Analysis
-
max time kernel
149s -
max time network
94s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
09-05-2024 15:51
Behavioral task
behavioral1
Sample
7b871b5d253fb86bdd5a0b1b34844390_NeikiAnalytics.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
7b871b5d253fb86bdd5a0b1b34844390_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
7b871b5d253fb86bdd5a0b1b34844390_NeikiAnalytics.exe
-
Size
203KB
-
MD5
7b871b5d253fb86bdd5a0b1b34844390
-
SHA1
f563dceacc1a3ef970a1cbf37e793d271e63f4b9
-
SHA256
2a744f7c1c54127ac7746eae3616aeeb39b17410eb4057823fe6fa26bb6fe97e
-
SHA512
78cdf1ac70ca72fc3287ff8aee98d8a06c5fcae187f7ffeb76ed1ac0df16607ac8ed4e643db9182792f75de95cc320e9ffd2f54122eed271a334341aa7820d62
-
SSDEEP
3072:IyrN/sVywaEj1UsPyrN/sVywaEj1Us10nfWGQJehM75M/0Wt/Sz0CchNoZUrET0W:Nh9wv1U7h9wv1UveG27u/Ht/U0ChZAW
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3248 lcss.exe -
resource yara_rule behavioral2/memory/4216-0-0x0000000000400000-0x0000000000420000-memory.dmp upx behavioral2/files/0x000900000002340b-5.dat upx behavioral2/files/0x000700000002340f-26.dat upx behavioral2/files/0x0007000000023410-27.dat upx behavioral2/memory/4216-32-0x0000000000400000-0x0000000000420000-memory.dmp upx behavioral2/memory/3248-30-0x0000000000400000-0x0000000000420000-memory.dmp upx behavioral2/files/0x0008000000022f51-29.dat upx -
Modifies WinLogon 2 TTPs 15 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify 7b871b5d253fb86bdd5a0b1b34844390_NeikiAnalytics.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\wlogon\Asynchronous = "1" 7b871b5d253fb86bdd5a0b1b34844390_NeikiAnalytics.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\wlogon lcss.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\wlogon\Impersonate = "1" 7b871b5d253fb86bdd5a0b1b34844390_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\wlogon\Logon = "EvWinLogon" lcss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\wlogon\StartShell = "EvWinLogon" lcss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\wlogon\DLLName = "wlogon.dll" lcss.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\wlogon 7b871b5d253fb86bdd5a0b1b34844390_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\wlogon\Startup = "EvWinLogon" 7b871b5d253fb86bdd5a0b1b34844390_NeikiAnalytics.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\wlogon\Impersonate = "1" lcss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\wlogon\Startup = "EvWinLogon" lcss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\wlogon\Logon = "EvWinLogon" 7b871b5d253fb86bdd5a0b1b34844390_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\wlogon\StartShell = "EvWinLogon" 7b871b5d253fb86bdd5a0b1b34844390_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\wlogon\DLLName = "wlogon.dll" 7b871b5d253fb86bdd5a0b1b34844390_NeikiAnalytics.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\wlogon\Asynchronous = "1" lcss.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\crypto.dll 7b871b5d253fb86bdd5a0b1b34844390_NeikiAnalytics.exe File opened for modification C:\Windows\SysWOW64\wlogon.dll 7b871b5d253fb86bdd5a0b1b34844390_NeikiAnalytics.exe File opened for modification C:\Windows\SysWOW64\net.cpl 7b871b5d253fb86bdd5a0b1b34844390_NeikiAnalytics.exe File opened for modification C:\Windows\SysWOW64\lcss.exe 7b871b5d253fb86bdd5a0b1b34844390_NeikiAnalytics.exe -
Modifies registry class 38 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WinCryptography.Encrypt lcss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{310DE29C-0AD3-4A43-A2DB-221F1160CACB}\ProgID\ = "WinCryptography.Encrypt.1" lcss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{310DE29C-0AD3-4A43-A2DB-221F1160CACB}\ProgID 7b871b5d253fb86bdd5a0b1b34844390_NeikiAnalytics.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WinCryptography.Encrypt 7b871b5d253fb86bdd5a0b1b34844390_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{310DE29C-0AD3-4A43-A2DB-221F1160CACB}\InprocServer32\ = "crypto.dll" 7b871b5d253fb86bdd5a0b1b34844390_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{310DE29C-0AD3-4A43-A2DB-221F1160CACB}\InprocServer32\ThreadingModel = "Both" 7b871b5d253fb86bdd5a0b1b34844390_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WinCryptography.Encrypt.1\CLSID\ = "{310DE29C-0AD3-4A43-A2DB-221F1160CACB}" 7b871b5d253fb86bdd5a0b1b34844390_NeikiAnalytics.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{310DE29C-0AD3-4A43-A2DB-221F1160CACB} 7b871b5d253fb86bdd5a0b1b34844390_NeikiAnalytics.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WinCryptography.Encrypt.1 7b871b5d253fb86bdd5a0b1b34844390_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WinCryptography.Encrypt\CLSID\ = "{310DE29C-0AD3-4A43-A2DB-221F1160CACB}" 7b871b5d253fb86bdd5a0b1b34844390_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{310DE29C-0AD3-4A43-A2DB-221F1160CACB}\InprocServer32\ = "crypto.dll" lcss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WinCryptography.Encrypt.1\ = "Windows Cryptography" 7b871b5d253fb86bdd5a0b1b34844390_NeikiAnalytics.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WinCryptography.Encrypt\CurVer lcss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{310DE29C-0AD3-4A43-A2DB-221F1160CACB}\InprocServer32\ThreadingModel = "Both" lcss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WinCryptography.Encrypt\CLSID\ = "{310DE29C-0AD3-4A43-A2DB-221F1160CACB}" lcss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WinCryptography.Encrypt\CurVer\ = "WinCryptography.Encrypt.1" lcss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{310DE29C-0AD3-4A43-A2DB-221F1160CACB}\ = "Windows Cryptography" 7b871b5d253fb86bdd5a0b1b34844390_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{310DE29C-0AD3-4A43-A2DB-221F1160CACB}\VersionIndependentProgID\ = "WinCryptography.Encrypt" 7b871b5d253fb86bdd5a0b1b34844390_NeikiAnalytics.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WinCryptography.Encrypt.1\CLSID lcss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{310DE29C-0AD3-4A43-A2DB-221F1160CACB}\VersionIndependentProgID\ = "WinCryptography.Encrypt" lcss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WinCryptography.Encrypt\ = "Windows Cryptography" lcss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{310DE29C-0AD3-4A43-A2DB-221F1160CACB}\VersionIndependentProgID lcss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WinCryptography.Encrypt.1\ = "Windows Cryptography" lcss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WinCryptography.Encrypt\CurVer 7b871b5d253fb86bdd5a0b1b34844390_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{310DE29C-0AD3-4A43-A2DB-221F1160CACB}\ProgID\ = "WinCryptography.Encrypt.1" 7b871b5d253fb86bdd5a0b1b34844390_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WinCryptography.Encrypt\CurVer\ = "WinCryptography.Encrypt.1" 7b871b5d253fb86bdd5a0b1b34844390_NeikiAnalytics.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{310DE29C-0AD3-4A43-A2DB-221F1160CACB} lcss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{310DE29C-0AD3-4A43-A2DB-221F1160CACB}\ProgID lcss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{310DE29C-0AD3-4A43-A2DB-221F1160CACB}\InprocServer32 7b871b5d253fb86bdd5a0b1b34844390_NeikiAnalytics.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WinCryptography.Encrypt\CLSID 7b871b5d253fb86bdd5a0b1b34844390_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WinCryptography.Encrypt\ = "Windows Cryptography" 7b871b5d253fb86bdd5a0b1b34844390_NeikiAnalytics.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WinCryptography.Encrypt\CLSID lcss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WinCryptography.Encrypt.1\CLSID\ = "{310DE29C-0AD3-4A43-A2DB-221F1160CACB}" lcss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{310DE29C-0AD3-4A43-A2DB-221F1160CACB}\VersionIndependentProgID 7b871b5d253fb86bdd5a0b1b34844390_NeikiAnalytics.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WinCryptography.Encrypt.1\CLSID 7b871b5d253fb86bdd5a0b1b34844390_NeikiAnalytics.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{310DE29C-0AD3-4A43-A2DB-221F1160CACB}\InprocServer32 lcss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WinCryptography.Encrypt.1 lcss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{310DE29C-0AD3-4A43-A2DB-221F1160CACB}\ = "Windows Cryptography" lcss.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeTakeOwnershipPrivilege 4216 7b871b5d253fb86bdd5a0b1b34844390_NeikiAnalytics.exe Token: SeDebugPrivilege 4216 7b871b5d253fb86bdd5a0b1b34844390_NeikiAnalytics.exe Token: SeTakeOwnershipPrivilege 3248 lcss.exe Token: SeDebugPrivilege 3248 lcss.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\7b871b5d253fb86bdd5a0b1b34844390_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\7b871b5d253fb86bdd5a0b1b34844390_NeikiAnalytics.exe"1⤵
- Modifies WinLogon
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:4216
-
C:\Windows\SysWOW64\lcss.exeC:\Windows\SysWOW64\lcss.exe1⤵
- Executes dropped EXE
- Modifies WinLogon
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:3248
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
127KB
MD50af7645e2f5c9eab5bf3e4197a4c82e2
SHA1479d781a5479c23f5a799723cd3c9df9b9a0099e
SHA2562db5be2db179d97e34343f632942d93896ffa846ee8e05b6aa429949591adae9
SHA512d431f3f3c3886c506c7c2887d7fb2c6eddbb9197ff83b764d06781e203af88780eeea005d30a552123910a63777f675c7b847ec1eab1a64006c96bdf8f8eb0db
-
Filesize
171KB
MD5db73d43b84a6427d8dd693cbd3405aa5
SHA1245194758949f169afc93b2674c791caf40cf9bd
SHA256e561a6e36b7f29f449e0127752283c2f4a54912a55937382c0e6c269853b5ffa
SHA512741249af65c75aea2e6f19eea81e1a886b9eb7ef74b7b758be10f1bb2bff75b213890a1d45e8466bb06890df02d950894f07fe8c17fed051b0004e4af5fbf9b9
-
Filesize
200KB
MD5d3a83480d34e2fb9aff6f9383587f821
SHA1786c503b91bfb907406458b6f34b5336c7be51d8
SHA256a4c2208a6d2bd8810c9eb8ad99c03736824b3550ded42767dac1dd060c1868be
SHA51278554f19bfad006a774b52327bedbee56f7a24f983ef94bed313110b9fc133dbc4741408577ceb0c5c9a384f9287e34462731f010970c6e49d7a78ecb4e7cb4e
-
Filesize
166KB
MD59db808705d7eff4dd7207288014cc497
SHA1448d3a30d7a75d55d2f76c25e2017b215b1d7a22
SHA2567045149e7f5f8bd0badd479385ce0cc851217607cad8adbec1fb061d525feb99
SHA5125ed9808c229eb43a775a4425eb50a70efb823e80470d9650f2b7ccc71616a42511fc2825ed929fa733f402f1361216d8eaf79e9d4b1fdcc15a4e8cbd57b4f08f