Analysis

  • max time kernel
    150s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    16/05/2024, 06:39

General

  • Target

    b3429ffc2662978de7693fe1c46c18f0_NeikiAnalytics.exe

  • Size

    135KB

  • MD5

    b3429ffc2662978de7693fe1c46c18f0

  • SHA1

    596c9a0499e7adabef8976aa1ae76dc5332d7d5c

  • SHA256

    c8ce4486ffba3657b75dd964a265c4b0945128de11059bd9462f3a1b2b84269e

  • SHA512

    174395fb040412921a6ca900d416874524cc3fe01c71eb7850601f6a25955f90e19f484f6392327e9216c5dfa4e9c9d5989c13ecda5773f8b91682a96e451b7b

  • SSDEEP

    1536:UfsEqouTRcG/Mzvgf7xEuvnXNTRdUzwTekUOisZ1yDDajtXbVo+Wi:UVqoCl/YgjxEufVU0TbTyDDal0i

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 4 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Drops file in System32 directory 2 IoCs
  • Drops file in Windows directory 4 IoCs
  • Creates scheduled task(s) 1 TTPs 3 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 2 IoCs
  • Suspicious use of SetWindowsHookEx 10 IoCs
  • Suspicious use of WriteProcessMemory 32 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b3429ffc2662978de7693fe1c46c18f0_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\b3429ffc2662978de7693fe1c46c18f0_NeikiAnalytics.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1560
    • \??\c:\windows\resources\themes\explorer.exe
      c:\windows\resources\themes\explorer.exe
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Drops file in System32 directory
      • Drops file in Windows directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1592
      • \??\c:\windows\resources\spoolsv.exe
        c:\windows\resources\spoolsv.exe SE
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in Windows directory
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2596
        • \??\c:\windows\resources\svchost.exe
          c:\windows\resources\svchost.exe
          4⤵
          • Modifies visiblity of hidden/system files in Explorer
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Drops file in System32 directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: GetForegroundWindowSpam
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:2760
          • \??\c:\windows\resources\spoolsv.exe
            c:\windows\resources\spoolsv.exe PR
            5⤵
            • Executes dropped EXE
            • Suspicious use of SetWindowsHookEx
            PID:2620
          • C:\Windows\SysWOW64\schtasks.exe
            schtasks /create /tn "svchost" /tr "c:\windows\resources\svchost.exe" /sc daily /st 06:41 /f
            5⤵
            • Creates scheduled task(s)
            PID:2656
          • C:\Windows\SysWOW64\schtasks.exe
            schtasks /create /tn "svchost" /tr "c:\windows\resources\svchost.exe" /sc daily /st 06:42 /f
            5⤵
            • Creates scheduled task(s)
            PID:1864
          • C:\Windows\SysWOW64\schtasks.exe
            schtasks /create /tn "svchost" /tr "c:\windows\resources\svchost.exe" /sc daily /st 06:43 /f
            5⤵
            • Creates scheduled task(s)
            PID:2372
      • C:\Windows\Explorer.exe
        C:\Windows\Explorer.exe
        3⤵
          PID:1152

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Windows\Resources\spoolsv.exe

      Filesize

      135KB

      MD5

      53cf7cbc135c991351a5e43a32d40c78

      SHA1

      0ccaa7541235521a238c9fc295609542755f9798

      SHA256

      2b270ed8c1c4e30c880656872d7c2ffb2a707212fd0448677243ea605a184e38

      SHA512

      29246b9d865ad3c621e2ad46e8a8c4ffc0b8ec11b1c69461a8fc6ab962497d17d5b86fd7ee3993183370d23076e7f8e369d63c421a0407f9ec451a54d63a6639

    • \Windows\Resources\Themes\explorer.exe

      Filesize

      135KB

      MD5

      c39cc081d0ff0d76b8ed66f4ea660686

      SHA1

      1ccb8e04620240f8c9e491f7138d126d7af0b61b

      SHA256

      e6cf4066cf1614b29afcd031e7e8c739128389713fe7a2f98b7da6a0bb1fb2d8

      SHA512

      1335236d62dbef5d307078b029640fde3a850c507d005b6e41f32cb6f9d3c4d1de45e9222e2475dd975d3dcc707a1c00893f27c75f8886812ce79bd974853885

    • \Windows\Resources\svchost.exe

      Filesize

      135KB

      MD5

      c6ce83c38944db567381141102042675

      SHA1

      8363104f5902e663d09627a96992a2efc3af6ddb

      SHA256

      38f800c286162760c24c13642d893f70a0b397d1ccdc28cccb59b5580ebe6331

      SHA512

      c912e5d56ba0c1155a15e3c48b7b51f91cb67e341d8f2e41ddb84a5b52b036ffa43fc0dfd7b6ae45373ea908116d4465987ce4854c85aa2338721b7b3c53e43c

    • memory/1560-0-0x0000000000400000-0x000000000041F000-memory.dmp

      Filesize

      124KB

    • memory/1560-43-0x0000000000400000-0x000000000041F000-memory.dmp

      Filesize

      124KB

    • memory/1592-19-0x0000000000320000-0x000000000033F000-memory.dmp

      Filesize

      124KB

    • memory/2596-42-0x0000000000400000-0x000000000041F000-memory.dmp

      Filesize

      124KB

    • memory/2620-41-0x0000000000400000-0x000000000041F000-memory.dmp

      Filesize

      124KB

    • memory/2760-36-0x00000000002D0000-0x00000000002EF000-memory.dmp

      Filesize

      124KB