Analysis

  • max time kernel
    118s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    11/05/2024, 18:39

General

  • Target

    2995ea99fc306dea426010477880d360_NeikiAnalytics.exe

  • Size

    91KB

  • MD5

    2995ea99fc306dea426010477880d360

  • SHA1

    118c85391b8e2cda8e47bf5d9a715a25342cc936

  • SHA256

    e5133d3ccb0977afe48bb15cd4ad2e20ec6e9e0038408b276834dd43c892c536

  • SHA512

    8a28d04dab7059f021336026343c5b4fa3080150e34e9ffcecc44ffa6801c1c4a517b4934f1a274c5d3b08f0853da6ba532f4bc33eb7695da57a2350cc1011c5

  • SSDEEP

    1536:ERsjdf1aM67v32Z9x5nouy8VTIRsjdf1aM67v32Z9x5nouy8VTQ:EOaHv3YpoutNIOaHv3YpoutNQ

Score
10/10

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 2 IoCs
  • Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Disables RegEdit via registry modification 2 IoCs
  • Disables use of System Restore points 1 TTPs
  • Executes dropped EXE 7 IoCs
  • Loads dropped DLL 12 IoCs
  • Modifies system executable filetype association 2 TTPs 13 IoCs
  • UPX packed file 23 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 5 IoCs
  • Drops file in System32 directory 6 IoCs
  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Control Panel 4 IoCs
  • Modifies registry class 15 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs
  • System policy modification 1 TTPs 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2995ea99fc306dea426010477880d360_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\2995ea99fc306dea426010477880d360_NeikiAnalytics.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Modifies visibility of file extensions in Explorer
    • Modifies visiblity of hidden/system files in Explorer
    • Disables RegEdit via registry modification
    • Loads dropped DLL
    • Modifies system executable filetype association
    • Adds Run key to start application
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies Control Panel
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    • System policy modification
    PID:1720
    • C:\Windows\xk.exe
      C:\Windows\xk.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:1108
    • C:\Windows\SysWOW64\IExplorer.exe
      C:\Windows\system32\IExplorer.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:2496
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:1280
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:1324
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:2180
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:1680
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:2724

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\services.exe

    Filesize

    91KB

    MD5

    2995ea99fc306dea426010477880d360

    SHA1

    118c85391b8e2cda8e47bf5d9a715a25342cc936

    SHA256

    e5133d3ccb0977afe48bb15cd4ad2e20ec6e9e0038408b276834dd43c892c536

    SHA512

    8a28d04dab7059f021336026343c5b4fa3080150e34e9ffcecc44ffa6801c1c4a517b4934f1a274c5d3b08f0853da6ba532f4bc33eb7695da57a2350cc1011c5

  • C:\Windows\xk.exe

    Filesize

    91KB

    MD5

    9a3b0b13172f05192397c6b807e4bf6b

    SHA1

    074df428091b60dc86768480d18c86165c559d92

    SHA256

    6af03fbfa1b95c1ef6294c338df40497e0f0a68285da9c783ef2d77c138a881e

    SHA512

    ba6933eab6f2df52c52a5c1d72e4192e30765ae78e5180a494fbb2c6dc12dfa3b9faa90bccd87b1bed36141e762ab5b1f9abc05de7e849a8ba25728ff756df43

  • \Users\Admin\AppData\Local\WINDOWS\LSASS.EXE

    Filesize

    91KB

    MD5

    ab735a936bdcc469da2c47137fb78dc1

    SHA1

    6aa02790e4aa696c945a5946baa64e1df8fd596d

    SHA256

    920ec7286d53ec443ea0ab0678ff3eab9feb6d2e1bc8bf96d0af90b373b3aaff

    SHA512

    dd79f6a5f5f49d758719ebbcb9f84e14f5cf0d314b6cf885c25440332a2e3fcf21ff90fa0be61f009e13ee6884d38f5b86338cd1e290abbfe87292913bdc2dc5

  • \Users\Admin\AppData\Local\WINDOWS\SERVICES.EXE

    Filesize

    91KB

    MD5

    cc82943b84c2808f54ece7e89ebdb91b

    SHA1

    000915b5bad50771f97538f9e23be0e4fb797c61

    SHA256

    ad2cd0451fa123467d74ca4ac07a28572203be60bb42a0527ef2f28e39950ab8

    SHA512

    fde0a91e3179f8b43100fe1117c5a58c52209e630b2932964d01e53b3a5e1472d228f2c3dcae5ebc18cdaa5277c9af1ed44a9dca8a19236c0eb60a7a6392948e

  • \Users\Admin\AppData\Local\WINDOWS\WINLOGON.EXE

    Filesize

    91KB

    MD5

    b8469e42ad482739f8b3aa8b2dc2682c

    SHA1

    a0066c7aba338ef3a06a3450500bdd21dddc2b2d

    SHA256

    1ca0059e31ac56df445332b07e7315a8aefc17e8b06d8b1835e768a049db19f7

    SHA512

    3c2821a9b3eea5ac3baf09e4291de07a4cd7acd8e37a9413c8f4ff7926e8b9e733de5d4741bdcb44765e0925f4a82d8dd478d7df54ccc3810eb43ece41525074

  • \Windows\SysWOW64\IExplorer.exe

    Filesize

    91KB

    MD5

    fb1140126feb95967942a0aee7de1813

    SHA1

    341060573456e5676a6386f82484f764b2dd6c6e

    SHA256

    78b2e83ebdff3f61bdf78585460a39728263c4f9b64e18f99576af16114824a0

    SHA512

    8c3b52702feb3080203e020ddb16692a2a3dee8ecc8796731ce13ef66ecf3160f22e557978f154730338f395c3668c809744c63ef14268111cffd722da8690d0

  • memory/1108-111-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/1108-114-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/1280-138-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/1324-149-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/1680-173-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/1680-170-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/1720-134-0x00000000006D0000-0x00000000006FF000-memory.dmp

    Filesize

    188KB

  • memory/1720-109-0x00000000006D0000-0x00000000006FF000-memory.dmp

    Filesize

    188KB

  • memory/1720-146-0x00000000006D0000-0x00000000006FF000-memory.dmp

    Filesize

    188KB

  • memory/1720-186-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/1720-122-0x00000000006D0000-0x00000000006FF000-memory.dmp

    Filesize

    188KB

  • memory/1720-181-0x00000000006D0000-0x00000000006FF000-memory.dmp

    Filesize

    188KB

  • memory/1720-0-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/1720-169-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/1720-110-0x00000000006D0000-0x00000000006FF000-memory.dmp

    Filesize

    188KB

  • memory/2180-163-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/2180-159-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/2496-123-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/2496-126-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/2724-185-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB