Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
01-07-2024 05:38
Behavioral task
behavioral1
Sample
3948b9da5ad377018b073740a984e54445a56fe85cd95effb6b8401978327265_NeikiAnalytics.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
3948b9da5ad377018b073740a984e54445a56fe85cd95effb6b8401978327265_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
3948b9da5ad377018b073740a984e54445a56fe85cd95effb6b8401978327265_NeikiAnalytics.exe
-
Size
29KB
-
MD5
c1d2f37f8c4af958518504a30e8cedb0
-
SHA1
6d8b85c22e3cfc025e7f9ca9c6368e345919c4ba
-
SHA256
3948b9da5ad377018b073740a984e54445a56fe85cd95effb6b8401978327265
-
SHA512
12d031bcfc83f1cc15a602d3f49586fa7eb94b3bb51ba0ed4c411aecfcca6609043bf1736bf62ce2f1d945b6512157c0cbe73033e68e6ff83e4e4fa66b89f2af
-
SSDEEP
768:AEwHupU99d2JE0jNJJ83+8zzqgTdVY9/O:AEwVs+0jNDY1qi/q2
Malware Config
Signatures
-
Detected microsoft outlook phishing page
-
Executes dropped EXE 1 IoCs
Processes:
services.exepid process 2504 services.exe -
Processes:
resource yara_rule behavioral2/memory/4604-0-0x0000000000500000-0x0000000000510200-memory.dmp upx C:\Windows\services.exe upx behavioral2/memory/2504-6-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/4604-13-0x0000000000500000-0x0000000000510200-memory.dmp upx behavioral2/memory/2504-14-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/2504-19-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/2504-24-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/2504-26-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/2504-31-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/2504-36-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/4604-37-0x0000000000500000-0x0000000000510200-memory.dmp upx behavioral2/memory/2504-38-0x0000000000400000-0x0000000000408000-memory.dmp upx C:\Users\Admin\AppData\Local\Temp\tmp7C9F.tmp upx behavioral2/memory/4604-191-0x0000000000500000-0x0000000000510200-memory.dmp upx behavioral2/memory/2504-192-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/4604-305-0x0000000000500000-0x0000000000510200-memory.dmp upx behavioral2/memory/2504-306-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/2504-308-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/4604-312-0x0000000000500000-0x0000000000510200-memory.dmp upx behavioral2/memory/2504-313-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/4604-362-0x0000000000500000-0x0000000000510200-memory.dmp upx behavioral2/memory/2504-363-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/4604-364-0x0000000000500000-0x0000000000510200-memory.dmp upx behavioral2/memory/2504-365-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/4604-399-0x0000000000500000-0x0000000000510200-memory.dmp upx behavioral2/memory/2504-400-0x0000000000400000-0x0000000000408000-memory.dmp upx -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
3948b9da5ad377018b073740a984e54445a56fe85cd95effb6b8401978327265_NeikiAnalytics.exeservices.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\JavaVM = "C:\\Windows\\java.exe" 3948b9da5ad377018b073740a984e54445a56fe85cd95effb6b8401978327265_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Windows\\services.exe" services.exe -
Drops file in Windows directory 3 IoCs
Processes:
3948b9da5ad377018b073740a984e54445a56fe85cd95effb6b8401978327265_NeikiAnalytics.exedescription ioc process File opened for modification C:\Windows\java.exe 3948b9da5ad377018b073740a984e54445a56fe85cd95effb6b8401978327265_NeikiAnalytics.exe File created C:\Windows\java.exe 3948b9da5ad377018b073740a984e54445a56fe85cd95effb6b8401978327265_NeikiAnalytics.exe File created C:\Windows\services.exe 3948b9da5ad377018b073740a984e54445a56fe85cd95effb6b8401978327265_NeikiAnalytics.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
3948b9da5ad377018b073740a984e54445a56fe85cd95effb6b8401978327265_NeikiAnalytics.exedescription pid process target process PID 4604 wrote to memory of 2504 4604 3948b9da5ad377018b073740a984e54445a56fe85cd95effb6b8401978327265_NeikiAnalytics.exe services.exe PID 4604 wrote to memory of 2504 4604 3948b9da5ad377018b073740a984e54445a56fe85cd95effb6b8401978327265_NeikiAnalytics.exe services.exe PID 4604 wrote to memory of 2504 4604 3948b9da5ad377018b073740a984e54445a56fe85cd95effb6b8401978327265_NeikiAnalytics.exe services.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\3948b9da5ad377018b073740a984e54445a56fe85cd95effb6b8401978327265_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\3948b9da5ad377018b073740a984e54445a56fe85cd95effb6b8401978327265_NeikiAnalytics.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
-
C:\Windows\services.exe"C:\Windows\services.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\0RV7W6KN\results[3].htmFilesize
1KB
MD5211da0345fa466aa8dbde830c83c19f8
SHA1779ece4d54a099274b2814a9780000ba49af1b81
SHA256aec2ac9539d1b0cac493bbf90948eca455c6803342cc83d0a107055c1d131fd5
SHA51237fd7ef6e11a1866e844439318ae813059106fbd52c24f580781d90da3f64829cf9654acac0dd0f2098081256c5dcdf35c70b2cbef6cbe3f0b91bd2d8edd22ca
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\0RV7W6KN\search[2].htmFilesize
145KB
MD500441c408aeca465ed7dbd0aaab79fff
SHA182832a807655956474b3297e49c00020972a8fba
SHA2565b2af758566afa79ba59ca79e0dcfd4793b8a185935ecec7c7242ae8ca34ef91
SHA51287a273d3480a31cd81eebb38219b56c48010a7a4d7df9c707e34b5e634f00ad2d7dce08d9ef04c15b47606dd7fc6f1117d21ed287b12c5de25572f9c7fdcbc71
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\6TQEXKX3\results[5].htmFilesize
1KB
MD5ee4aed56584bf64c08683064e422b722
SHA145e5ba33f57c6848e84b66e7e856a6b60af6c4a8
SHA256a4e6ba8c1fe3df423e6f17fcbeeaa7e90e2bd2fffe8f98ff4b3e6ed970e32c61
SHA512058f023cb934a00c8f1c689001438c9bdd067d923ddcbe7a951f54d3ca82218803e0e81fbc9af5c56375ff7961deed0359af1ffa7335d41379ee97d01a76ded6
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\6TQEXKX3\searchODWJY3QF.htmFilesize
114KB
MD57acd7d2ab002157a86a2a330805b8bb2
SHA119e07bd2dea118dadc97efee777c260a3ff1b6b9
SHA256fb202c1780e543704b31ee353fd6c4b281abbcde810e2a90b3e5571eb46435a0
SHA51293f6fb12f6d09b7bd54546a1fb1e18874727c1bd270d8c8ba3e7d8fcc31a724ab4094bc767feee03cdaceba293f10c166c13a55a472ac829f143c2579600ba1d
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\6TQEXKX3\search[2].htmFilesize
25B
MD58ba61a16b71609a08bfa35bc213fce49
SHA18374dddcc6b2ede14b0ea00a5870a11b57ced33f
SHA2566aa63394c1f5e705b1e89c55ff19eed71957e735c3831a845ff62f74824e13f1
SHA5125855f5b2a78877f7a27ff92eaaa900d81d02486e6e2ea81d80b6f6cf1fe254350444980017e00cdeecdd3c67b86e7acc90cd2d77f06210bdd1d7b1a71d262df1
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\6TQEXKX3\search[3].htmFilesize
140KB
MD5597f953d2c2bbe31ffffcebf14eeb3a6
SHA10d08755d01c712b8fc03e2803aea56b1163dfa44
SHA25619e45bfe699dbb9af7a6579d71ab63f1961ef1494957d55d22874d2a7b0b65c3
SHA5122170711f19fdf868b1e7908d7a27237c433982a61323bae36ab67ed0daff5b265174d4df8396f1db9309b31fcb77be82c57ba9cc20eb452e34379e5feab1eb97
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\DKWDYRX8\searchECWQS9VU.htmFilesize
143KB
MD5cfe2e7e76a771f150c23f01dc0454bfe
SHA179befd2c860c5b2075f68a221844479fb53b6bf9
SHA256006e4547e0d7277e18d7a8ceb1677051612821e4e229f467d951e0b57d4e8509
