Analysis
-
max time kernel
134s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
17-05-2024 02:27
Static task
static1
Behavioral task
behavioral1
Sample
89e46153d428fec4239503765c83adf0_NeikiAnalytics.dll
Resource
win7-20240221-en
General
-
Target
89e46153d428fec4239503765c83adf0_NeikiAnalytics.dll
-
Size
120KB
-
MD5
89e46153d428fec4239503765c83adf0
-
SHA1
5db7d9495ec9451737f65727530c3735da6e2fb0
-
SHA256
8ea96c78d3b780edcc6df7ef6bc70d150a05ec41d28c5e260bdece033e1837c4
-
SHA512
9e4451d04edfc3c65587b6b20840d298efbae3244195580d3336275fc8064e3f545a3bce8b1ae44186003d5928cbd4b8310ba87e044541ba6e8c519b8dc99057
-
SSDEEP
3072:qgiawSKcuj9DkEiWZYYM43YsIWmpk+rE90:DNwiu1kEd5M1pk8ES
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Signatures
-
Modifies firewall policy service 2 TTPs 3 IoCs
Processes:
e574035.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" e574035.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" e574035.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "1" e574035.exe -
Processes:
e574035.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" e574035.exe -
Processes:
e574035.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" e574035.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" e574035.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" e574035.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" e574035.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UacDisableNotify = "1" e574035.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" e574035.exe -
Executes dropped EXE 3 IoCs
Processes:
e574035.exee57415e.exee575bfb.exepid process 1708 e574035.exe 972 e57415e.exe 5076 e575bfb.exe -
Processes:
resource yara_rule behavioral2/memory/1708-12-0x00000000007B0000-0x000000000186A000-memory.dmp upx behavioral2/memory/1708-13-0x00000000007B0000-0x000000000186A000-memory.dmp upx behavioral2/memory/1708-23-0x00000000007B0000-0x000000000186A000-memory.dmp upx behavioral2/memory/1708-24-0x00000000007B0000-0x000000000186A000-memory.dmp upx behavioral2/memory/1708-32-0x00000000007B0000-0x000000000186A000-memory.dmp upx behavioral2/memory/1708-28-0x00000000007B0000-0x000000000186A000-memory.dmp upx behavioral2/memory/1708-11-0x00000000007B0000-0x000000000186A000-memory.dmp upx behavioral2/memory/1708-8-0x00000000007B0000-0x000000000186A000-memory.dmp upx behavioral2/memory/1708-10-0x00000000007B0000-0x000000000186A000-memory.dmp upx behavioral2/memory/1708-9-0x00000000007B0000-0x000000000186A000-memory.dmp upx behavioral2/memory/1708-6-0x00000000007B0000-0x000000000186A000-memory.dmp upx behavioral2/memory/1708-37-0x00000000007B0000-0x000000000186A000-memory.dmp upx behavioral2/memory/1708-38-0x00000000007B0000-0x000000000186A000-memory.dmp upx behavioral2/memory/1708-39-0x00000000007B0000-0x000000000186A000-memory.dmp upx behavioral2/memory/1708-41-0x00000000007B0000-0x000000000186A000-memory.dmp upx behavioral2/memory/1708-40-0x00000000007B0000-0x000000000186A000-memory.dmp upx behavioral2/memory/1708-43-0x00000000007B0000-0x000000000186A000-memory.dmp upx behavioral2/memory/1708-44-0x00000000007B0000-0x000000000186A000-memory.dmp upx behavioral2/memory/1708-53-0x00000000007B0000-0x000000000186A000-memory.dmp upx behavioral2/memory/1708-55-0x00000000007B0000-0x000000000186A000-memory.dmp upx behavioral2/memory/1708-56-0x00000000007B0000-0x000000000186A000-memory.dmp upx behavioral2/memory/1708-67-0x00000000007B0000-0x000000000186A000-memory.dmp upx behavioral2/memory/1708-66-0x00000000007B0000-0x000000000186A000-memory.dmp upx behavioral2/memory/1708-71-0x00000000007B0000-0x000000000186A000-memory.dmp upx behavioral2/memory/1708-72-0x00000000007B0000-0x000000000186A000-memory.dmp upx behavioral2/memory/1708-75-0x00000000007B0000-0x000000000186A000-memory.dmp upx behavioral2/memory/1708-76-0x00000000007B0000-0x000000000186A000-memory.dmp upx behavioral2/memory/1708-78-0x00000000007B0000-0x000000000186A000-memory.dmp upx behavioral2/memory/1708-80-0x00000000007B0000-0x000000000186A000-memory.dmp upx behavioral2/memory/1708-81-0x00000000007B0000-0x000000000186A000-memory.dmp upx behavioral2/memory/1708-83-0x00000000007B0000-0x000000000186A000-memory.dmp upx behavioral2/memory/1708-84-0x00000000007B0000-0x000000000186A000-memory.dmp upx behavioral2/memory/1708-89-0x00000000007B0000-0x000000000186A000-memory.dmp upx -
