Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
17-05-2024 21:58
Static task
static1
Behavioral task
behavioral1
Sample
3e36e96928247fc44c957c4c7c92e530_NeikiAnalytics.dll
Resource
win7-20240220-en
General
-
Target
3e36e96928247fc44c957c4c7c92e530_NeikiAnalytics.dll
-
Size
120KB
-
MD5
3e36e96928247fc44c957c4c7c92e530
-
SHA1
cc8d8deb5d477d5fd815022314387e50f2fe5c71
-
SHA256
8d955657e3a5055442d25f8f506b51c3b972f32f8731b29ba828382bcd55beb9
-
SHA512
b79758f55c9fcf19f603cab2da80787ca351e3edd48db7f6e6e7f4dc8a1a984ae8995a5c864ad7c0a427bd2145c6a92e11199022c0e26a1a2c5524434237e417
-
SSDEEP
3072:BFJufv+mZrja1HjBo6m/kPBkY9YdG3Dq5bLT:BL9AnaxdXm4kaYdG3Dq5bLT
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Signatures
-
Modifies firewall policy service 2 TTPs 6 IoCs
Processes:
f760f9a.exef76114f.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" f760f9a.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "1" f760f9a.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" f76114f.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" f76114f.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "1" f76114f.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" f760f9a.exe -
Processes:
f760f9a.exef76114f.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" f760f9a.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" f76114f.exe -
Processes:
f760f9a.exef76114f.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" f760f9a.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" f760f9a.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" f760f9a.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" f760f9a.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" f76114f.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" f76114f.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" f76114f.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" f760f9a.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" f76114f.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" f76114f.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" f76114f.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" f760f9a.exe -
Executes dropped EXE 3 IoCs
Processes:
f760f9a.exef76114f.exef762b45.exepid process 3048 f760f9a.exe 2964 f76114f.exe 1920 f762b45.exe -
Loads dropped DLL 6 IoCs
Processes:
rundll32.exepid process 2360 rundll32.exe 2360 rundll32.exe 2360 rundll32.exe 2360 rundll32.exe 2360 rundll32.exe 2360 rundll32.exe -
Processes:
resource yara_rule behavioral1/memory/3048-16-0x00000000006C0000-0x000000000177A000-memory.dmp upx behavioral1/memory/3048-20-0x00000000006C0000-0x000000000177A000-memory.dmp upx behavioral1/memory/3048-14-0x00000000006C0000-0x000000000177A000-memory.dmp upx behavioral1/memory/3048-22-0x00000000006C0000-0x000000000177A000-memory.dmp upx behavioral1/memory/3048-15-0x00000000006C0000-0x000000000177A000-memory.dmp upx behavioral1/memory/3048-21-0x00000000006C0000-0x000000000177A000-memory.dmp upx behavioral1/memory/3048-18-0x00000000006C0000-0x000000000177A000-memory.dmp upx behavioral1/memory/3048-17-0x00000000006C0000-0x000000000177A000-memory.dmp upx behavioral1/memory/3048-13-0x00000000006C0000-0x000000000177A000-memory.dmp upx behavioral1/memory/3048-19-0x00000000006C0000-0x000000000177A000-memory.dmp upx behavioral1/memory/3048-62-0x00000000006C0000-0x000000000177A000-memory.dmp upx behavioral1/memory/3048-63-0x00000000006C0000-0x000000000177A000-memory.dmp upx behavioral1/memory/3048-64-0x00000000006C0000-0x000000000177A000-memory.dmp upx behavioral1/memory/3048-66-0x00000000006C0000-0x000000000177A000-memory.dmp upx behavioral1/memory/3048-65-0x00000000006C0000-0x000000000177A000-memory.dmp upx behavioral1/memory/3048-68-0x00000000006C0000-0x000000000177A000-memory.dmp upx behavioral1/memory/3048-69-0x00000000006C0000-0x000000000177A000-memory.dmp upx behavioral1/memory/3048-83-0x00000000006C0000-0x000000000177A000-memory.dmp upx behavioral1/memory/3048-85-0x00000000006C0000-0x000000000177A000-memory.dmp upx behavioral1/memory/3048-87-0x00000000006C0000-0x000000000177A000-memory.dmp upx behavioral1/memory/3048-151-0x00000000006C0000-0x000000000177A000-memory.dmp upx behavioral1/memory/2964-167-0x0000000000920000-0x00000000019DA000-memory.dmp upx behavioral1/memory/2964-162-0x0000000000920000-0x00000000019DA000-memory.dmp upx -