SHA512d9dd25868315fadb2bf2f120d66a0ad1313eda4a9980af0270357e83e47a845c829c59d01df262c6359bd1233db588b7f3b6522794d6431662bba4d736fe91a1
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\DKWDYRX8\searchRJOVISHZ.htmFilesize
151KB
MD549463e1ad31ba280fd5ff9ea0e7b66a8
SHA1b7638a49f675feff1d8660673db96fd5b8e0b5ec
SHA256cbd409e6faad9f2faec4d54520a29a4186beba4bb3befb54029ced35b916678d
SHA51257af751ab3327282daec8e95b6433bc543cf461c7a6bfb493d940ee022c6b95c4218dd05a968081ef9f58ec853311f9188a9f981bd67ffb5903ecf388b7f339b
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\DKWDYRX8\search[1].htmFilesize
122KB
MD52d39c23b3a55fcbb57efaf8b4b89b66f
SHA1e0dbc7d75b6d929e70ac16defa53f75be5d05997
SHA2564a2fcd7b4664790c458c3eb555afd0db9b2a485e304d1140548a0b87cae64c66
SHA512e33cd49828c6c4b983104d60c2bbe094c6abb97add066bd4e5a925bbd9ea4a31f9e4a4929ef2ad447f763fb1d97ad2c488d74e2a9ba782f36f0855818d35d21d
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\DKWDYRX8\search[8].htmFilesize
134KB
MD5ffc109f5d03962f1824c157a913fec02
SHA1141c819b5c26fc9aac6f3be9960a653d1616aea5
SHA2567882cdb5cead6df3c1f1f455ed86bacb779f5f47a04447b04cb5a8418f590fa7
SHA512588679f5a16fac84d393602e1af3b33c35942f6bfa8711babb19ad498d7721d4bafc31943413b0fe22f3b6e4116fc9b4f93828f319882bdff9b0780b73cac84b
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\DKWDYRX8\search[9].htmFilesize
140KB
MD5ca5178e07b80f0293f0ac3d36bcb0fb4
SHA1173654e8aa847761ffe3be2b072a969aff180603
SHA2568f105e9c34863817aa7e545125da0646db0b9d7d1c3983e0201319ab1917f0ba
SHA512a65b2ae04e50fd487619896a2e27fa68414f18db38171ed3a24d1bf65d830f7b33c470b8590526e4dea20387bf9f5eef3e40d1455dc5dcf3e37d167d26f114a6
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\PGYR01BB\CQLHK4TL.htmFilesize
175KB
MD512cb33983ce0d0044f35b493bc872663
SHA1509a701006fd08535d9e80fade05e6d4acb07335
SHA256a5f86bc067c568b67c498b5e589c65237dcd2ed59053e710f1d86270941b9bbd
SHA512a4a9f0a788c1aa064ace48239ab7711de9315ffd66fdefadacab224561ee9198e05c5db6627806222105afce07907069017b4c4045ae166db87265743705cb9e
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\PGYR01BB\search[10].htmFilesize
172KB
MD5be51546cedd2e530f67cddb9170bd6b4
SHA1c330ff6d8492472612c6238f91d12394a16b4eb8
SHA25688867de0bbabc8baacb9d989a3b718a4eee28ec4b03e78558d44ea95f41e66ce
SHA512516f8897fc8ca7a016cca27ed19df1cf981749132d2dae36d6437b1ea42a51038209a484027856a2c33d57dc89cf4939d05e26283cfe9b06cf23583679e67865
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\PGYR01BB\search[1].htmFilesize
157KB
MD55bf78baf51391870fd3dd624208dda33
SHA185fc55a1564834d52a5d8c1a02c56e5675f8bb8e
SHA25695ec1df2f1396cb05295252efd8c13a1b5da1e98a53348244b721f50b63924bc
SHA5123deb908db0bb0f50d31022680dc906d91fab9d7534d6c035097324648afe6be61d82257fbca9168518b60f65c0c959d24ca7e73e8ca05ab40020bdae01f3bf2f
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\PGYR01BB\search[5].htmFilesize
183KB
MD511b353704db3137da0de51bd8db4b3a6
SHA1d3b35a9bd7ccd5d0be5bd3a0353f9cb6d73a334d
SHA2568345b6c4428838b0dbe4ca8451d56f32372806bd0c2ae295f9dc8c0a64555ec5
SHA5125d31c1911c4257322d7b73686e7bfd4b3db250351f402dc2275286f3f15b73877b38d07fa016d1b19ff5ba8c07d816619743933db06a78f8b0df4735b3fb8e1d
-
C:\Users\Admin\AppData\Local\Temp\tmp7C9F.tmpFilesize
29KB
MD5752d995e200e3345f313aa11dbc30f7c
SHA13260dfebfe73a3ace1276ba6d5bb187d290b0fc2
SHA2562748ba53d03d174a036844d100b67da47c7b3adbf2e1f7cd167388ca74eec8f9
SHA5128e351d5e1322b2c2c59dbfd237c781fe0845aa5889bed69255620f05c6d9adef8bf9934b5c06ab29d1d5ef7de0dd29c8bf2584a700761120bbdbd58157962d1a
-
C:\Users\Admin\AppData\Local\Temp\zincite.logFilesize
352B
MD58176c9ed78ccb67853b555b0cb4b95ae
SHA15c91e6131d633da00d1f32dce51299b061db33d0
