Analysis
-
max time kernel
134s -
max time network
103s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
11/05/2024, 01:46
Static task
static1
Behavioral task
behavioral1
Sample
50720f14e255e2cbf86f7fe4a9ade830_NeikiAnalytics.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
50720f14e255e2cbf86f7fe4a9ade830_NeikiAnalytics.exe
Resource
win10v2004-20240426-en
General
-
Target
50720f14e255e2cbf86f7fe4a9ade830_NeikiAnalytics.exe
-
Size
244KB
-
MD5
50720f14e255e2cbf86f7fe4a9ade830
-
SHA1
77d15479b2bb561f1d03655d997e99ebae77c5c6
-
SHA256
9ee6df06890de1a6e0623f9c2f816cb9c093ceefbc9f80b82df70e03f168a1dd
-
SHA512
10a0420bb8a5bbbcb59376a68d5dd1e15fdf17d6bc20d7df7f121478fcb8be82db4bd3e6a6f3276872a7f490a7be54edfd590c3d48ab0fde13df7bd44cc95cba
-
SSDEEP
6144:4EXlSylvFuWaS54hIAv/QhuA7HY8pPZ0FP6BzxM5EmX:VAylvv5YRwh9HYd61xhmX
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\apppatch\\svchost.exe," svchost.exe -
Executes dropped EXE 1 IoCs
pid Process 1504 svchost.exe -
Modifies WinLogon 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\11d802fb = "C:\\Windows\\apppatch\\svchost.exe" 50720f14e255e2cbf86f7fe4a9ade830_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\11d802fb = "C:\\Windows\\apppatch\\svchost.exe" svchost.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\apppatch\svchost.exe 50720f14e255e2cbf86f7fe4a9ade830_NeikiAnalytics.exe File opened for modification C:\Windows\apppatch\svchost.exe 50720f14e255e2cbf86f7fe4a9ade830_NeikiAnalytics.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 1648 1504 WerFault.exe 84 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1504 svchost.exe 1504 svchost.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 216 50720f14e255e2cbf86f7fe4a9ade830_NeikiAnalytics.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 216 wrote to memory of 1504 216 50720f14e255e2cbf86f7fe4a9ade830_NeikiAnalytics.exe 84 PID 216 wrote to memory of 1504 216 50720f14e255e2cbf86f7fe4a9ade830_NeikiAnalytics.exe 84 PID 216 wrote to memory of 1504 216 50720f14e255e2cbf86f7fe4a9ade830_NeikiAnalytics.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\50720f14e255e2cbf86f7fe4a9ade830_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\50720f14e255e2cbf86f7fe4a9ade830_NeikiAnalytics.exe"1⤵
- Modifies WinLogon
- Drops file in Windows directory
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:216 -
C:\Windows\apppatch\svchost.exe"C:\Windows\apppatch\svchost.exe"2⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Modifies WinLogon
- Suspicious behavior: EnumeratesProcesses
PID:1504 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1504 -s 8563⤵
- Program crash
PID:1648
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1504 -ip 15041⤵PID:4840
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
244KB
MD5068cfa4c68da1f2bbcef0579309659e5
SHA15f58787fd61c6e5ea7987560ebd3bd277f0ed98e
SHA2568b4b2e1e9444a376f1fff090508c59775ad7d122bf55fb8e9404d9bb9dd5bc25
SHA51250e5980cb22312a40e7e75a0a1b33df08b5417be3674a275235fd758cca468f7912ed3f0890f5eb9d51c08e4315cbf546eac04ff7948fc4051285ea087bfba72