Processes:
f760f9a.exef76114f.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" f760f9a.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" f760f9a.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" f76114f.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" f76114f.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" f760f9a.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\Svc f760f9a.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" f76114f.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\Svc f76114f.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" f760f9a.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" f76114f.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" f76114f.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" f760f9a.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" f760f9a.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" f76114f.exe -
Processes:
f76114f.exef760f9a.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" f76114f.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" f760f9a.exe -
Enumerates connected drives 3 TTPs 15 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
f760f9a.exedescription ioc process File opened (read-only) \??\J: f760f9a.exe File opened (read-only) \??\K: f760f9a.exe File opened (read-only) \??\M: f760f9a.exe File opened (read-only) \??\R: f760f9a.exe File opened (read-only) \??\E: f760f9a.exe File opened (read-only) \??\H: f760f9a.exe File opened (read-only) \??\Q: f760f9a.exe File opened (read-only) \??\S: f760f9a.exe File opened (read-only) \??\T: f760f9a.exe File opened (read-only) \??\G: f760f9a.exe File opened (read-only) \??\I: f760f9a.exe File opened (read-only) \??\O: f760f9a.exe File opened (read-only) \??\L: f760f9a.exe File opened (read-only) \??\N: f760f9a.exe File opened (read-only) \??\P: f760f9a.exe -
Drops file in Windows directory 3 IoCs
Processes:
f760f9a.exef76114f.exedescription ioc process File opened for modification C:\Windows\SYSTEM.INI f760f9a.exe File created C:\Windows\f765fcc f76114f.exe File created C:\Windows\f760fd9 f760f9a.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
f760f9a.exepid process 3048 f760f9a.exe 3048 f760f9a.exe -
Suspicious use of AdjustPrivilegeToken 21 IoCs
Processes:
f760f9a.exedescription pid process Token: SeDebugPrivilege 3048 f760f9a.exe Token: SeDebugPrivilege 3048 f760f9a.exe Token: SeDebugPrivilege 3048 f760f9a.exe Token: SeDebugPrivilege 3048 f760f9a.exe Token: SeDebugPrivilege 3048 f760f9a.exe Token: SeDebugPrivilege 3048 f760f9a.exe Token: SeDebugPrivilege 3048 f760f9a.exe Token: SeDebugPrivilege 3048 f760f9a.exe Token: SeDebugPrivilege 3048 f760f9a.exe Token: SeDebugPrivilege 3048 f760f9a.exe Token: SeDebugPrivilege 3048 f760f9a.exe Token: SeDebugPrivilege 3048 f760f9a.exe Token: SeDebugPrivilege 3048 f760f9a.exe Token: SeDebugPrivilege 3048 f760f9a.exe Token: SeDebugPrivilege 3048 f760f9a.exe Token: SeDebugPrivilege 3048 f760f9a.exe Token: SeDebugPrivilege 3048 f760f9a.exe Token: SeDebugPrivilege 3048 f760f9a.exe Token: SeDebugPrivilege 3048 f760f9a.exe Token: SeDebugPrivilege 3048 f760f9a.exe Token: SeDebugPrivilege 3048 f760f9a.exe -
Suspicious use of WriteProcessMemory 33 IoCs
Processes:
rundll32.exerundll32.exef760f9a.exedescription pid process target process PID 1940 wrote to memory of 2360 1940 rundll32.exe rundll32.exe PID 1940 wrote to memory of 2360 1940 rundll32.exe rundll32.exe PID 1940 wrote to memory of 2360 1940 rundll32.exe rundll32.exe PID 1940 wrote to memory of 2360 1940 rundll32.exe rundll32.exe PID 1940 wrote to memory of 2360 1940 rundll32.exe rundll32.exe PID 1940 wrote to memory of 2360 1940 rundll32.exe rundll32.exe PID 1940 wrote to memory of 2360 1940 rundll32.exe rundll32.exe PID 2360 wrote to memory of 3048 2360 rundll32.exe f760f9a.exe PID 2360 wrote to memory of 3048 2360 rundll32.exe f760f9a.exe PID 2360 wrote to memory of 3048 2360 rundll32.exe f760f9a.exe PID 2360 wrote to memory of 3048 2360 rundll32.exe f760f9a.exe PID 3048 wrote to memory of 1120 3048 f760f9a.exe taskhost.exe PID 3048 wrote to memory of 1180 3048 f760f9a.exe Dwm.exe PID 3048 wrote to memory of 1224 3048 f760f9a.exe Explorer.EXE PID 3048 wrote to memory of 1008 3048 f760f9a.exe DllHost.exe PID 3048 wrote to memory of 1940 3048 f760f9a.exe rundll32.exe PID 3048 wrote to memory of 2360 3048 f760f9a.exe rundll32.exe PID 3048 wrote to memory of 2360 3048 f760f9a.exe rundll32.exe PID 2360 wrote to memory of 2964 2360 rundll32.exe f76114f.exe PID 2360 wrote to memory of 2964 2360 rundll32.exe f76114f.exe PID 2360 wrote to memory of 2964 2360 rundll32.exe f76114f.exe PID 2360 wrote to memory of 2964 2360 rundll32.exe f76114f.exe PID 2360 wrote to memory of 1920 2360 rundll32.exe f762b45.exe PID 2360 wrote to memory of 1920 2360 rundll32.exe f762b45.exe PID 2360 wrote to memory of 1920 2360 rundll32.exe f762b45.exe PID 2360 wrote to memory of 1920 2360 rundll32.exe f762b45.exe PID 3048 wrote to memory of 1120 3048 f760f9a.exe taskhost.exe PID 3048 wrote to memory of 1180 3048 f760f9a.exe Dwm.exe PID 3048 wrote to memory of 1224 3048 f760f9a.exe Explorer.EXE PID 3048 wrote to memory of 2964 3048 f760f9a.exe f76114f.exe PID 3048 wrote to memory of 2964 3048 f760f9a.exe f76114f.exe PID 3048 wrote to memory of 1920 3048 f760f9a.exe f762b45.exe PID 3048 wrote to memory of 1920 3048 f760f9a.exe f762b45.exe -
System policy modification 1 TTPs 2 IoCs
Processes:
f76114f.exef760f9a.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" f76114f.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" f760f9a.exe
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1120
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1180
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1224
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3e36e96928247fc44c957c4c7c92e530_NeikiAnalytics.dll,#12⤵
- Suspicious use of WriteProcessMemory
PID:1940 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3e36e96928247fc44c957c4c7c92e530_NeikiAnalytics.dll,#13⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2360 -
C:\Users\Admin\AppData\Local\Temp\f760f9a.exeC:\Users\Admin\AppData\Local\Temp\f760f9a.exe4⤵
- Modifies firewall policy service
- UAC bypass
- Windows security bypass
- Executes dropped EXE
- Windows security modification
- Checks whether UAC is enabled
- Enumerates connected drives
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:3048 -
C:\Users\Admin\AppData\Local\Temp\f76114f.exeC:\Users\Admin\AppData\Local\Temp\f76114f.exe4⤵
- Modifies firewall policy service
- UAC bypass
- Windows security bypass
- Executes dropped EXE
- Windows security modification
- Checks whether UAC is enabled
- Drops file in Windows directory
- System policy modification
PID:2964 -
C:\Users\Admin\AppData\Local\Temp\f762b45.exeC:\Users\Admin\AppData\Local\Temp\f762b45.exe4⤵
- Executes dropped EXE
PID:1920
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:1008
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
3Disable or Modify Tools
3Modify Registry
5Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
257B
MD5aec423fb73d2e5acc2a63e46b08a8f8a
SHA1c89aa26692dad6cdcd7109ffca9a51d9765b405e
SHA256b6a6f9ad57eed823c0e526ab48314deea39ccc7841c8417584217503f955793f
SHA512d3dccd34f8400ceaf185b47ea18f4b060fcd6278840697decc091a8296c96aa5d43388cf9965b448c2c77df7a77fa3e633dcfda9c528dd82c4f65569c03b3af1
-
Filesize
97KB
MD52693c412f2e0f47779f6ebf997eef094
SHA1945f0aadc1657b432508d1d15961b1f1ef14ec48
SHA2569c9c92705c8e5903348509af88d52bfc5986593f913ea91f1ea7b140fc5cac4b
SHA512b20604fa11eedaafbe2b97c3fdf61f2c45cd0a24ad7338a04152c8193a87cc2cd571a3c68ef15a91f92d1f0ffe15d24881a0c54a9004386b3685a6e4b9c552f6