Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
01-07-2024 10:01
Behavioral task
behavioral1
Sample
492589e6874b3bd1b7ba9f4cf722ef06c9eba644a07f3046ba51b8c48b13f554_NeikiAnalytics.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
492589e6874b3bd1b7ba9f4cf722ef06c9eba644a07f3046ba51b8c48b13f554_NeikiAnalytics.exe
Resource
win10v2004-20240611-en
General
-
Target
492589e6874b3bd1b7ba9f4cf722ef06c9eba644a07f3046ba51b8c48b13f554_NeikiAnalytics.exe
-
Size
41KB
-
MD5
b9bf43dc48e29539b7e37728cdd77b70
-
SHA1
95840dfeb95a41334402406aedb8ec8e9d04eb6f
-
SHA256
492589e6874b3bd1b7ba9f4cf722ef06c9eba644a07f3046ba51b8c48b13f554
-
SHA512
aa4b9e1e190640671727006849b8ba74b9dc9e491c3a7ad41d633eb26f4096dcfd9e0dbe06fc57f42bf219b2a90bd6a9ef14d3b79b9f3784596ccb63c9fc6994
-
SSDEEP
768:AEwHupU99d2JE0jNJJ83+8zzqgTdVY9/:AEwVs+0jNDY1qi/q
Malware Config
Signatures
-
Detected microsoft outlook phishing page
-
Executes dropped EXE 1 IoCs
Processes:
services.exepid process 2260 services.exe -
Processes:
resource yara_rule behavioral2/memory/4416-0-0x0000000000500000-0x0000000000510200-memory.dmp upx C:\Windows\services.exe upx behavioral2/memory/2260-5-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/4416-13-0x0000000000500000-0x0000000000510200-memory.dmp upx behavioral2/memory/2260-14-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/2260-19-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/2260-24-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/2260-26-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/2260-31-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/2260-36-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/2260-38-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/4416-42-0x0000000000500000-0x0000000000510200-memory.dmp upx behavioral2/memory/2260-43-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/4416-47-0x0000000000500000-0x0000000000510200-memory.dmp upx behavioral2/memory/2260-48-0x0000000000400000-0x0000000000408000-memory.dmp upx C:\Users\Admin\AppData\Local\Temp\tmpD483.tmp upx behavioral2/memory/4416-234-0x0000000000500000-0x0000000000510200-memory.dmp upx behavioral2/memory/2260-235-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/4416-351-0x0000000000500000-0x0000000000510200-memory.dmp upx behavioral2/memory/2260-352-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/2260-356-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/4416-357-0x0000000000500000-0x0000000000510200-memory.dmp upx behavioral2/memory/2260-358-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/2260-496-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/4416-495-0x0000000000500000-0x0000000000510200-memory.dmp upx -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
492589e6874b3bd1b7ba9f4cf722ef06c9eba644a07f3046ba51b8c48b13f554_NeikiAnalytics.exeservices.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\JavaVM = "C:\\Windows\\java.exe" 492589e6874b3bd1b7ba9f4cf722ef06c9eba644a07f3046ba51b8c48b13f554_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Windows\\services.exe" services.exe -
Drops file in Windows directory 3 IoCs
Processes:
