Analysis

  • max time kernel
    149s
  • max time network
    94s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09-05-2024 15:51

General

  • Target

    7b871b5d253fb86bdd5a0b1b34844390_NeikiAnalytics.exe

  • Size

    203KB

  • MD5

    7b871b5d253fb86bdd5a0b1b34844390

  • SHA1

    f563dceacc1a3ef970a1cbf37e793d271e63f4b9

  • SHA256

    2a744f7c1c54127ac7746eae3616aeeb39b17410eb4057823fe6fa26bb6fe97e

  • SHA512

    78cdf1ac70ca72fc3287ff8aee98d8a06c5fcae187f7ffeb76ed1ac0df16607ac8ed4e643db9182792f75de95cc320e9ffd2f54122eed271a334341aa7820d62

  • SSDEEP

    3072:IyrN/sVywaEj1UsPyrN/sVywaEj1Us10nfWGQJehM75M/0Wt/Sz0CchNoZUrET0W:Nh9wv1U7h9wv1UveG27u/Ht/U0ChZAW

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • UPX packed file 7 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Modifies WinLogon 2 TTPs 15 IoCs
  • Drops file in System32 directory 4 IoCs
  • Modifies registry class 38 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7b871b5d253fb86bdd5a0b1b34844390_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\7b871b5d253fb86bdd5a0b1b34844390_NeikiAnalytics.exe"
    1⤵
    • Modifies WinLogon
    • Drops file in System32 directory
    • Modifies registry class
    • Suspicious use of AdjustPrivilegeToken
    PID:4216
  • C:\Windows\SysWOW64\lcss.exe
    C:\Windows\SysWOW64\lcss.exe
    1⤵
    • Executes dropped EXE
    • Modifies WinLogon
    • Modifies registry class
    • Suspicious use of AdjustPrivilegeToken
    PID:3248

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\crypto.dll

    Filesize

    127KB

    MD5

    0af7645e2f5c9eab5bf3e4197a4c82e2

    SHA1

    479d781a5479c23f5a799723cd3c9df9b9a0099e

    SHA256

    2db5be2db179d97e34343f632942d93896ffa846ee8e05b6aa429949591adae9

    SHA512

    d431f3f3c3886c506c7c2887d7fb2c6eddbb9197ff83b764d06781e203af88780eeea005d30a552123910a63777f675c7b847ec1eab1a64006c96bdf8f8eb0db

  • C:\Windows\SysWOW64\lcss.exe

    Filesize

    171KB

    MD5

    db73d43b84a6427d8dd693cbd3405aa5

    SHA1

    245194758949f169afc93b2674c791caf40cf9bd

    SHA256

    e561a6e36b7f29f449e0127752283c2f4a54912a55937382c0e6c269853b5ffa

    SHA512

    741249af65c75aea2e6f19eea81e1a886b9eb7ef74b7b758be10f1bb2bff75b213890a1d45e8466bb06890df02d950894f07fe8c17fed051b0004e4af5fbf9b9

  • C:\Windows\SysWOW64\net.cpl

    Filesize

    200KB

    MD5

    d3a83480d34e2fb9aff6f9383587f821

    SHA1

    786c503b91bfb907406458b6f34b5336c7be51d8

    SHA256

    a4c2208a6d2bd8810c9eb8ad99c03736824b3550ded42767dac1dd060c1868be

    SHA512

    78554f19bfad006a774b52327bedbee56f7a24f983ef94bed313110b9fc133dbc4741408577ceb0c5c9a384f9287e34462731f010970c6e49d7a78ecb4e7cb4e

  • C:\Windows\SysWOW64\wlogon.dll

    Filesize

    166KB

    MD5

    9db808705d7eff4dd7207288014cc497

    SHA1

    448d3a30d7a75d55d2f76c25e2017b215b1d7a22

    SHA256

    7045149e7f5f8bd0badd479385ce0cc851217607cad8adbec1fb061d525feb99

    SHA512

    5ed9808c229eb43a775a4425eb50a70efb823e80470d9650f2b7ccc71616a42511fc2825ed929fa733f402f1361216d8eaf79e9d4b1fdcc15a4e8cbd57b4f08f

  • memory/3248-30-0x0000000000400000-0x0000000000420000-memory.dmp

    Filesize

    128KB

  • memory/4216-0-0x0000000000400000-0x0000000000420000-memory.dmp

    Filesize

    128KB

  • memory/4216-32-0x0000000000400000-0x0000000000420000-memory.dmp

    Filesize

    128KB