Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
16-05-2024 16:14
Static task
static1
Behavioral task
behavioral1
Sample
e4a3eca3c3249ff9f2378e5391b0fc00_NeikiAnalytics.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
e4a3eca3c3249ff9f2378e5391b0fc00_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
e4a3eca3c3249ff9f2378e5391b0fc00_NeikiAnalytics.exe
-
Size
308KB
-
MD5
e4a3eca3c3249ff9f2378e5391b0fc00
-
SHA1
94cd4bd15712fea9424884f6dc6200784701fdea
-
SHA256
e14e21a43ea72f73fd0c2ef9bd33a50c93345436845a36b55193989c32c742f7
-
SHA512
2672f0c351f4c2d8cd0de3bf40a377c73b2824099d027b2aace68587f1554cfb5b4eaa28fec41d5146de552ee9fe48d14358409c2959681d46430c0840fafa84
-
SSDEEP
3072:/c3sBG7mXh7m/zZM3jAbNOM6CNtDCZFL:E3sBz0Z4Mj72F
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
ModiLoader Second Stage 4 IoCs
Processes:
resource yara_rule behavioral2/memory/3620-50-0x0000000000400000-0x0000000000414000-memory.dmp modiloader_stage2 behavioral2/memory/3620-51-0x0000000000400000-0x0000000000414000-memory.dmp modiloader_stage2 behavioral2/memory/3620-49-0x0000000000400000-0x0000000000414000-memory.dmp modiloader_stage2 behavioral2/memory/3620-58-0x0000000000400000-0x0000000000414000-memory.dmp modiloader_stage2 -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
e4a3eca3c3249ff9f2378e5391b0fc00_NeikiAnalytics.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation e4a3eca3c3249ff9f2378e5391b0fc00_NeikiAnalytics.exe -
Executes dropped EXE 3 IoCs
Processes:
csrsll.execsrsll.execsrsll.exepid process 100 csrsll.exe 460 csrsll.exe 3620 csrsll.exe -
Processes:
resource yara_rule behavioral2/memory/3056-7-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/memory/3056-5-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/memory/3056-9-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/memory/3620-50-0x0000000000400000-0x0000000000414000-memory.dmp upx behavioral2/memory/3620-51-0x0000000000400000-0x0000000000414000-memory.dmp upx behavioral2/memory/3620-49-0x0000000000400000-0x0000000000414000-memory.dmp upx behavioral2/memory/3056-56-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/memory/3620-48-0x0000000000400000-0x0000000000414000-memory.dmp upx behavioral2/memory/3620-47-0x0000000000400000-0x0000000000414000-memory.dmp upx behavioral2/memory/460-57-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/memory/3620-58-0x0000000000400000-0x0000000000414000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
reg.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Win Pdf = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\csrsll.exe" reg.exe -
Suspicious use of SetThreadContext 3 IoCs
Processes:
e4a3eca3c3249ff9f2378e5391b0fc00_NeikiAnalytics.execsrsll.exedescription pid process target process PID 3044 set thread context of 3056 3044 e4a3eca3c3249ff9f2378e5391b0fc00_NeikiAnalytics.exe e4a3eca3c3249ff9f2378e5391b0fc00_NeikiAnalytics.exe PID 100 set thread context of 460 100 csrsll.exe csrsll.exe PID 100 set thread context of 3620 100 csrsll.exe csrsll.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
csrsll.exedescription pid process Token: SeDebugPrivilege 460 csrsll.exe Token: SeDebugPrivilege 460 csrsll.exe Token: SeDebugPrivilege 460 csrsll.exe Token: SeDebugPrivilege 460 csrsll.exe Token: SeDebugPrivilege 460 csrsll.exe Token: SeDebugPrivilege 460 csrsll.exe Token: SeDebugPrivilege 460 csrsll.exe Token: SeDebugPrivilege 460 csrsll.exe Token: SeDebugPrivilege 460 csrsll.exe Token: SeDebugPrivilege 460 csrsll.exe Token: SeDebugPrivilege 460 csrsll.exe Token: SeDebugPrivilege 460 csrsll.exe Token: SeDebugPrivilege 460 csrsll.exe Token: SeDebugPrivilege 460 csrsll.exe Token: SeDebugPrivilege 460 csrsll.exe Token: SeDebugPrivilege 460 csrsll.exe Token: SeDebugPrivilege 460 csrsll.exe Token: SeDebugPrivilege 460 csrsll.exe Token: SeDebugPrivilege 460 csrsll.exe Token: SeDebugPrivilege 460 csrsll.exe Token: SeDebugPrivilege 460 csrsll.exe Token: SeDebugPrivilege 460 csrsll.exe Token: SeDebugPrivilege 460 csrsll.exe Token: SeDebugPrivilege 460 csrsll.exe Token: SeDebugPrivilege 460 csrsll.exe Token: SeDebugPrivilege 460 csrsll.exe Token: SeDebugPrivilege 460 csrsll.exe Token: SeDebugPrivilege 460 csrsll.exe Token: SeDebugPrivilege 460 csrsll.exe Token: SeDebugPrivilege 460 csrsll.exe Token: SeDebugPrivilege 460 csrsll.exe Token: SeDebugPrivilege 460 csrsll.exe Token: SeDebugPrivilege 460 csrsll.exe Token: SeDebugPrivilege 460 csrsll.exe Token: SeDebugPrivilege 460 csrsll.exe Token: SeDebugPrivilege 460 csrsll.exe Token: SeDebugPrivilege 460 csrsll.exe Token: SeDebugPrivilege 460 csrsll.exe Token: SeDebugPrivilege 460 csrsll.exe Token: SeDebugPrivilege 460 csrsll.exe Token: SeDebugPrivilege 460 csrsll.exe Token: SeDebugPrivilege 460 csrsll.exe Token: SeDebugPrivilege 460 csrsll.exe Token: SeDebugPrivilege 460 csrsll.exe Token: SeDebugPrivilege 460 csrsll.exe Token: SeDebugPrivilege 460 csrsll.exe Token: SeDebugPrivilege 460 csrsll.exe Token: SeDebugPrivilege 460 csrsll.exe Token: SeDebugPrivilege 460 csrsll.exe Token: SeDebugPrivilege 460 csrsll.exe Token: SeDebugPrivilege 460 csrsll.exe Token: SeDebugPrivilege 460 csrsll.exe Token: SeDebugPrivilege 460 csrsll.exe Token: SeDebugPrivilege 460 csrsll.exe Token: SeDebugPrivilege 460 csrsll.exe Token: SeDebugPrivilege 460 csrsll.exe Token: SeDebugPrivilege 460 csrsll.exe Token: SeDebugPrivilege 460 csrsll.exe Token: SeDebugPrivilege 460 csrsll.exe Token: SeDebugPrivilege 460 csrsll.exe Token: SeDebugPrivilege 460 csrsll.exe Token: SeDebugPrivilege 460 csrsll.exe Token: SeDebugPrivilege 460 csrsll.exe Token: SeDebugPrivilege 460 csrsll.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
Processes:
e4a3eca3c3249ff9f2378e5391b0fc00_NeikiAnalytics.exee4a3eca3c3249ff9f2378e5391b0fc00_NeikiAnalytics.execsrsll.execsrsll.exepid process 3044 e4a3eca3c3249ff9f2378e5391b0fc00_NeikiAnalytics.exe 3056 e4a3eca3c3249ff9f2378e5391b0fc00_NeikiAnalytics.exe 100 csrsll.exe 460 csrsll.exe -
Suspicious use of WriteProcessMemory 33 IoCs
Processes:
e4a3eca3c3249ff9f2378e5391b0fc00_NeikiAnalytics.exee4a3eca3c3249ff9f2378e5391b0fc00_NeikiAnalytics.execmd.execsrsll.exedescription pid process target process PID 3044 wrote to memory of 3056 3044 e4a3eca3c3249ff9f2378e5391b0fc00_NeikiAnalytics.exe e4a3eca3c3249ff9f2378e5391b0fc00_NeikiAnalytics.exe PID 3044 wrote to memory of 3056 3044 e4a3eca3c3249ff9f2378e5391b0fc00_NeikiAnalytics.exe e4a3eca3c3249ff9f2378e5391b0fc00_NeikiAnalytics.exe PID 3044 wrote to memory of 3056 3044 e4a3eca3c3249ff9f2378e5391b0fc00_NeikiAnalytics.exe e4a3eca3c3249ff9f2378e5391b0fc00_NeikiAnalytics.exe PID 3044 wrote to memory of 3056 3044 e4a3eca3c3249ff9f2378e5391b0fc00_NeikiAnalytics.exe e4a3eca3c3249ff9f2378e5391b0fc00_NeikiAnalytics.exe PID 3044 wrote to memory of 3056 3044 e4a3eca3c3249ff9f2378e5391b0fc00_NeikiAnalytics.exe e4a3eca3c3249ff9f2378e5391b0fc00_NeikiAnalytics.exe PID 3044 wrote to memory of 3056 3044 e4a3eca3c3249ff9f2378e5391b0fc00_NeikiAnalytics.exe e4a3eca3c3249ff9f2378e5391b0fc00_NeikiAnalytics.exe PID 3044 wrote to memory of 3056 3044 e4a3eca3c3249ff9f2378e5391b0fc00_NeikiAnalytics.exe e4a3eca3c3249ff9f2378e5391b0fc00_NeikiAnalytics.exe PID 3044 wrote to memory of 3056 3044 e4a3eca3c3249ff9f2378e5391b0fc00_NeikiAnalytics.exe e4a3eca3c3249ff9f2378e5391b0fc00_NeikiAnalytics.exe PID 3056 wrote to memory of 4028 3056 e4a3eca3c3249ff9f2378e5391b0fc00_NeikiAnalytics.exe cmd.exe PID 3056 wrote to memory of 4028 3056 e4a3eca3c3249ff9f2378e5391b0fc00_NeikiAnalytics.exe cmd.exe PID 3056 wrote to memory of 4028 3056 e4a3eca3c3249ff9f2378e5391b0fc00_NeikiAnalytics.exe cmd.exe PID 4028 wrote to memory of 4932 4028 cmd.exe reg.exe PID 4028 wrote to memory of 4932 4028 cmd.exe reg.exe PID 4028 wrote to memory of 4932 4028 cmd.exe reg.exe PID 3056 wrote to memory of 100 3056 e4a3eca3c3249ff9f2378e5391b0fc00_NeikiAnalytics.exe csrsll.exe PID 3056 wrote to memory of 100 3056 e4a3eca3c3249ff9f2378e5391b0fc00_NeikiAnalytics.exe csrsll.exe PID 3056 wrote to memory of 100 3056 e4a3eca3c3249ff9f2378e5391b0fc00_NeikiAnalytics.exe csrsll.exe PID 100 wrote to memory of 460 100 csrsll.exe csrsll.exe PID 100 wrote to memory of 460 100 csrsll.exe csrsll.exe PID 100 wrote to memory of 460 100 csrsll.exe csrsll.exe PID 100 wrote to memory of 460 100 csrsll.exe csrsll.exe PID 100 wrote to memory of 460 100 csrsll.exe csrsll.exe PID 100 wrote to memory of 460 100 csrsll.exe csrsll.exe PID 100 wrote to memory of 460 100 csrsll.exe csrsll.exe PID 100 wrote to memory of 460 100 csrsll.exe csrsll.exe PID 100 wrote to memory of 3620 100 csrsll.exe csrsll.exe PID 100 wrote to memory of 3620 100 csrsll.exe csrsll.exe PID 100 wrote to memory of 3620 100 csrsll.exe csrsll.exe PID 100 wrote to memory of 3620 100 csrsll.exe csrsll.exe PID 100 wrote to memory of 3620 100 csrsll.exe csrsll.exe PID 100 wrote to memory of 3620 100 csrsll.exe csrsll.exe PID 100 wrote to memory of 3620 100 csrsll.exe csrsll.exe PID 100 wrote to memory of 3620 100 csrsll.exe csrsll.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\e4a3eca3c3249ff9f2378e5391b0fc00_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\e4a3eca3c3249ff9f2378e5391b0fc00_NeikiAnalytics.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3044 -
C:\Users\Admin\AppData\Local\Temp\e4a3eca3c3249ff9f2378e5391b0fc00_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\e4a3eca3c3249ff9f2378e5391b0fc00_NeikiAnalytics.exe"2⤵
- Checks computer location settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3056 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\AMRNB.bat" "3⤵
- Suspicious use of WriteProcessMemory
PID:4028 -
C:\Windows\SysWOW64\reg.exeREG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "Win Pdf" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe" /f4⤵
- Adds Run key to start application
PID:4932
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe"C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:100 -
C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe"C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe"4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:460
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe"C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe"4⤵
- Executes dropped EXE
PID:3620
-
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --field-trial-handle=4116,i,11266875042087428226,16669718873272757238,262144 --variations-seed-version --mojo-platform-channel-handle=3444 /prefetch:81⤵PID:4248
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
145B
MD54eb61ec7816c34ec8c125acadc57ec1b
SHA1b0015cc865c0bb1a027be663027d3829401a31cc
SHA25608375cdb2e9819391f67f71e9718c15b48d3eaa452c54bd8fdd1f6a42e899aff
SHA512f289f01d996dd643560370be8cdf8894e9a676ca3813f706c01ef5d705b9b18246c6cadf10d96edd433a616637b8a78fbd23c5738e76f1c4e671977b6d0cb6c1
-
Filesize
308KB
MD5bfe60a979f19c5fd8ad43bbf71c849f8
SHA1c5ef99b70e6aa79195dee9c26f21d8c3a9b791dc
SHA25653f3ed5a248061090a369b58d47bfc25a26911c1a164261c6e67e557042df89c
SHA5122d31aafca118140b3348d81aa08d12c892d3f72eec10763164635c90c6cc455c8256fcbbd18d6bdd4a3325d16be91b419919fcc480aeafd8a007378fa3b432e6