492589e6874b3bd1b7ba9f4cf722ef06c9eba644a07f3046ba51b8c48b13f554_NeikiAnalytics.exedescription ioc process File created C:\Windows\services.exe 492589e6874b3bd1b7ba9f4cf722ef06c9eba644a07f3046ba51b8c48b13f554_NeikiAnalytics.exe File opened for modification C:\Windows\java.exe 492589e6874b3bd1b7ba9f4cf722ef06c9eba644a07f3046ba51b8c48b13f554_NeikiAnalytics.exe File created C:\Windows\java.exe 492589e6874b3bd1b7ba9f4cf722ef06c9eba644a07f3046ba51b8c48b13f554_NeikiAnalytics.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
492589e6874b3bd1b7ba9f4cf722ef06c9eba644a07f3046ba51b8c48b13f554_NeikiAnalytics.exedescription pid process target process PID 4416 wrote to memory of 2260 4416 492589e6874b3bd1b7ba9f4cf722ef06c9eba644a07f3046ba51b8c48b13f554_NeikiAnalytics.exe services.exe PID 4416 wrote to memory of 2260 4416 492589e6874b3bd1b7ba9f4cf722ef06c9eba644a07f3046ba51b8c48b13f554_NeikiAnalytics.exe services.exe PID 4416 wrote to memory of 2260 4416 492589e6874b3bd1b7ba9f4cf722ef06c9eba644a07f3046ba51b8c48b13f554_NeikiAnalytics.exe services.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\492589e6874b3bd1b7ba9f4cf722ef06c9eba644a07f3046ba51b8c48b13f554_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\492589e6874b3bd1b7ba9f4cf722ef06c9eba644a07f3046ba51b8c48b13f554_NeikiAnalytics.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
-
C:\Windows\services.exe"C:\Windows\services.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\8Z1Z4637\results[1].htmFilesize
1KB
MD5211da0345fa466aa8dbde830c83c19f8
SHA1779ece4d54a099274b2814a9780000ba49af1b81
SHA256aec2ac9539d1b0cac493bbf90948eca455c6803342cc83d0a107055c1d131fd5
SHA51237fd7ef6e11a1866e844439318ae813059106fbd52c24f580781d90da3f64829cf9654acac0dd0f2098081256c5dcdf35c70b2cbef6cbe3f0b91bd2d8edd22ca
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\8Z1Z4637\searchJ220O303.htmFilesize
116KB
MD56d1a756d9901cd568107880aa055b9bc
SHA1e7da6317fdbb9a2c7a55956ca38ac03979a1a7b7
SHA256677c09610aebd75d629350419b9e9a41283751fb9143cac2291db3845cf19751
SHA512593b02444e2cc5ea06def930ec9db96c34777378452f97b708750983e5be70897da9f3b5185e05e276d24895745773941e0f0dabe9b7e2890aeca04797be1e36
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\8Z1Z4637\search[2].htmFilesize
25B
MD58ba61a16b71609a08bfa35bc213fce49
SHA18374dddcc6b2ede14b0ea00a5870a11b57ced33f
SHA2566aa63394c1f5e705b1e89c55ff19eed71957e735c3831a845ff62f74824e13f1
SHA5125855f5b2a78877f7a27ff92eaaa900d81d02486e6e2ea81d80b6f6cf1fe254350444980017e00cdeecdd3c67b86e7acc90cd2d77f06210bdd1d7b1a71d262df1
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\8Z1Z4637\search[8].htmFilesize
130KB
MD51694af63b9447b3ffc22fe2d5297dfd7
SHA19f781c4954a598a98a20010c29303abff3c89baa
SHA256a3b2ab091566b26f249f7d4084f62d9f46b5fe559a7ad51197ee50d189701d6c
SHA51205901a947dfb8892f13732b10444f06db197af37e4d0a006d46c0b238ac651c8f5169c19d2fb7d8eaabf3b8da41031aef5e8bdeaa40d7c55fbfb6f956dfbdef2
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\KCKU5E0S\search[3].htmFilesize
148KB
MD5503751f441c0d0ca84be309eab039079
SHA1fd649ae62824b2eb6168bff6795d5bc5780c7f9c
SHA2568757d5d7d78eb7faac852baedc553fb32eb7cd65f69ed8e4ae9352ee6665f43d
SHA512ebe42a5e77637baf60d00f0425e86541ab7305d89071c40e03b04fa584d838d15278237a1e7caa096d2c2ff85e490a19d3b76224e023075c086ed40eba18c088
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\KCKU5E0S\search[7].htmFilesize
148KB
MD5f9451cd36008e1825612bc1161d5f158
SHA140aee63b1f1621e750360c43b499a760dce94447
SHA25603278bdae12c2a0e9586ce08a03d69e86b9c4818e7fcef1d1f9f690d00a41ef1
SHA512739b730ae9ca18a531c2f97e9f1f1037f6a9fee70d18cec1974277d628fc9f4f19e747cb80f609658c06cf8bea87364c9e9a5384815a4e90a60446bdac39876b
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\QQACG5HD\N89U0PWZ.htmFilesize
175KB
MD5efa3529505057997dd05668a9cabbb25
SHA17d2afc49eb35101188e6c5ae85e4c63037cef205
SHA2565bd37543735fb434c9986fa76543cb6fcf82490eaa3658cd064fb9119408454f
SHA512728136a85a78de8a08d197418ff9d7c0e60c25b9129392540ccc60619ac288d94cf86108d35ed3b34a0b7cab28334b8ab5f6d5b43532c9e94312eaac992e2b84
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\QQACG5HD\PW1BMLUV.htmFilesize
175KB
MD53e4ebc2fc89a729bbdca656119f0f8d6
SHA1fece87ed0063a545ef1082a27396885ad505d4a9
SHA256456af0592ccd65a6a17a813726424fdf3e8569b1084be2b57758f037aabfe30c
SHA5128f70bb30cbdc41493d897e0c2d44b98fdaef45e5f004c19cb1e6f5b0d654e9d29adf8aebb2f1037cfd71c15472930b1fbcc7d8e382879b1df5834b5b27724f91
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\QQACG5HD\searchTFN5GH5J.htmFilesize
114KB
MD570a42faf58f25c96a61783e95cc4abd6
SHA110670068dc80ea29b3d5f3eadfdb56e8a2198d17
SHA2568ca268d3e6c7e58b5244da365a8a917286a3b2d0718e303b978ab9e029dfb717
SHA512549a699824698b066142ef44683e39e38524196baed14be9af12df5dc80bc6a18252208b5aa9736628e101c213d44e904411f62b2764e385f08f569b85b9748e
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\QQACG5HD\search[10].htmFilesize
172KB
MD5427bd61a56c186f7b874f36f56cab1e9
SHA169e1afe7467cb06e0b34a666a0f34e63cc16c3e3
SHA256e6e4aa48926d7764695b8de4818e847e85a5c7cb129c8a7b14e2b5ddae90e969
SHA51263db3a06b0977d281b9919ac460239c135e700559b4aa68debbaa5ba2d19c2e4aff22d0d41a4367d4b1eed4601188d92de017ab0c6a74ce2b136065045f2ae76
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\QQACG5HD\search[6].htmFilesize
160KB
MD5fa52faed64714992d089a5e58ac1e063
SHA18f6565f6c719f14087987e625d26a74c310de74a
SHA2569e128781d5320eeba63dfcd31d3b5e0f0b622e8295907b1022ca44f81988d110
SHA512cb29384bd22dda262092b785a18c7d5e41590ac5a5627b2cc0c984b1a5752e8552196aa4ed2885bb6b161db52d73c7a72372cbe6177629a17c087cb02d7504aa
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\QQACG5HD\search[7].htmFilesize
117KB
MD5f00bae726d9d007c8716e153b477d390
SHA1fdbf241094bbaa5b95699ac51d0466901a90f75b
SHA256eeb546fd65cc43b1a69d1625bf2de54508ffeed4e95f65bb8c0974058fd8da6c
SHA51267f3ae9282a285092ebf5dc7bc999e70cc315bda3852e36d50da9e9194967d7a77c0a81afde65a0fba1ea96457e255b8fdd585e069cd0023c4d395cf6400a3b5
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\QQACG5HD\search[9].htmFilesize
123KB
MD5c7c4ca4fa02ad51ced5e21ecd77daa26
SHA100ebf9cc8c11551afb447a9d0a13afef7d95afc8
SHA25664fa6ef44f1df15a196ee49d9b2d9cff16a4876d4882f1511aa902ec4a114512
SHA5120fa38e47a4c8a17efb81428cd8350a61bbdcaa11b6a089cddf5a3d96152d2e1677842de307c77cf0ae11416fdd38e45426e8955ee3d11cf6741cef552e9d3b2e
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\ZRDQ3WBJ\results[6].htmFilesize
1KB
MD535a826c9d92a048812533924ecc2d036
SHA1cc2d0c7849ea5f36532958d31a823e95de787d93
SHA2560731a24ba3c569a734d2e8a74f9786c4b09c42af70457b185c56f147792168ea
SHA512fd385904a466768357de812d0474e34a0b5f089f1de1e46bd032d889b28f10db84c869f5e81a0e2f1c8ffdd8a110e0736a7d63c887d76de6f0a5fd30bb8ebecd
-
C:\Users\Admin\AppData\Local\Temp\tmpD483.tmpFilesize
41KB
MD5436e17ec24fac8f320826bb0c89d9c90
SHA1ab9c7df435a8ff887f201f6c9cf2ddd804a32f92
SHA256cdf33c6fd6f1bb5e93139be8fa94d439769de4b76c3629ee7a459f40973e8ee8
