Analysis
-
max time kernel
117s -
max time network
117s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
16-05-2024 18:07
Static task
static1
Behavioral task
behavioral1
Sample
08d3093f763900d30d9d8708950ed180_NeikiAnalytics.dll
Resource
win7-20240221-en
General
-
Target
08d3093f763900d30d9d8708950ed180_NeikiAnalytics.dll
-
Size
120KB
-
MD5
08d3093f763900d30d9d8708950ed180
-
SHA1
1e6b75ff3d3d41bae407e1a6d416d212bc08237f
-
SHA256
3c5e6bb327cc465fe364e4cf088b0f574de12f7ae5be5e4371a8d01bf8bdbcb8
-
SHA512
867c566bc5eb2e412ac87c8c254d19c95b4a00312f5a70447531a53f3db4472086b82b410345e83dc075f7bc8cfcf99095ffa9158fe53bd8a092e83f730ce3d6
-
SSDEEP
3072:aDzGLi0B8DWHzBiHBHNeNTbV0Xjf7dW9s0Bkgf:Szx06DXBHNu3QHdW9s6zf
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Signatures
-
Modifies firewall policy service 2 TTPs 6 IoCs
Processes:
f761d12.exef7638bc.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" f761d12.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" f761d12.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "1" f761d12.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" f7638bc.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" f7638bc.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "1" f7638bc.exe -
Processes:
f761d12.exef7638bc.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" f761d12.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" f7638bc.exe -
Processes:
f761d12.exef7638bc.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" f761d12.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" f7638bc.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" f7638bc.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" f7638bc.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" f761d12.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" f761d12.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" f761d12.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" f7638bc.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" f7638bc.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" f7638bc.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" f761d12.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" f761d12.exe -
Executes dropped EXE 3 IoCs
Processes:
f761d12.exef761fd0.exef7638bc.exepid process 2252 f761d12.exe 2616 f761fd0.exe 2240 f7638bc.exe -
Loads dropped DLL 6 IoCs
Processes:
rundll32.exepid process 2212 rundll32.exe 2212 rundll32.exe 2212 rundll32.exe 2212 rundll32.exe 2212 rundll32.exe 2212 rundll32.exe -
Processes:
resource yara_rule behavioral1/memory/2252-13-0x0000000000670000-0x000000000172A000-memory.dmp upx behavioral1/memory/2252-16-0x0000000000670000-0x000000000172A000-memory.dmp upx behavioral1/memory/2252-18-0x0000000000670000-0x000000000172A000-memory.dmp upx behavioral1/memory/2252-21-0x0000000000670000-0x000000000172A000-memory.dmp upx behavioral1/memory/2252-22-0x0000000000670000-0x000000000172A000-memory.dmp upx behavioral1/memory/2252-23-0x0000000000670000-0x000000000172A000-memory.dmp upx behavioral1/memory/2252-20-0x0000000000670000-0x000000000172A000-memory.dmp upx behavioral1/memory/2252-19-0x0000000000670000-0x000000000172A000-memory.dmp upx behavioral1/memory/2252-17-0x0000000000670000-0x000000000172A000-memory.dmp upx behavioral1/memory/2252-15-0x0000000000670000-0x000000000172A000-memory.dmp upx behavioral1/memory/2252-60-0x0000000000670000-0x000000000172A000-memory.dmp upx behavioral1/memory/2252-61-0x0000000000670000-0x000000000172A000-memory.dmp upx behavioral1/memory/2252-62-0x0000000000670000-0x000000000172A000-memory.dmp upx behavioral1/memory/2252-64-0x0000000000670000-0x000000000172A000-memory.dmp upx behavioral1/memory/2252-63-0x0000000000670000-0x000000000172A000-memory.dmp upx behavioral1/memory/2252-66-0x0000000000670000-0x000000000172A000-memory.dmp upx behavioral1/memory/2252-67-0x0000000000670000-0x000000000172A000-memory.dmp upx behavioral1/memory/2252-80-0x0000000000670000-0x000000000172A000-memory.dmp upx behavioral1/memory/2252-83-0x0000000000670000-0x000000000172A000-memory.dmp upx behavioral1/memory/2252-85-0x0000000000670000-0x000000000172A000-memory.dmp upx behavioral1/memory/2252-86-0x0000000000670000-0x000000000172A000-memory.dmp upx behavioral1/memory/2252-110-0x0000000000670000-0x000000000172A000-memory.dmp upx behavioral1/memory/2252-149-0x0000000000670000-0x000000000172A000-memory.dmp upx behavioral1/memory/2240-165-0x0000000000950000-0x0000000001A0A000-memory.dmp upx behavioral1/memory/2240-202-0x0000000000950000-0x0000000001A0A000-memory.dmp upx -
