a7d_NeikiAnalytics.exe cmd.exe PID 4336 wrote to memory of 616 4336 6484a1beb77fa93cf21adbf91ba4c0c60985c2dab4be45370c7d8f48eedf0a7d_NeikiAnalytics.exe cmd.exe PID 4336 wrote to memory of 616 4336 6484a1beb77fa93cf21adbf91ba4c0c60985c2dab4be45370c7d8f48eedf0a7d_NeikiAnalytics.exe cmd.exe PID 616 wrote to memory of 1544 616 cmd.exe PING.EXE PID 616 wrote to memory of 1544 616 cmd.exe PING.EXE PID 616 wrote to memory of 1544 616 cmd.exe PING.EXE PID 4336 wrote to memory of 4964 4336 6484a1beb77fa93cf21adbf91ba4c0c60985c2dab4be45370c7d8f48eedf0a7d_NeikiAnalytics.exe cmd.exe PID 4336 wrote to memory of 4964 4336 6484a1beb77fa93cf21adbf91ba4c0c60985c2dab4be45370c7d8f48eedf0a7d_NeikiAnalytics.exe cmd.exe PID 4336 wrote to memory of 4964 4336 6484a1beb77fa93cf21adbf91ba4c0c60985c2dab4be45370c7d8f48eedf0a7d_NeikiAnalytics.exe cmd.exe PID 4964 wrote to memory of 684 4964 cmd.exe PING.EXE PID 4964 wrote to memory of 684 4964 cmd.exe PING.EXE PID 4964 wrote to memory of 684 4964 cmd.exe PING.EXE PID 616 wrote to memory of 3204 616 cmd.exe reg.exe PID 616 wrote to memory of 3204 616 cmd.exe reg.exe PID 616 wrote to memory of 3204 616 cmd.exe reg.exe PID 4964 wrote to memory of 1016 4964 cmd.exe PING.EXE PID 4964 wrote to memory of 1016 4964 cmd.exe PING.EXE PID 4964 wrote to memory of 1016 4964 cmd.exe PING.EXE PID 4964 wrote to memory of 2124 4964 cmd.exe xfiles.exe PID 4964 wrote to memory of 2124 4964 cmd.exe xfiles.exe PID 4964 wrote to memory of 2124 4964 cmd.exe xfiles.exe PID 2124 wrote to memory of 5112 2124 xfiles.exe InstallUtil.exe PID 2124 wrote to memory of 5112 2124 xfiles.exe InstallUtil.exe PID 2124 wrote to memory of 5112 2124 xfiles.exe InstallUtil.exe PID 2124 wrote to memory of 5112 2124 xfiles.exe InstallUtil.exe PID 2124 wrote to memory of 5112 2124 xfiles.exe InstallUtil.exe PID 2124 wrote to memory of 5112 2124 xfiles.exe InstallUtil.exe PID 2124 wrote to memory of 5112 2124 xfiles.exe InstallUtil.exe PID 2124 wrote to memory of 5112 2124 xfiles.exe InstallUtil.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\6484a1beb77fa93cf21adbf91ba4c0c60985c2dab4be45370c7d8f48eedf0a7d_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\6484a1beb77fa93cf21adbf91ba4c0c60985c2dab4be45370c7d8f48eedf0a7d_NeikiAnalytics.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe"cmd" /c ping 127.0.0.1 -n 29 > nul && REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "xfiless" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\xfiles.exe"2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 293⤵
- Runs ping.exe
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "xfiless" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\xfiles.exe"3⤵
- Adds Run key to start application
-
C:\Windows\SysWOW64\cmd.exe"cmd" /c ping 127.0.0.1 -n 39 > nul && copy "C:\Users\Admin\AppData\Local\Temp\6484a1beb77fa93cf21adbf91ba4c0c60985c2dab4be45370c7d8f48eedf0a7d_NeikiAnalytics.exe" "C:\Users\Admin\AppData\Roaming\xfiles.exe" && ping 127.0.0.1 -n 39 > nul && "C:\Users\Admin\AppData\Roaming\xfiles.exe"2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 393⤵
- Runs ping.exe
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 393⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\xfiles.exe"C:\Users\Admin\AppData\Roaming\xfiles.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"4⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\xfiles.exeFilesize
989KB
MD5991ca34ddd5dd8615fe906a88d80fb30
SHA19c870be932ba1396d3e33df1e6e455a20ddd99b2
SHA2566484a1beb77fa93cf21adbf91ba4c0c60985c2dab4be45370c7d8f48eedf0a7d
SHA512433f506691da6f04928351287c8cd5bcf658f14513779c949ec66e500b8a68f340e01feb82beefcdb21a30496eaef19d3f8fd94e217cac0bbadc3f1411cc72f4
-
memory/2124-23-0x0000000009E90000-0x0000000009E96000-memory.dmpFilesize
24KB
-
memory/2124-22-0x0000000007820000-0x000000000783A000-memory.dmpFilesize
104KB
-
memory/2124-21-0x0000000074D80000-0x0000000075530000-memory.dmpFilesize
7.7MB
-
memory/2124-20-0x0000000074D80000-0x0000000075530000-memory.dmpFilesize
7.7MB
-
memory/2124-19-0x0000000074D80000-0x0000000075530000-memory.dmpFilesize
7.7MB
-
memory/2124-18-0x0000000000420000-0x000000000051C000-memory.dmpFilesize
1008KB
-
memory/4336-4-0x00000000051C0000-0x0000000005252000-memory.dmpFilesize
584KB
-
memory/4336-8-0x0000000074DB0000-0x0000000075560000-memory.dmpFilesize
7.7MB
-
memory/4336-9-0x0000000074DBE000-0x0000000074DBF000-memory.dmpFilesize
4KB
-
memory/4336-10-0x0000000074DB0000-0x0000000075560000-memory.dmpFilesize
7.7MB
-
memory/4336-12-0x0000000074DB0000-0x0000000075560000-memory.dmpFilesize
7.7MB
-
memory/4336-7-0x00000000064C0000-0x00000000064CA000-memory.dmpFilesize
40KB
-
memory/4336-6-0x0000000006200000-0x0000000006244000-memory.dmpFilesize
272KB
-
memory/4336-5-0x0000000074DB0000-0x0000000075560000-memory.dmpFilesize
7.7MB
-
memory/4336-0-0x0000000074DBE000-0x0000000074DBF000-memory.dmpFilesize
4KB
-
memory/4336-3-0x00000000056D0000-0x0000000005C74000-memory.dmpFilesize
5.6MB
-
memory/4336-2-0x0000000005070000-0x000000000510C000-memory.dmpFilesize
624KB
-
memory/4336-1-0x0000000000F50000-0x000000000104C000-memory.dmpFilesize
1008KB