SHA51283e820a9a673373aa0b337aa2cb31f2fa18d52c2a62029ad1805ca39bfbc820964da2630dcc812835b6b0db769b32690a0769508a0e84c8a8100a40979ead5f2
-
C:\Users\Admin\AppData\Local\Temp\zincite.logFilesize
160B
MD52d827004051fc56ab6d73bb9c2f3a199
SHA1cb7327008763ac443fd27709e7fdf50ede5803ae
SHA256d4d9efc58649c17e1d7481c28b80a76b0e88b08cfd727cdf44289e13d33ce023
SHA512425fc6646cef29bd57381f0f9dad04b776b89e15e76ba4ea136d183bab6e0966cce4661472d7fcd025329be6000a7fd124b8f692fc2751b58f5f601c47d62d2a
-
C:\Users\Admin\AppData\Local\Temp\zincite.logFilesize
160B
MD571a82fab2dc3f13a89c780786a9bf9c5
SHA168f2e47e0b2021145c03ac93bd3192fb7a4ff56f
SHA2564cf35a0ba4905cada45ac84663b1cc73d73439dafa91c3af694188d3435168cf
SHA5125b8d806e5850d1490f2b4cb1c87469a4902b8ae3adfd977ab8f0c644818fe1b2dab1b04d136df25376fa003f1af9f289920e861abe6f668edb6ac0d8fd15ee09
-
C:\Users\Admin\AppData\Local\Temp\zincite.logFilesize
160B
MD5f622bdb0d54233ac8c5b5d6ed39f4437
SHA195203f48c1199796ac8af60b70cf8eaf6434b83c
SHA256e3f7326976d0ec91bc520736adfe0afef7a5df3d755e9814458dc91cd7f6d881
SHA51294fdbbb136b5e6723232592bdaceb79c35cf58b0caa1975add86370f64cc499580479fe7cffc18d6b1f42da240c6fb1ef7459dad9d6385604150a4781908e551
-
C:\Users\Admin\AppData\Local\Temp\zincite.logMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
C:\Windows\services.exeFilesize
8KB
MD5b0fe74719b1b647e2056641931907f4a
SHA1e858c206d2d1542a79936cb00d85da853bfc95e2
SHA256bf316f51d0c345d61eaee3940791b64e81f676e3bca42bad61073227bee6653c
SHA5129c82e88264696d0dadef9c0442ad8d1183e48f0fb355a4fc9bf4fa5db4e27745039f98b1fd1febff620a5ded6dd493227f00d7d2e74b19757685aa8655f921c2
-
memory/2260-36-0x0000000000400000-0x0000000000408000-memory.dmpFilesize
32KB
-
memory/2260-38-0x0000000000400000-0x0000000000408000-memory.dmpFilesize
32KB
-
memory/2260-235-0x0000000000400000-0x0000000000408000-memory.dmpFilesize
32KB
-
memory/2260-48-0x0000000000400000-0x0000000000408000-memory.dmpFilesize
32KB
-
memory/2260-5-0x0000000000400000-0x0000000000408000-memory.dmpFilesize
32KB
-
memory/2260-43-0x0000000000400000-0x0000000000408000-memory.dmpFilesize
32KB
-
memory/2260-496-0x0000000000400000-0x0000000000408000-memory.dmpFilesize
32KB
-
memory/2260-26-0x0000000000400000-0x0000000000408000-memory.dmpFilesize
32KB
-
memory/2260-14-0x0000000000400000-0x0000000000408000-memory.dmpFilesize
32KB
-
memory/2260-352-0x0000000000400000-0x0000000000408000-memory.dmpFilesize
32KB
-
memory/2260-356-0x0000000000400000-0x0000000000408000-memory.dmpFilesize
32KB
-
memory/2260-19-0x0000000000400000-0x0000000000408000-memory.dmpFilesize
32KB
-
memory/2260-358-0x0000000000400000-0x0000000000408000-memory.dmpFilesize
32KB
-
memory/2260-24-0x0000000000400000-0x0000000000408000-memory.dmpFilesize
32KB
-
memory/2260-31-0x0000000000400000-0x0000000000408000-memory.dmpFilesize
32KB
-
memory/4416-42-0x0000000000500000-0x0000000000510200-memory.dmpFilesize
64KB
-
memory/4416-0-0x0000000000500000-0x0000000000510200-memory.dmpFilesize
64KB
-
memory/4416-357-0x0000000000500000-0x0000000000510200-memory.dmpFilesize
64KB
-
memory/4416-351-0x0000000000500000-0x0000000000510200-memory.dmpFilesize
64KB
-
memory/4416-13-0x0000000000500000-0x0000000000510200-memory.dmpFilesize
64KB
-
memory/4416-234-0x0000000000500000-0x0000000000510200-memory.dmpFilesize
64KB
-
memory/4416-495-0x0000000000500000-0x0000000000510200-memory.dmpFilesize
64KB
-
memory/4416-47-0x0000000000500000-0x0000000000510200-memory.dmpFilesize
64KB