Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10/05/2024, 15:26

General

  • Target

    0f7f8f1048960ecd16351e8d75ae3750_NeikiAnalytics.exe

  • Size

    206KB

  • MD5

    0f7f8f1048960ecd16351e8d75ae3750

  • SHA1

    8a3f6de879d603888e0fc20ab29b03a668068155

  • SHA256

    65eae3efb9deb63c50ea7c2bfc1eaf9a90f9bd7b36d8b68b42ea75eacbfa5966

  • SHA512

    8c7021d5ba45632339b222a3b030e9538d406daf0721b5e1c195fb4af9340ea5bd7d38c67da5e63b69c9fadbe2bf49df77b4d599283be1844da1aac10c8f754b

  • SSDEEP

    3072:zvEfVUzSLhIVbV6i5LirrlZrHyrUHUckoMQ2RN6unXJ:zvEN2U+T6i5LirrllHy4HUcMQY6WJ

Score
10/10

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 2 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Modifies Installed Components in the registry 2 TTPs 8 IoCs
  • Executes dropped EXE 4 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Drops file in Windows directory 6 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 2 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0f7f8f1048960ecd16351e8d75ae3750_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\0f7f8f1048960ecd16351e8d75ae3750_NeikiAnalytics.exe"
    1⤵
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1140
    • \??\c:\windows\system\explorer.exe
      c:\windows\system\explorer.exe
      2⤵
      • Modifies WinLogon for persistence
      • Modifies visiblity of hidden/system files in Explorer
      • Modifies Installed Components in the registry
      • Executes dropped EXE
      • Adds Run key to start application
      • Drops file in Windows directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2280
      • \??\c:\windows\system\spoolsv.exe
        c:\windows\system\spoolsv.exe SE
        3⤵
        • Executes dropped EXE
        • Drops file in Windows directory
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:4600
        • \??\c:\windows\system\svchost.exe
          c:\windows\system\svchost.exe
          4⤵
          • Modifies WinLogon for persistence
          • Modifies visiblity of hidden/system files in Explorer
          • Modifies Installed Components in the registry
          • Executes dropped EXE
          • Adds Run key to start application
          • Drops file in Windows directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: GetForegroundWindowSpam
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:4208
          • \??\c:\windows\system\spoolsv.exe
            c:\windows\system\spoolsv.exe PR
            5⤵
            • Executes dropped EXE
            • Suspicious use of SetWindowsHookEx
            PID:5112
          • C:\Windows\SysWOW64\at.exe
            at 15:28 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe
            5⤵
              PID:3512
            • C:\Windows\SysWOW64\at.exe
              at 15:29 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe
              5⤵
                PID:4064
              • C:\Windows\SysWOW64\at.exe
                at 15:30 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe
                5⤵
                  PID:1796

        Network

              MITRE ATT&CK Enterprise v15

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Users\Admin\AppData\Roaming\mrsys.exe

                Filesize

                206KB

                MD5

                0358107c5e5df474baaa999d3308954d

                SHA1

                b3617258bfb59bd1217fb091d2f4a279e4742183

                SHA256

                4d4a3b88843d5853010abf8d291deea79b8f6db29b8b98520c3509e58fd9f31d

                SHA512

                c7f87b07cfe728902085e1519b7c7feb4dbd49abdd997ac6faa2c1b13d9272fcc31dcce18b6a6e97e9d69be5f51e24a218a4c514457ed77522939a5040daac59

              • C:\Windows\System\explorer.exe

                Filesize

                206KB

                MD5

                a8a4047a7036dc8498f198f2d82791d1

                SHA1

                a689e68922566c0efab95399e833829820ecb02b

                SHA256

                9ba3ddc5ccc0655867cbd0346b3f19d41b5bde8bd7e95295a2bdbe656d53b7a3

                SHA512

                e4b869efc2f54bf41307b0dcfef3b06c19643c71df00ca8b04d6fdfe4e1f31809600390abf3561e51dd9ff1497e925b33afb6e47505e122cac4b127e435f1b94

              • C:\Windows\System\spoolsv.exe

                Filesize

                206KB

                MD5

                b21d0c2dd79bddf29a7910db39f3dc1b

                SHA1

                4204858a56ba45e3051f79aaa734a3d9760d81ed

                SHA256

                5cf701c3658f3dcb925210771b8f937b1adf9341fe2c9e7418bbe4b8fdbe2b50

                SHA512

                9edca68cdaef8f60548244e031dc5ed593d637d5aa405c019c9102cbd87cde709097c0cbda16917005aae87a9d24122a5e188182075eacd09c308e3932b960a1

              • C:\Windows\System\svchost.exe

                Filesize

                207KB

                MD5

                b76d94e7560b9f7b5d3030926b37ef83

                SHA1

                910bc6a5a15420207bf67eac925726ef302828d3

                SHA256

                3f1c48af0dc5f4c74d2cbe530dfe828ee89e776e5c04e706955b1889c934c8cd

                SHA512

                b7bf077c1ccc6b4af44c2bb32fc9d140dffdd871000c9d7a161e58ccd27df20cab2ceaee010679a693f4f2cf2d4405e867f41bea0c7a5e1f3746686272d136c8