Processes:
f7638bc.exef761d12.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\Svc f7638bc.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" f761d12.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\Svc f761d12.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" f7638bc.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" f7638bc.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" f761d12.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" f7638bc.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" f7638bc.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" f7638bc.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" f761d12.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" f761d12.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" f761d12.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" f761d12.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" f7638bc.exe -
Processes:
f761d12.exef7638bc.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" f761d12.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" f7638bc.exe -
Enumerates connected drives 3 TTPs 16 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
f761d12.exef7638bc.exedescription ioc process File opened (read-only) \??\J: f761d12.exe File opened (read-only) \??\S: f761d12.exe File opened (read-only) \??\T: f761d12.exe File opened (read-only) \??\E: f761d12.exe File opened (read-only) \??\N: f761d12.exe File opened (read-only) \??\P: f761d12.exe File opened (read-only) \??\R: f761d12.exe File opened (read-only) \??\E: f7638bc.exe File opened (read-only) \??\K: f761d12.exe File opened (read-only) \??\H: f761d12.exe File opened (read-only) \??\I: f761d12.exe File opened (read-only) \??\L: f761d12.exe File opened (read-only) \??\M: f761d12.exe File opened (read-only) \??\O: f761d12.exe File opened (read-only) \??\Q: f761d12.exe File opened (read-only) \??\G: f761d12.exe -
Drops file in Windows directory 3 IoCs
Processes:
f761d12.exef7638bc.exedescription ioc process File opened for modification C:\Windows\SYSTEM.INI f761d12.exe File created C:\Windows\f766f08 f7638bc.exe File created C:\Windows\f761dae f761d12.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
Processes:
f761d12.exef7638bc.exepid process 2252 f761d12.exe 2252 f761d12.exe 2240 f7638bc.exe -
Suspicious use of AdjustPrivilegeToken 41 IoCs
Processes:
f761d12.exef7638bc.exedescription pid process Token: SeDebugPrivilege 2252 f761d12.exe Token: SeDebugPrivilege 2252 f761d12.exe Token: SeDebugPrivilege 2252 f761d12.exe Token: SeDebugPrivilege 2252 f761d12.exe Token: SeDebugPrivilege 2252 f761d12.exe Token: SeDebugPrivilege 2252 f761d12.exe Token: SeDebugPrivilege 2252 f761d12.exe Token: SeDebugPrivilege 2252 f761d12.exe Token: SeDebugPrivilege 2252 f761d12.exe Token: SeDebugPrivilege 2252 f761d12.exe Token: SeDebugPrivilege 2252 f761d12.exe Token: SeDebugPrivilege 2252 f761d12.exe Token: SeDebugPrivilege 2252 f761d12.exe Token: SeDebugPrivilege 2252 f761d12.exe Token: SeDebugPrivilege 2252 f761d12.exe Token: SeDebugPrivilege 2252 f761d12.exe Token: SeDebugPrivilege 2252 f761d12.exe Token: SeDebugPrivilege 2252 f761d12.exe Token: SeDebugPrivilege 2252 f761d12.exe Token: SeDebugPrivilege 2252 f761d12.exe Token: SeDebugPrivilege 2252 f761d12.exe Token: SeDebugPrivilege 2240 f7638bc.exe Token: SeDebugPrivilege 2240 f7638bc.exe Token: SeDebugPrivilege 2240 f7638bc.exe Token: SeDebugPrivilege 2240 f7638bc.exe Token: SeDebugPrivilege 2240 f7638bc.exe Token: SeDebugPrivilege 2240 f7638bc.exe Token: SeDebugPrivilege 2240 f7638bc.exe Token: SeDebugPrivilege 2240 f7638bc.exe Token: SeDebugPrivilege 2240 f7638bc.exe Token: SeDebugPrivilege 2240 f7638bc.exe Token: SeDebugPrivilege 2240 f7638bc.exe Token: SeDebugPrivilege 2240 f7638bc.exe Token: SeDebugPrivilege 2240 f7638bc.exe Token: SeDebugPrivilege 2240 f7638bc.exe Token: SeDebugPrivilege 2240 f7638bc.exe Token: SeDebugPrivilege 2240 f7638bc.exe Token: SeDebugPrivilege 2240 f7638bc.exe Token: SeDebugPrivilege 2240 f7638bc.exe Token: SeDebugPrivilege 2240 f7638bc.exe Token: SeDebugPrivilege 2240 f7638bc.exe -
Suspicious use of WriteProcessMemory 36 IoCs
Processes:
