Analysis

  • max time kernel
    150s
  • max time network
    95s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12-05-2024 12:50

General

  • Target

    0ffa9896301effd41a92fb1a5e962100_NeikiAnalytics.exe

  • Size

    135KB

  • MD5

    0ffa9896301effd41a92fb1a5e962100

  • SHA1

    b58445f2776136fd9718916e87f792533a17b8eb

  • SHA256

    a8fb298d3218040c5c577c00605dc993f0e3d336ccfa55e2f319a58b56ab9fe7

  • SHA512

    43ff652151021680497eddc95cd240d28eece9748fd3d36305eb5cf1e9088581a46892ed7224dc04b415e448c22d1c8a9e6d5c650b3c3e1ad864f07350c061f0

  • SSDEEP

    1536:4fsEqouTRcG/Mzvgf7xEuvnXNTRdUzwTekUOisZ1yDDajtXbVwE:4VqoCl/YgjxEufVU0TbTyDDaluE

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 4 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Drops file in System32 directory 2 IoCs
  • Drops file in Windows directory 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 2 IoCs
  • Suspicious use of SetWindowsHookEx 10 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0ffa9896301effd41a92fb1a5e962100_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\0ffa9896301effd41a92fb1a5e962100_NeikiAnalytics.exe"
    1⤵
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4756
    • \??\c:\windows\resources\themes\explorer.exe
      c:\windows\resources\themes\explorer.exe
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Drops file in System32 directory
      • Drops file in Windows directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2296
      • \??\c:\windows\resources\spoolsv.exe
        c:\windows\resources\spoolsv.exe SE
        3⤵
        • Executes dropped EXE
        • Drops file in Windows directory
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:3020
        • \??\c:\windows\resources\svchost.exe
          c:\windows\resources\svchost.exe
          4⤵
          • Modifies visiblity of hidden/system files in Explorer
          • Executes dropped EXE
          • Adds Run key to start application
          • Drops file in System32 directory
          • Suspicious behavior: GetForegroundWindowSpam
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:3076
          • \??\c:\windows\resources\spoolsv.exe
            c:\windows\resources\spoolsv.exe PR
            5⤵
            • Executes dropped EXE
            • Suspicious use of SetWindowsHookEx
            PID:1392

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\Resources\spoolsv.exe

    Filesize

    135KB

    MD5

    e691b21cfeca24fe424039494e61e59c

    SHA1

    baf9650e04977b92651cc6a0ab1dcafaa9759bed

    SHA256

    60f52c996ac06d369e323a32f7ca8272e36dfac642ba31b55353f39ae1e18287

    SHA512

    6e69f4d3b735e378ef2e1214d81b546de2ed584b14834d9262d12d11475e6a168691777f7a6e0314f8bf4078a70cb0f3f1ec11f6bf4e1d74343ebe4cd609fb58

  • C:\Windows\Resources\svchost.exe

    Filesize

    135KB

    MD5

    f4ff4dd70bd9044d89aa7daaa5c86df8

    SHA1

    cffd0d57ed35a8bd87346c8e636eb85e65a4f4db

    SHA256

    7c88455d76d375d21f9ee1e4f5b8a2acfc950ae5f1bf22f16df1b593b21bb463

    SHA512

    e8513d585a9a8e9c460945bf9d281646bb3491d227c8bcbb65c876601a12b1bcca8c9dfaebdd31cc3e292133a97496e7765747de9b7b6a0d5ad9ea7b145c4db6

  • \??\c:\windows\resources\themes\explorer.exe

    Filesize

    135KB

    MD5

    3468128a22e5cca4282b9801dbd90073

    SHA1

    995fed31956e2b5307027e9a9ee562f5f485d111

    SHA256

    39a810a5d61dc6e88e2b9023f090c223485bd900c33ceb603173181867eedbff

    SHA512

    ef7a4b02825eec72033483f1ae9e241beacb5bd9179ed3c50a85e4247378eb60d11b6e9d8eba09afa6d7943819c9d18b7760d73c1e1096df36ba5d3da282c462

  • memory/1392-32-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/3020-33-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/4756-0-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/4756-34-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB