Analysis

  • max time kernel
    150s
  • max time network
    94s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09/05/2024, 20:37

General

  • Target

    f1062c07d8e435acd005c7bed9d98b80_NeikiAnalytics.exe

  • Size

    206KB

  • MD5

    f1062c07d8e435acd005c7bed9d98b80

  • SHA1

    88df4b263a958307b5f6ba273f79c290f3b5d2e8

  • SHA256

    f878df2cb509c6a85149d9e9df771fd64ea291f3023eaefcf32b2a6f34217d9c

  • SHA512

    9fe787913fad05d0c327b5b02dd4b7f55893a98fbaca3ba390126906d942f73dd8ad3ef25e5a98f96b52696461a7cd06fc526e98704c95e21a536ea160c7a85f

  • SSDEEP

    3072:5vEfVUzSLhIVbV6i5LirrlZrHyrUHUckoMQ2RN6un/RRRRRRRRRRRRRRRRRRRRRr:5vEN2U+T6i5LirrllHy4HUcMQY60

Score
10/10

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 2 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Modifies Installed Components in the registry 2 TTPs 8 IoCs
  • Executes dropped EXE 4 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Drops file in Windows directory 6 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 2 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f1062c07d8e435acd005c7bed9d98b80_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\f1062c07d8e435acd005c7bed9d98b80_NeikiAnalytics.exe"
    1⤵
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:116
    • \??\c:\windows\system\explorer.exe
      c:\windows\system\explorer.exe
      2⤵
      • Modifies WinLogon for persistence
      • Modifies visiblity of hidden/system files in Explorer
      • Modifies Installed Components in the registry
      • Executes dropped EXE
      • Adds Run key to start application
      • Drops file in Windows directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2992
      • \??\c:\windows\system\spoolsv.exe
        c:\windows\system\spoolsv.exe SE
        3⤵
        • Executes dropped EXE
        • Drops file in Windows directory
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2672
        • \??\c:\windows\system\svchost.exe
          c:\windows\system\svchost.exe
          4⤵
          • Modifies WinLogon for persistence
          • Modifies visiblity of hidden/system files in Explorer
          • Modifies Installed Components in the registry
          • Executes dropped EXE
          • Adds Run key to start application
          • Drops file in Windows directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: GetForegroundWindowSpam
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:4672
          • \??\c:\windows\system\spoolsv.exe
            c:\windows\system\spoolsv.exe PR
            5⤵
            • Executes dropped EXE
            • Suspicious use of SetWindowsHookEx
            PID:3116
          • C:\Windows\SysWOW64\at.exe
            at 20:39 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe
            5⤵
              PID:3156
            • C:\Windows\SysWOW64\at.exe
              at 20:40 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe
              5⤵
                PID:2304
              • C:\Windows\SysWOW64\at.exe
                at 20:41 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe
                5⤵
                  PID:1924

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Roaming\mrsys.exe

          Filesize

          206KB

          MD5

          6f55a248f128c0d2cfe23159edf2e84f

          SHA1

          288510e96c22d6f66a09eeacca4f93fe92576ce7

          SHA256

          2b9196a6ae9ae122bdee7de37e86bcff6b6984c706febc4f0dd3c47121170b9e

          SHA512

          ee7b071b43cf2db6eab2c4476f103a1e5a6ee5e93133bde26ba83ce03b9cb04a3e6a31d5d620a26f6fa8cf8cd477c59997d018099141c1b967c18c9b4d150763

        • C:\Windows\System\explorer.exe

          Filesize

          206KB

          MD5

          243caac92b8be1f87af19a50d209b8ab

          SHA1

          2d58a637334a523f0e8324492bca83aa11a7c1a9

          SHA256

          b8229d4864777f3b3f73d044631a44934eb2b5b79409e4ca2c23c1d4238a8c7c

          SHA512

          664232f3aefd341d2c71efc76d62dcce684fa775db4dae578691948939cb5906c363c1e0dec9c365952c1997ff8929b7d7d574adea1c2885d721068785256c02

        • C:\Windows\System\spoolsv.exe

          Filesize

          206KB

          MD5

          a7d452cd60b127a795e0436706549f74

          SHA1

          50a675e1ed14afc2e8d6e2fd9239ed780e95ecaa

          SHA256

          72a8880cde84ca58d139d9deb1ab07703738395e0794cb0346bf401163bfe6b5

          SHA512

          182a58bcaae37e20908e7388661b02b5654ecce064cf059aa09a4a18d542b5ccb34d005d4d1912cacbb944a464bc098f0d11261c2017ec65fbbc427357c3abe6

        • C:\Windows\System\svchost.exe

          Filesize

          206KB

          MD5

          fe0a45e64e542d9e5f62e2130c7fee4a

          SHA1

          f02ca7de86827888731119d664f01725012ac251

          SHA256

          6c53f74a134fd6f1e94d0f8b4b63b3e7ced926c28aed99390696b78193d062fb

          SHA512

          a18e0724a2aa50724f877a6cb6afeabe30adb620c8aadc4a8bd6a51c7f65a86766ac577ee4659b5626ee3f5c255ee897a65c203265e01b1c6a9121c12624c234

        • memory/116-0-0x0000000000400000-0x0000000000440000-memory.dmp

          Filesize

          256KB

        • memory/116-37-0x0000000000400000-0x0000000000440000-memory.dmp

          Filesize

          256KB

        • memory/2672-36-0x0000000000400000-0x0000000000440000-memory.dmp

          Filesize

          256KB

        • memory/2992-9-0x0000000000400000-0x0000000000440000-memory.dmp

          Filesize

          256KB

        • memory/3116-35-0x0000000000400000-0x0000000000440000-memory.dmp

          Filesize

          256KB