Processes:
e574035.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\Svc e574035.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" e574035.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" e574035.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" e574035.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" e574035.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" e574035.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UacDisableNotify = "1" e574035.exe -
Processes:
e574035.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" e574035.exe -
Enumerates connected drives 3 TTPs 15 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
e574035.exedescription ioc process File opened (read-only) \??\I: e574035.exe File opened (read-only) \??\O: e574035.exe File opened (read-only) \??\P: e574035.exe File opened (read-only) \??\H: e574035.exe File opened (read-only) \??\J: e574035.exe File opened (read-only) \??\Q: e574035.exe File opened (read-only) \??\S: e574035.exe File opened (read-only) \??\K: e574035.exe File opened (read-only) \??\M: e574035.exe File opened (read-only) \??\R: e574035.exe File opened (read-only) \??\T: e574035.exe File opened (read-only) \??\E: e574035.exe File opened (read-only) \??\G: e574035.exe File opened (read-only) \??\L: e574035.exe File opened (read-only) \??\N: e574035.exe -
Drops file in Program Files directory 4 IoCs
Processes:
e574035.exedescription ioc process File opened for modification C:\Program Files\7-Zip\7zG.exe e574035.exe File opened for modification C:\Program Files\7-Zip\Uninstall.exe e574035.exe File opened for modification C:\Program Files\7-Zip\7z.exe e574035.exe File opened for modification C:\Program Files\7-Zip\7zFM.exe e574035.exe -
Drops file in Windows directory 2 IoCs
Processes:
e574035.exedescription ioc process File created C:\Windows\e574064 e574035.exe File opened for modification C:\Windows\SYSTEM.INI e574035.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
e574035.exepid process 1708 e574035.exe 1708 e574035.exe 1708 e574035.exe 1708 e574035.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
e574035.exedescription pid process Token: SeDebugPrivilege 1708 e574035.exe Token: SeDebugPrivilege 1708 e574035.exe Token: SeDebugPrivilege 1708 e574035.exe Token: SeDebugPrivilege 1708 e574035.exe Token: SeDebugPrivilege 1708 e574035.exe Token: SeDebugPrivilege 1708 e574035.exe Token: SeDebugPrivilege 1708 e574035.exe Token: SeDebugPrivilege 1708 e574035.exe Token: SeDebugPrivilege 1708 e574035.exe Token: SeDebugPrivilege 1708 e574035.exe Token: SeDebugPrivilege 1708 e574035.exe Token: SeDebugPrivilege 1708 e574035.exe Token: SeDebugPrivilege 1708 e574035.exe Token: SeDebugPrivilege 1708 e574035.exe Token: SeDebugPrivilege 1708 e574035.exe Token: SeDebugPrivilege 1708 e574035.exe Token: SeDebugPrivilege 1708 e574035.exe Token: SeDebugPrivilege 1708 e574035.exe Token: SeDebugPrivilege 1708 e574035.exe Token: SeDebugPrivilege 1708 e574035.exe Token: SeDebugPrivilege 1708 e574035.exe Token: SeDebugPrivilege 1708 e574035.exe Token: SeDebugPrivilege 1708 e574035.exe Token: SeDebugPrivilege 1708 e574035.exe Token: SeDebugPrivilege 1708 e574035.exe Token: SeDebugPrivilege 1708 e574035.exe Token: SeDebugPrivilege 1708 e574035.exe Token: SeDebugPrivilege 1708 e574035.exe Token: SeDebugPrivilege 1708 e574035.exe Token: SeDebugPrivilege 1708 e574035.exe Token: SeDebugPrivilege 1708 e574035.exe Token: SeDebugPrivilege 1708 e574035.exe Token: SeDebugPrivilege 1708 e574035.exe Token: SeDebugPrivilege 1708 e574035.exe