Analysis
-
max time kernel
120s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
01-07-2024 21:48
Behavioral task
behavioral1
Sample
0ccd8ebf242998355d78e564b12ff183377a89c84cbd3478535e5e6155cb645e_NeikiAnalytics.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
0ccd8ebf242998355d78e564b12ff183377a89c84cbd3478535e5e6155cb645e_NeikiAnalytics.exe
Resource
win10v2004-20240226-en
General
-
Target
0ccd8ebf242998355d78e564b12ff183377a89c84cbd3478535e5e6155cb645e_NeikiAnalytics.exe
-
Size
5.5MB
-
MD5
c4c696e6ea81e3e94050d4bfca2d4350
-
SHA1
fbe76e557521504be389722ce25b4ad229ae2858
-
SHA256
0ccd8ebf242998355d78e564b12ff183377a89c84cbd3478535e5e6155cb645e
-
SHA512
1f2a0403bbcfdc1e7c501c87c8d0d1b352f21ac52001e0798e9aee5eabe4df734cfbd11201903fc8fb03918a6851aed695520da869b1559e4541a248eb7dacf4
-
SSDEEP
98304:+iNCFT1fzFo347hHCbg1VD1e9HJlJCX4gqXv8wHtundQ+QCA86WLoz:+i4HLhHCIMHUcXEwgnmRj9Coz
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral1/memory/2492-37-0x0000000000400000-0x0000000000DA0000-memory.dmp vmprotect behavioral1/memory/2492-39-0x0000000000400000-0x0000000000DA0000-memory.dmp vmprotect behavioral1/memory/2492-40-0x0000000000400000-0x0000000000DA0000-memory.dmp vmprotect behavioral1/memory/2492-43-0x0000000000400000-0x0000000000DA0000-memory.dmp vmprotect -
Launches sc.exe 2 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exesc.exepid process 2680 sc.exe 2604 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
0ccd8ebf242998355d78e564b12ff183377a89c84cbd3478535e5e6155cb645e_NeikiAnalytics.exepid process 2492 0ccd8ebf242998355d78e564b12ff183377a89c84cbd3478535e5e6155cb645e_NeikiAnalytics.exe 2492 0ccd8ebf242998355d78e564b12ff183377a89c84cbd3478535e5e6155cb645e_NeikiAnalytics.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
0ccd8ebf242998355d78e564b12ff183377a89c84cbd3478535e5e6155cb645e_NeikiAnalytics.exepid process 2492 0ccd8ebf242998355d78e564b12ff183377a89c84cbd3478535e5e6155cb645e_NeikiAnalytics.exe -
Suspicious use of SendNotifyMessage 1 IoCs
Processes:
0ccd8ebf242998355d78e564b12ff183377a89c84cbd3478535e5e6155cb645e_NeikiAnalytics.exepid process 2492 0ccd8ebf242998355d78e564b12ff183377a89c84cbd3478535e5e6155cb645e_NeikiAnalytics.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
0ccd8ebf242998355d78e564b12ff183377a89c84cbd3478535e5e6155cb645e_NeikiAnalytics.exepid process 2492 0ccd8ebf242998355d78e564b12ff183377a89c84cbd3478535e5e6155cb645e_NeikiAnalytics.exe 2492 0ccd8ebf242998355d78e564b12ff183377a89c84cbd3478535e5e6155cb645e_NeikiAnalytics.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
