Analysis

  • max time kernel
    140s
  • max time network
    128s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    16/05/2024, 09:14

General

  • Target

    d1f715064299924410101db0420a8ba0_NeikiAnalytics.exe

  • Size

    91KB

  • MD5

    d1f715064299924410101db0420a8ba0

  • SHA1

    23a427f4339487dd4e3f5fdbfb2d318a97a9e043

  • SHA256

    6a0e41f1c256dbc25ef0482dce97ae82ae3c39d31c6340c86dc8a135d5af2d23

  • SHA512

    65ff408b69fa784ea21cd0a71c80e5b4a72ec8ed926137e736f949ff03e154c916b644d2a8d03710a1806c70cd9daa6657996c29e36d94a7be7eaa3beee4568b

  • SSDEEP

    1536:kRsjd3GR2Dxy387Lnouy8VT9Rsjd3GR2Dxy387Lnouy8VTY:kOgUXoutN9OgUXoutNY

Score
10/10

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 2 IoCs
  • Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Disables RegEdit via registry modification 2 IoCs
  • Disables use of System Restore points 1 TTPs
  • Executes dropped EXE 7 IoCs
  • Modifies system executable filetype association 2 TTPs 13 IoCs
  • UPX packed file 18 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 5 IoCs
  • Drops file in System32 directory 6 IoCs
  • Drops file in Windows directory 2 IoCs
  • Modifies Control Panel 4 IoCs
  • Modifies registry class 15 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs
  • System policy modification 1 TTPs 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d1f715064299924410101db0420a8ba0_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\d1f715064299924410101db0420a8ba0_NeikiAnalytics.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Modifies visibility of file extensions in Explorer
    • Modifies visiblity of hidden/system files in Explorer
    • Disables RegEdit via registry modification
    • Modifies system executable filetype association
    • Adds Run key to start application
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies Control Panel
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    • System policy modification
    PID:1652
    • C:\Windows\xk.exe
      C:\Windows\xk.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:4692
    • C:\Windows\SysWOW64\IExplorer.exe
      C:\Windows\system32\IExplorer.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:1816
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:4044
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:2540
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:4428
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:820
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:4040
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --field-trial-handle=4244,i,13035806169561352434,1332896185314862791,262144 --variations-seed-version --mojo-platform-channel-handle=3900 /prefetch:8
    1⤵
      PID:1976

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\WINDOWS\CSRSS.EXE

      Filesize

      91KB

      MD5

      09c5cc5e591791c6d821422de9963065

      SHA1

      7bec638af94ca45ceb7ce09692c198eac1959973

      SHA256

      276f51b60a94973096641fe80bc125c1bb4eff711f575ed2cfe57a03fc09ae1d

      SHA512

      faa515756c7a27c3a40f7082749ca8f2f569e296052be9ffda4481a8d82d45bc434de2a306c79426fe7c9fb58f27c016f6bf006590b04144a79794410b0f2593

    • C:\Users\Admin\AppData\Local\WINDOWS\LSASS.EXE

      Filesize

      91KB

      MD5

      4381cf30a78014461bb8921403633cf6

      SHA1

      b0864793994739427d854a38f3964e9353909da2

      SHA256

      60c7a990701cb8b224e347c466037d9c0d8cd901da27c3f0e594d0f73dcbffef

      SHA512

      e48dcbc250e1dfa5c60d77f8e86f47127dde6beda9c67f8c5498df8f069624c5e319afbb8d5f652327801e226a510f48a1fb0603f4d7eef6c96832f83f2626f3

    • C:\Users\Admin\AppData\Local\WINDOWS\SERVICES.EXE

      Filesize

      91KB

      MD5

      d69c4f7b7074451a569622a182748556

      SHA1

      adbff0f1bb291f839e7b052a23f8b8a0e5b4f12e

      SHA256

      0521c590556fd6e120e062dda2d4c1aff9fb8cdfdbbe20579a20bad6cab1bbe1

      SHA512

      01ae705e5a605cb07827ef454341365c77bf88fb58f9bbffe1a086c90b7efb07b47c0db10f2c46ff11b7a5cd8f804a8ebe91815c37d79a3fb0a591e6c4db85fe

    • C:\Users\Admin\AppData\Local\WINDOWS\SMSS.EXE

      Filesize

      91KB

      MD5

      f82ec86a6feca64790162d3e46bdb9a8

      SHA1

      7d8d459f65b00f7b35f5377aed2fb18e684bcf05

      SHA256

      3afb1e31bd2b2e965fdf01d329b47066863335e7bd17ae68536ed9d1e4d30dc9

      SHA512

      62f668b9e9c71c3b2b330eb688575de17cabe2a92946d21819c0ecc0de77967b28bc422f41de2d4d0d696fab9b5fcd27c939d83b3f9879cade2dd3f779f126b4

    • C:\Users\Admin\AppData\Local\WINDOWS\WINLOGON.EXE

      Filesize

      91KB

      MD5

      01aa2a0c2ff2490e7041c027ebe26ad6

      SHA1

      e7d6912f196f8fbaf738db9a9292e72a389364b6

      SHA256

      a43adb4651c9910f2303c211f9db02ce1666ec716301ee621dc2d51879f84aa5

      SHA512

      cfe2dfc1d235ec5ce11d3be584dbe069af138cc1544884ba49bac90c362d5c639d810a78bb599e24c870b03a1c7d36c84d3836ca3cbd0417dc6ad2fd4b75a8dc

    • C:\Users\Admin\AppData\Local\winlogon.exe

      Filesize

      91KB

      MD5

      d1f715064299924410101db0420a8ba0

      SHA1

      23a427f4339487dd4e3f5fdbfb2d318a97a9e043

      SHA256

      6a0e41f1c256dbc25ef0482dce97ae82ae3c39d31c6340c86dc8a135d5af2d23

      SHA512

      65ff408b69fa784ea21cd0a71c80e5b4a72ec8ed926137e736f949ff03e154c916b644d2a8d03710a1806c70cd9daa6657996c29e36d94a7be7eaa3beee4568b

    • C:\Windows\SysWOW64\IExplorer.exe

      Filesize

      91KB

      MD5

      d329bad02b8a9e162fbf2300623ef4a9

      SHA1

      a73fd24a3edf14ae7be991d59d150dc86b86c8c2

      SHA256

      1e2050180ec16680369f70c8d1b157c779930d39c863b20bb6fcaaca7bbbadac

      SHA512

      b1e47a2966a25b995cc0c21b0d0fcf22cbde1d70edf38683c9748effb106a3ad1b64ea7f8dc963954408617ecdfbadb4300023068c4371c99540487655559a60

    • C:\Windows\xk.exe

      Filesize

      91KB

      MD5

      b96d496c688273fe62ee212716a003b8

      SHA1

      c195ded074124ac92d42bc980692765d69dccfac

      SHA256

      dddf2476abf96b725ffb9af52e2890769e11f4828888a5c08d6ddda48488e284

      SHA512

      254925ca5302bb253c69483db65f5ee94c1232c38e011497a0d1c590b2cb67e041bfb67858aef5e92fbde27e93c880a5206c5564a8ee811543bebab43faf0151

    • memory/820-146-0x0000000000400000-0x000000000042F000-memory.dmp

      Filesize

      188KB

    • memory/1652-154-0x0000000000400000-0x000000000042F000-memory.dmp

      Filesize

      188KB

    • memory/1652-0-0x0000000000400000-0x000000000042F000-memory.dmp

      Filesize

      188KB

    • memory/1816-118-0x0000000000400000-0x000000000042F000-memory.dmp

      Filesize

      188KB

    • memory/2540-132-0x0000000000400000-0x000000000042F000-memory.dmp

      Filesize

      188KB

    • memory/4040-152-0x0000000000400000-0x000000000042F000-memory.dmp

      Filesize

      188KB

    • memory/4044-125-0x0000000000400000-0x000000000042F000-memory.dmp

      Filesize

      188KB

    • memory/4428-140-0x0000000000400000-0x000000000042F000-memory.dmp

      Filesize

      188KB

    • memory/4428-136-0x0000000000400000-0x000000000042F000-memory.dmp

      Filesize

      188KB

    • memory/4692-113-0x0000000000400000-0x000000000042F000-memory.dmp

      Filesize

      188KB