rundll32.exerundll32.exef761d12.exef7638bc.exedescription pid process target process PID 1984 wrote to memory of 2212 1984 rundll32.exe rundll32.exe PID 1984 wrote to memory of 2212 1984 rundll32.exe rundll32.exe PID 1984 wrote to memory of 2212 1984 rundll32.exe rundll32.exe PID 1984 wrote to memory of 2212 1984 rundll32.exe rundll32.exe PID 1984 wrote to memory of 2212 1984 rundll32.exe rundll32.exe PID 1984 wrote to memory of 2212 1984 rundll32.exe rundll32.exe PID 1984 wrote to memory of 2212 1984 rundll32.exe rundll32.exe PID 2212 wrote to memory of 2252 2212 rundll32.exe f761d12.exe PID 2212 wrote to memory of 2252 2212 rundll32.exe f761d12.exe PID 2212 wrote to memory of 2252 2212 rundll32.exe f761d12.exe PID 2212 wrote to memory of 2252 2212 rundll32.exe f761d12.exe PID 2252 wrote to memory of 1116 2252 f761d12.exe taskhost.exe PID 2252 wrote to memory of 1172 2252 f761d12.exe Dwm.exe PID 2252 wrote to memory of 1208 2252 f761d12.exe Explorer.EXE PID 2252 wrote to memory of 2360 2252 f761d12.exe DllHost.exe PID 2252 wrote to memory of 1984 2252 f761d12.exe rundll32.exe PID 2252 wrote to memory of 2212 2252 f761d12.exe rundll32.exe PID 2252 wrote to memory of 2212 2252 f761d12.exe rundll32.exe PID 2212 wrote to memory of 2616 2212 rundll32.exe f761fd0.exe PID 2212 wrote to memory of 2616 2212 rundll32.exe f761fd0.exe PID 2212 wrote to memory of 2616 2212 rundll32.exe f761fd0.exe PID 2212 wrote to memory of 2616 2212 rundll32.exe f761fd0.exe PID 2212 wrote to memory of 2240 2212 rundll32.exe f7638bc.exe PID 2212 wrote to memory of 2240 2212 rundll32.exe f7638bc.exe PID 2212 wrote to memory of 2240 2212 rundll32.exe f7638bc.exe PID 2212 wrote to memory of 2240 2212 rundll32.exe f7638bc.exe PID 2252 wrote to memory of 1116 2252 f761d12.exe taskhost.exe PID 2252 wrote to memory of 1172 2252 f761d12.exe Dwm.exe PID 2252 wrote to memory of 1208 2252 f761d12.exe Explorer.EXE PID 2252 wrote to memory of 2616 2252 f761d12.exe f761fd0.exe PID 2252 wrote to memory of 2616 2252 f761d12.exe f761fd0.exe PID 2252 wrote to memory of 2240 2252 f761d12.exe f7638bc.exe PID 2252 wrote to memory of 2240 2252 f761d12.exe f7638bc.exe PID 2240 wrote to memory of 1116 2240 f7638bc.exe taskhost.exe PID 2240 wrote to memory of 1172 2240 f7638bc.exe Dwm.exe PID 2240 wrote to memory of 1208 2240 f7638bc.exe Explorer.EXE -
System policy modification 1 TTPs 2 IoCs
Processes:
f761d12.exef7638bc.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" f761d12.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" f7638bc.exe
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1116
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1172
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1208
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\08d3093f763900d30d9d8708950ed180_NeikiAnalytics.dll,#12⤵
- Suspicious use of WriteProcessMemory
PID:1984 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\08d3093f763900d30d9d8708950ed180_NeikiAnalytics.dll,#13⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2212 -
C:\Users\Admin\AppData\Local\Temp\f761d12.exeC:\Users\Admin\AppData\Local\Temp\f761d12.exe4⤵
- Modifies firewall policy service
- UAC bypass
- Windows security bypass
- Executes dropped EXE
- Windows security modification
- Checks whether UAC is enabled
- Enumerates connected drives
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2252
-
-
C:\Users\Admin\AppData\Local\Temp\f761fd0.exeC:\Users\Admin\AppData\Local\Temp\f761fd0.exe4⤵
- Executes dropped EXE
PID:2616
-
-
C:\Users\Admin\AppData\Local\Temp\f7638bc.exeC:\Users\Admin\AppData\Local\Temp\f7638bc.exe4⤵
- Modifies firewall policy service
- UAC bypass
- Windows security bypass
- Executes dropped EXE
- Windows security modification
- Checks whether UAC is enabled
- Enumerates connected drives
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2240
-
-
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:2360
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
3Disable or Modify Tools
3Modify Registry
5Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
257B
MD53660037dbfa145bfd9f0d1ad6b7afeb3
SHA1c35e0fcb3044b68b88f6dfe570eaa72e93a70dd6
SHA25654df1a288ac172320fc9d82bee132e48433c235a5cad6796d20f28a25cd03b30
SHA512deb6c3db1b31a8ed894e38e86d5efbec8c44ebf2c550dafc004a308a0613e5e7157f2a7614ffe55efb183ad8b162ea8807e59e56f72773b652025b3cb0b9afe2
-
Filesize
97KB
MD540e412441ca84458842c69608cfef88c
SHA101df7ccf6107fcdbd90b090bc212a96d3472be97
SHA256f51cd1682c01b95de4ccddea27dfbfa22d5c2e03d5637492b83f98e07e6a5f9b
SHA51229d57f2df1f5a6844430fd142dfa4ca9f95fc74f14b0dcd2cd9517f5dec5d0592f7a74b23597aa68b969c421c761bc642a22c17b094a0a46513134ccc6366995