Token: SeDebugPrivilege 1708 e574035.exe Token: SeDebugPrivilege 1708 e574035.exe Token: SeDebugPrivilege 1708 e574035.exe Token: SeDebugPrivilege 1708 e574035.exe Token: SeDebugPrivilege 1708 e574035.exe Token: SeDebugPrivilege 1708 e574035.exe Token: SeDebugPrivilege 1708 e574035.exe Token: SeDebugPrivilege 1708 e574035.exe Token: SeDebugPrivilege 1708 e574035.exe Token: SeDebugPrivilege 1708 e574035.exe Token: SeDebugPrivilege 1708 e574035.exe Token: SeDebugPrivilege 1708 e574035.exe Token: SeDebugPrivilege 1708 e574035.exe Token: SeDebugPrivilege 1708 e574035.exe Token: SeDebugPrivilege 1708 e574035.exe Token: SeDebugPrivilege 1708 e574035.exe Token: SeDebugPrivilege 1708 e574035.exe Token: SeDebugPrivilege 1708 e574035.exe Token: SeDebugPrivilege 1708 e574035.exe Token: SeDebugPrivilege 1708 e574035.exe Token: SeDebugPrivilege 1708 e574035.exe Token: SeDebugPrivilege 1708 e574035.exe Token: SeDebugPrivilege 1708 e574035.exe Token: SeDebugPrivilege 1708 e574035.exe Token: SeDebugPrivilege 1708 e574035.exe Token: SeDebugPrivilege 1708 e574035.exe Token: SeDebugPrivilege 1708 e574035.exe Token: SeDebugPrivilege 1708 e574035.exe Token: SeDebugPrivilege 1708 e574035.exe Token: SeDebugPrivilege 1708 e574035.exe -
Suspicious use of WriteProcessMemory 54 IoCs
Processes:
rundll32.exerundll32.exee574035.exedescription pid process target process PID 3088 wrote to memory of 4664 3088 rundll32.exe rundll32.exe PID 3088 wrote to memory of 4664 3088 rundll32.exe rundll32.exe PID 3088 wrote to memory of 4664 3088 rundll32.exe rundll32.exe PID 4664 wrote to memory of 1708 4664 rundll32.exe e574035.exe PID 4664 wrote to memory of 1708 4664 rundll32.exe e574035.exe PID 4664 wrote to memory of 1708 4664 rundll32.exe e574035.exe PID 1708 wrote to memory of 776 1708 e574035.exe fontdrvhost.exe PID 1708 wrote to memory of 780 1708 e574035.exe fontdrvhost.exe PID 1708 wrote to memory of 316 1708 e574035.exe dwm.exe PID 1708 wrote to memory of 2736 1708 e574035.exe sihost.exe PID 1708 wrote to memory of 2760 1708 e574035.exe svchost.exe PID 1708 wrote to memory of 3032 1708 e574035.exe taskhostw.exe PID 1708 wrote to memory of 3532 1708 e574035.exe Explorer.EXE PID 1708 wrote to memory of 3648 1708 e574035.exe svchost.exe PID 1708 wrote to memory of 3844 1708 e574035.exe DllHost.exe PID 1708 wrote to memory of 3940 1708 e574035.exe StartMenuExperienceHost.exe PID 1708 wrote to memory of 4004 1708 e574035.exe RuntimeBroker.exe PID 1708 wrote to memory of 4092 1708 e574035.exe SearchApp.exe PID 1708 wrote to memory of 3544 1708 e574035.exe RuntimeBroker.exe PID 1708 wrote to memory of 2788 1708 e574035.exe TextInputHost.exe PID 1708 wrote to memory of 4604 1708 e574035.exe RuntimeBroker.exe PID 1708 wrote to memory of 1940 1708 e574035.exe backgroundTaskHost.exe PID 1708 wrote to memory of 3024 1708 e574035.exe backgroundTaskHost.exe PID 1708 wrote to memory of 3088 1708 e574035.exe rundll32.exe PID 1708 wrote to memory of 4664 1708 e574035.exe rundll32.exe PID 1708 wrote to memory of 4664 1708 e574035.exe rundll32.exe PID 4664 wrote to memory of 972 4664 rundll32.exe e57415e.exe PID 4664 wrote to memory of 972 4664 rundll32.exe e57415e.exe PID 4664 wrote to memory of 972 4664 rundll32.exe e57415e.exe PID 4664 wrote to memory of 5076 4664 rundll32.exe e575bfb.exe PID 4664 wrote to memory of 5076 4664 rundll32.exe e575bfb.exe PID 4664 wrote to memory of 5076 4664 rundll32.exe e575bfb.exe PID 1708 wrote to memory of 776 1708 e574035.exe fontdrvhost.exe PID 1708 wrote to memory of 780 1708 e574035.exe fontdrvhost.exe PID 1708 wrote to memory of 316 1708 e574035.exe dwm.exe PID 1708 wrote to memory of 2736 1708 e574035.exe sihost.exe PID 1708 wrote to memory of 2760 1708 e574035.exe svchost.exe PID 1708 wrote to memory of 3032 1708 e574035.exe taskhostw.exe PID 1708 wrote to memory of 3532 1708 e574035.exe Explorer.EXE PID 1708 wrote to memory of 3648 1708 e574035.exe svchost.exe PID 1708 wrote