Analysis

  • max time kernel
    149s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20240215-en
  • resource tags

    arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system
  • submitted
    10/05/2024, 02:49

General

  • Target

    52b749ae7f9df7445fba964770964150_NeikiAnalytics.exe

  • Size

    3.6MB

  • MD5

    52b749ae7f9df7445fba964770964150

  • SHA1

    bfa81367c72e0d37c640f3dc809002c3425d0cb5

  • SHA256

    2069e1c6bfa6fb43508120eb064d74b2ab0e79fd55984945829f509a1d3c5757

  • SHA512

    f22510e13b5809bd6f9c3d9828681c242ead3a1381a418654728073ca8783db1f277f18da2250c4ba552dbda207fe96a3fb6b94c7363b9db201bc949f606a04c

  • SSDEEP

    49152:Vu/dUpCw4SIjcP0idTfTXE5JJ7g97/mHEY/D+Vam0IAo:Vg4midTSJMRY/Nv1o

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 2 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • UAC bypass 3 TTPs 15 IoCs
  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 5 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Checks whether UAC is enabled 1 TTPs 10 IoCs
  • Drops file in Windows directory 7 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs
  • System policy modification 1 TTPs 15 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\52b749ae7f9df7445fba964770964150_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\52b749ae7f9df7445fba964770964150_NeikiAnalytics.exe"
    1⤵
    • UAC bypass
    • Loads dropped DLL
    • Checks whether UAC is enabled
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    • System policy modification
    PID:1288
    • C:\Users\Admin\AppData\Roaming\icsys.ico.exe
      C:\Users\Admin\AppData\Roaming\icsys.ico.exe
      2⤵
      • Modifies WinLogon for persistence
      • UAC bypass
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Checks whether UAC is enabled
      • Drops file in Windows directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      • System policy modification
      PID:2800
      • C:\windows\wininit.exe
        "C:\windows\wininit.exe"
        3⤵
        • Modifies WinLogon for persistence
        • Modifies visiblity of hidden/system files in Explorer
        • UAC bypass
        • Executes dropped EXE
        • Loads dropped DLL
        • Checks whether UAC is enabled
        • Drops file in Windows directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of WriteProcessMemory
        • System policy modification
        PID:2676
        • C:\Users\Admin\appdata\roaming\spoolsv.exe
          "C:\Users\Admin\appdata\roaming\spoolsv.exe" /SE
          4⤵
          • UAC bypass
          • Executes dropped EXE
          • Loads dropped DLL
          • Checks whether UAC is enabled
          • Drops file in Windows directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          • System policy modification
          PID:2656
          • C:\windows\svchost.exe
            "C:\windows\svchost.exe"
            5⤵
            • UAC bypass
            • Executes dropped EXE
            • Checks whether UAC is enabled
            • System policy modification
            PID:2360
    • \??\c:\users\admin\appdata\local\temp\52b749ae7f9df7445fba964770964150_neikianalytics.exe 
      c:\users\admin\appdata\local\temp\52b749ae7f9df7445fba964770964150_neikianalytics.exe 
      2⤵
      • Executes dropped EXE
      PID:2552

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\52b749ae7f9df7445fba964770964150_neikianalytics.exe 

    Filesize

    740KB

    MD5

    de214e21fa8152cb1982c6c854831f37

    SHA1

    2476d91c49f566a391346f969e6fbbf8d0b8c511

    SHA256

    47c33dc6fb7854fb4bcdbd5fba6b063fa39916d4a4a78f05f7c43ccac9f68b80

    SHA512

    2f0232b8f0395a864c38ec85f4c759d0987adf36cfef26476739b0e7325e65f2fc97d90c1f5d0fec339d075dfc5770f03e24ef6dcd6c37a15a11adfc7149f4e6

  • C:\Windows\Wininit

    Filesize

    17B

    MD5

    dc88c4aa03f5180bbece1abdfec93e70

    SHA1

    59662d61697f32a522dc6cfeb67202803b311788

    SHA256

    764df4d37a31be29b4d87041c66c520cf72260d05b22c92df5f61e1eb67ef728

    SHA512

    f3b434bfa1767976744b80abe90c4d9614aecbacca889571ba90e8c848808bed73d37b21eb56afa51234481c36ba74348bb791f43655be4f0ee9bca8df89ae49

  • \Users\Admin\AppData\Roaming\icsys.ico.exe

    Filesize

    2.9MB

    MD5

    9fa3f988fc0466524bf75d61ba96d41e

    SHA1

    afb71a0fd36ab613909baa6dedbdace501fefee2

    SHA256

    20d9cf9b68fb091558cf8c13e09cfff2de96a767f19e30e67a2066b09cddc2a1

    SHA512

    a3b5be2924589adf40efc0f54c0732710f4a7169d84c77b16af88573cfcf9239676c667afd428b3bc8b80504305a79f95d19e0b6ace8f22603696ad1e51af26c

  • memory/1288-0-0x0000000000230000-0x0000000000231000-memory.dmp

    Filesize

    4KB

  • memory/1288-41-0x0000000000400000-0x0000000000768000-memory.dmp

    Filesize

    3.4MB

  • memory/2360-50-0x0000000000400000-0x0000000000768000-memory.dmp

    Filesize

    3.4MB

  • memory/2360-48-0x0000000000400000-0x0000000000768000-memory.dmp

    Filesize

    3.4MB

  • memory/2656-45-0x0000000000400000-0x0000000000768000-memory.dmp

    Filesize

    3.4MB

  • memory/2676-26-0x00000000001C0000-0x00000000001C1000-memory.dmp

    Filesize

    4KB

  • memory/2676-60-0x0000000000400000-0x0000000000768000-memory.dmp

    Filesize

    3.4MB

  • memory/2676-72-0x0000000000400000-0x0000000000768000-memory.dmp

    Filesize

    3.4MB

  • memory/2676-49-0x0000000000400000-0x0000000000768000-memory.dmp

    Filesize

    3.4MB

  • memory/2676-70-0x0000000000400000-0x0000000000768000-memory.dmp

    Filesize

    3.4MB

  • memory/2676-51-0x00000000001C0000-0x00000000001C1000-memory.dmp

    Filesize

    4KB

  • memory/2676-52-0x0000000000400000-0x0000000000768000-memory.dmp

    Filesize

    3.4MB

  • memory/2676-54-0x0000000000400000-0x0000000000768000-memory.dmp

    Filesize

    3.4MB

  • memory/2676-56-0x0000000000400000-0x0000000000768000-memory.dmp

    Filesize

    3.4MB

  • memory/2676-58-0x0000000000400000-0x0000000000768000-memory.dmp

    Filesize

    3.4MB

  • memory/2676-47-0x0000000000400000-0x0000000000768000-memory.dmp

    Filesize

    3.4MB

  • memory/2676-62-0x0000000000400000-0x0000000000768000-memory.dmp

    Filesize

    3.4MB

  • memory/2676-64-0x0000000000400000-0x0000000000768000-memory.dmp

    Filesize

    3.4MB

  • memory/2676-66-0x0000000000400000-0x0000000000768000-memory.dmp

    Filesize

    3.4MB

  • memory/2800-13-0x00000000001C0000-0x00000000001C1000-memory.dmp

    Filesize

    4KB

  • memory/2800-21-0x0000000000400000-0x0000000000768000-memory.dmp

    Filesize

    3.4MB