SHA256f5736e836700a57d3e594b965bedbe358a791b4723cac3c307b153014450b653
SHA51257740f61043416d4bd29ccc6f55d9c58d601f24af66983964d9e9bdbe327d7b97d23fe04dd256447160feac02a5b4878a175bb201baa250762fa49b75ebc3faa
-
C:\Users\Admin\AppData\Local\Temp\zincite.logFilesize
352B
MD582b18c0870351c6ad84b74e10b37555e
SHA14ec2f229b0610dfa74329ae9805ba6c8af18a25a
SHA25647463a8babeec0ff91ae0a5e8e443444dcfc298516419a4a26b9a1cab24aafd7
SHA512a2e8a69d642a18c70cf847ac80632ad9730eee5b835bcd83268e34fb92208eb4f8adf812ae285088f2db4f0aa137c8d161a847b92386b7bdf05f064973b29ef2
-
C:\Users\Admin\AppData\Local\Temp\zincite.logFilesize
352B
MD5d25cbf65faff81beac38c568c0f126a1
SHA17508ac627e97b29d6a26411189ccd8c4f4f4eeb7
SHA256a2fa1475121323d5c6529220d3d07311c94dac1054b31ea00db6691b0af5a509
SHA512e7b2af6dc616b0f7686590167d5aad6692fc0c20064cd61dd8eaaa425275b3a1f98844470fb42e5a558831a718f6fc72e22bd2ff15e7adf9fef46a1af1d07e5b
-
C:\Users\Admin\AppData\Local\Temp\zincite.logFilesize
352B
MD58115478ad059b345f7f118189a120351
SHA138e18a0bf3b84c746e443590473e9a00278a6277
SHA256b1b6b0f6d58c5d4436d65dd5b344f9aa0c44277570f3229bf7d3e76f39dfcc0f
SHA5127afa4acba3e2b2b3cf6fb66120611e37600630bb697a7da874b57ffcd2fe2e864cad3b0b907d998572f4ca83ec0ac98158dcda7720f0a59be874d9c2c628e102
-
C:\Users\Admin\AppData\Local\Temp\zincite.logMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
C:\Windows\services.exeFilesize
8KB
MD5b0fe74719b1b647e2056641931907f4a
SHA1e858c206d2d1542a79936cb00d85da853bfc95e2
SHA256bf316f51d0c345d61eaee3940791b64e81f676e3bca42bad61073227bee6653c
SHA5129c82e88264696d0dadef9c0442ad8d1183e48f0fb355a4fc9bf4fa5db4e27745039f98b1fd1febff620a5ded6dd493227f00d7d2e74b19757685aa8655f921c2
-
memory/2504-31-0x0000000000400000-0x0000000000408000-memory.dmpFilesize
32KB
-
memory/2504-192-0x0000000000400000-0x0000000000408000-memory.dmpFilesize
32KB
-
memory/2504-38-0x0000000000400000-0x0000000000408000-memory.dmpFilesize
32KB
-
memory/2504-36-0x0000000000400000-0x0000000000408000-memory.dmpFilesize
32KB
-
memory/2504-306-0x0000000000400000-0x0000000000408000-memory.dmpFilesize
32KB
-
memory/2504-308-0x0000000000400000-0x0000000000408000-memory.dmpFilesize
32KB
-
memory/2504-400-0x0000000000400000-0x0000000000408000-memory.dmpFilesize
32KB
-
memory/2504-313-0x0000000000400000-0x0000000000408000-memory.dmpFilesize
32KB
-
memory/2504-26-0x0000000000400000-0x0000000000408000-memory.dmpFilesize
32KB
-
memory/2504-24-0x0000000000400000-0x0000000000408000-memory.dmpFilesize
32KB
-
memory/2504-363-0x0000000000400000-0x0000000000408000-memory.dmpFilesize
32KB
-
memory/2504-19-0x0000000000400000-0x0000000000408000-memory.dmpFilesize
32KB
-
memory/2504-365-0x0000000000400000-0x0000000000408000-memory.dmpFilesize
32KB
-
memory/2504-14-0x0000000000400000-0x0000000000408000-memory.dmpFilesize
32KB
-
memory/2504-6-0x0000000000400000-0x0000000000408000-memory.dmpFilesize
32KB
-
memory/4604-37-0x0000000000500000-0x0000000000510200-memory.dmpFilesize
64KB
-
memory/4604-399-0x0000000000500000-0x0000000000510200-memory.dmpFilesize
64KB
-
memory/4604-364-0x0000000000500000-0x0000000000510200-memory.dmpFilesize
64KB
-
memory/4604-362-0x0000000000500000-0x0000000000510200-memory.dmpFilesize
64KB
-
memory/4604-312-0x0000000000500000-0x0000000000510200-memory.dmpFilesize
64KB
-
memory/4604-305-0x0000000000500000-0x0000000000510200-memory.dmpFilesize
64KB
-
memory/4604-191-0x0000000000500000-0x0000000000510200-memory.dmpFilesize
64KB
-
memory/4604-0-0x0000000000500000-0x0000000000510200-memory.dmpFilesize
64KB
-
memory/4604-13-0x0000000000500000-0x0000000000510200-memory.dmpFilesize
64KB