0ccd8ebf242998355d78e564b12ff183377a89c84cbd3478535e5e6155cb645e_NeikiAnalytics.exedescription pid process target process PID 2492 wrote to memory of 2680 2492 0ccd8ebf242998355d78e564b12ff183377a89c84cbd3478535e5e6155cb645e_NeikiAnalytics.exe sc.exe PID 2492 wrote to memory of 2680 2492 0ccd8ebf242998355d78e564b12ff183377a89c84cbd3478535e5e6155cb645e_NeikiAnalytics.exe sc.exe PID 2492 wrote to memory of 2680 2492 0ccd8ebf242998355d78e564b12ff183377a89c84cbd3478535e5e6155cb645e_NeikiAnalytics.exe sc.exe PID 2492 wrote to memory of 2680 2492 0ccd8ebf242998355d78e564b12ff183377a89c84cbd3478535e5e6155cb645e_NeikiAnalytics.exe sc.exe PID 2492 wrote to memory of 2604 2492 0ccd8ebf242998355d78e564b12ff183377a89c84cbd3478535e5e6155cb645e_NeikiAnalytics.exe sc.exe PID 2492 wrote to memory of 2604 2492 0ccd8ebf242998355d78e564b12ff183377a89c84cbd3478535e5e6155cb645e_NeikiAnalytics.exe sc.exe PID 2492 wrote to memory of 2604 2492 0ccd8ebf242998355d78e564b12ff183377a89c84cbd3478535e5e6155cb645e_NeikiAnalytics.exe sc.exe PID 2492 wrote to memory of 2604 2492 0ccd8ebf242998355d78e564b12ff183377a89c84cbd3478535e5e6155cb645e_NeikiAnalytics.exe sc.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\0ccd8ebf242998355d78e564b12ff183377a89c84cbd3478535e5e6155cb645e_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\0ccd8ebf242998355d78e564b12ff183377a89c84cbd3478535e5e6155cb645e_NeikiAnalytics.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\sc.exesc stop UxSms2⤵
- Launches sc.exe
-
C:\Windows\SysWOW64\sc.exesc start UxSms2⤵
- Launches sc.exe
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/2492-24-0x0000000000190000-0x0000000000191000-memory.dmpFilesize
4KB
-
memory/2492-29-0x00000000001A0000-0x00000000001A1000-memory.dmpFilesize
4KB
-
memory/2492-36-0x00000000004CE000-0x0000000000813000-memory.dmpFilesize
3.3MB
-
memory/2492-34-0x00000000001B0000-0x00000000001B1000-memory.dmpFilesize
4KB
-
memory/2492-32-0x00000000001B0000-0x00000000001B1000-memory.dmpFilesize
4KB
-
memory/2492-30-0x00000000001B0000-0x00000000001B1000-memory.dmpFilesize
4KB
-
memory/2492-27-0x00000000001A0000-0x00000000001A1000-memory.dmpFilesize
4KB
-
memory/2492-22-0x0000000000190000-0x0000000000191000-memory.dmpFilesize
4KB
-
memory/2492-19-0x0000000000170000-0x0000000000171000-memory.dmpFilesize
4KB
-
memory/2492-17-0x0000000000170000-0x0000000000171000-memory.dmpFilesize
4KB
-
memory/2492-14-0x0000000000160000-0x0000000000161000-memory.dmpFilesize
4KB
-
memory/2492-12-0x0000000000160000-0x0000000000161000-memory.dmpFilesize
4KB
-
memory/2492-9-0x0000000000150000-0x0000000000151000-memory.dmpFilesize
4KB
-
memory/2492-7-0x0000000000150000-0x0000000000151000-memory.dmpFilesize
4KB
-
memory/2492-5-0x0000000000150000-0x0000000000151000-memory.dmpFilesize
4KB
-
memory/2492-4-0x0000000000130000-0x0000000000131000-memory.dmpFilesize
4KB
-
memory/2492-2-0x0000000000130000-0x0000000000131000-memory.dmpFilesize
4KB
-
memory/2492-0-0x0000000000130000-0x0000000000131000-memory.dmpFilesize
4KB
-
memory/2492-37-0x0000000000400000-0x0000000000DA0000-memory.dmpFilesize
9.6MB
-
memory/2492-39-0x0000000000400000-0x0000000000DA0000-memory.dmpFilesize
9.6MB
-
memory/2492-40-0x0000000000400000-0x0000000000DA0000-memory.dmpFilesize
9.6MB
-
memory/2492-42-0x00000000004CE000-0x0000000000813000-memory.dmpFilesize
3.3MB
-
memory/2492-43-0x0000000000400000-0x0000000000DA0000-memory.dmpFilesize
9.6MB