Analysis
-
max time kernel
136s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
10-05-2024 06:49
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
956bd517657fbc0ac22ad634235ff6b0_NeikiAnalytics.exe
Resource
win7-20240221-en
windows7-x64
6 signatures
150 seconds
General
-
Target
956bd517657fbc0ac22ad634235ff6b0_NeikiAnalytics.exe
-
Size
299KB
-
MD5
956bd517657fbc0ac22ad634235ff6b0
-
SHA1
d70f3cf2647776857bb6ca2ad50c2615c1096276
-
SHA256
54eb80bbaf5b0a6d578a6f3b4416ff1b6ce876df518bb85f5931b79ddf144538
-
SHA512
409ca331178231208322b88a22967a755682e841b0cdf4f055b8f31196e46f02889a857e4fa47598db5dd9e0ced3aa017f2e92687c2b02c2dfa81e9261e6f035
-
SSDEEP
6144:X8JFx8y2h+Gy1SPvPzOi+WsCRmOSCa03JdlYK7RV/QGrcJ5r4ofVIKkop3VVLgYp:MJz8hh+f1STIOaGdlYK7RV/QGrcJ5r4i
Malware Config
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
resource yara_rule behavioral2/memory/828-4-0x0000000004C70000-0x0000000004C8A000-memory.dmp healer behavioral2/memory/828-6-0x0000000004E00000-0x0000000004E18000-memory.dmp healer behavioral2/memory/828-35-0x0000000004E00000-0x0000000004E12000-memory.dmp healer behavioral2/memory/828-33-0x0000000004E00000-0x0000000004E12000-memory.dmp healer behavioral2/memory/828-31-0x0000000004E00000-0x0000000004E12000-memory.dmp healer behavioral2/memory/828-29-0x0000000004E00000-0x0000000004E12000-memory.dmp healer behavioral2/memory/828-27-0x0000000004E00000-0x0000000004E12000-memory.dmp healer behavioral2/memory/828-25-0x0000000004E00000-0x0000000004E12000-memory.dmp healer behavioral2/memory/828-23-0x0000000004E00000-0x0000000004E12000-memory.dmp healer behavioral2/memory/828-21-0x0000000004E00000-0x0000000004E12000-memory.dmp healer behavioral2/memory/828-19-0x0000000004E00000-0x0000000004E12000-memory.dmp healer behavioral2/memory/828-17-0x0000000004E00000-0x0000000004E12000-memory.dmp healer behavioral2/memory/828-15-0x0000000004E00000-0x0000000004E12000-memory.dmp healer behavioral2/memory/828-13-0x0000000004E00000-0x0000000004E12000-memory.dmp healer behavioral2/memory/828-11-0x0000000004E00000-0x0000000004E12000-memory.dmp healer behavioral2/memory/828-9-0x0000000004E00000-0x0000000004E12000-memory.dmp healer behavioral2/memory/828-8-0x0000000004E00000-0x0000000004E12000-memory.dmp healer -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 956bd517657fbc0ac22ad634235ff6b0_NeikiAnalytics.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 956bd517657fbc0ac22ad634235ff6b0_NeikiAnalytics.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 956bd517657fbc0ac22ad634235ff6b0_NeikiAnalytics.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 956bd517657fbc0ac22ad634235ff6b0_NeikiAnalytics.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 956bd517657fbc0ac22ad634235ff6b0_NeikiAnalytics.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 956bd517657fbc0ac22ad634235ff6b0_NeikiAnalytics.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 956bd517657fbc0ac22ad634235ff6b0_NeikiAnalytics.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 956bd517657fbc0ac22ad634235ff6b0_NeikiAnalytics.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 4468 sc.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 3976 828 WerFault.exe 84 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 828 956bd517657fbc0ac22ad634235ff6b0_NeikiAnalytics.exe 828 956bd517657fbc0ac22ad634235ff6b0_NeikiAnalytics.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 828 956bd517657fbc0ac22ad634235ff6b0_NeikiAnalytics.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\956bd517657fbc0ac22ad634235ff6b0_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\956bd517657fbc0ac22ad634235ff6b0_NeikiAnalytics.exe"1⤵
- Modifies Windows Defender Real-time Protection settings
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:828 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 828 -s 9482⤵
- Program crash
PID:3976
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 828 -ip 8281⤵PID:4712
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start wuauserv1⤵
- Launches sc.exe
PID:4468