to memory of 3844 1708 e574035.exe DllHost.exe PID 1708 wrote to memory of 3940 1708 e574035.exe StartMenuExperienceHost.exe PID 1708 wrote to memory of 4004 1708 e574035.exe RuntimeBroker.exe PID 1708 wrote to memory of 4092 1708 e574035.exe SearchApp.exe PID 1708 wrote to memory of 3544 1708 e574035.exe RuntimeBroker.exe PID 1708 wrote to memory of 2788 1708 e574035.exe TextInputHost.exe PID 1708 wrote to memory of 4604 1708 e574035.exe RuntimeBroker.exe PID 1708 wrote to memory of 1940 1708 e574035.exe backgroundTaskHost.exe PID 1708 wrote to memory of 972 1708 e574035.exe e57415e.exe PID 1708 wrote to memory of 972 1708 e574035.exe e57415e.exe PID 1708 wrote to memory of 1896 1708 e574035.exe RuntimeBroker.exe PID 1708 wrote to memory of 1480 1708 e574035.exe RuntimeBroker.exe PID 1708 wrote to memory of 5076 1708 e574035.exe e575bfb.exe PID 1708 wrote to memory of 5076 1708 e574035.exe e575bfb.exe -
System policy modification 1 TTPs 1 IoCs
Processes:
e574035.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" e574035.exe
Processes
-
C:\Windows\system32\fontdrvhost.exe"fontdrvhost.exe"1⤵PID:776
-
C:\Windows\system32\fontdrvhost.exe"fontdrvhost.exe"1⤵PID:780
-
C:\Windows\system32\dwm.exe"dwm.exe"1⤵PID:316
-
C:\Windows\system32\sihost.exesihost.exe1⤵PID:2736
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc1⤵PID:2760
-
C:\Windows\system32\taskhostw.exetaskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}1⤵PID:3032
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3532
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\89e46153d428fec4239503765c83adf0_NeikiAnalytics.dll,#12⤵
- Suspicious use of WriteProcessMemory
PID:3088 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\89e46153d428fec4239503765c83adf0_NeikiAnalytics.dll,#13⤵
- Suspicious use of WriteProcessMemory
PID:4664 -
C:\Users\Admin\AppData\Local\Temp\e574035.exeC:\Users\Admin\AppData\Local\Temp\e574035.exe4⤵
- Modifies firewall policy service
- UAC bypass
- Windows security bypass
- Executes dropped EXE
- Windows security modification
- Checks whether UAC is enabled
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1708 -
C:\Users\Admin\AppData\Local\Temp\e57415e.exeC:\Users\Admin\AppData\Local\Temp\e57415e.exe4⤵
- Executes dropped EXE
PID:972 -
C:\Users\Admin\AppData\Local\Temp\e575bfb.exeC:\Users\Admin\AppData\Local\Temp\e575bfb.exe4⤵
- Executes dropped EXE
PID:5076
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k ClipboardSvcGroup -p -s cbdhsvc1⤵PID:3648
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:3844
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵PID:3940
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:4004
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵PID:4092
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:3544
-
C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\InputApp\TextInputHost.exe"C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\InputApp\TextInputHost.exe" -ServerName:InputApp.AppX9jnwykgrccxc8by3hsrsh07r423xzvav.mca1⤵PID:2788
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:4604
-
C:\Windows\system32\backgroundTaskHost.exe"C:\Windows\system32\backgroundTaskHost.exe" -ServerName:CortanaUI.AppX3bn25b6f886wmg6twh46972vprk9tnbf.mca1⤵PID:1940
-
C:\Windows\system32\backgroundTaskHost.exe"C:\Windows\system32\backgroundTaskHost.exe" -ServerName:App.AppXmtcan0h2tfbfy7k9kn8hbxb6dmzz1zh0.mca1⤵PID:3024
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:1896
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:1480
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
3Disable or Modify Tools
3Modify Registry
5Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
97KB
MD5f1e527d726e7613a8e47337ee171ca15
SHA1928861c7946f6da73268e3931a65984a666beeae
SHA256911e8b1001f13a8a09daa946bcb8780b46cabaf2a0b3a6e024e7b61909f3d31d
SHA51245f0341bfc31266f28599ad575a02276c36b6cbb178acb9f6e8b0f6dc5c37bcf88bf53adf95635055c53e00455cc5bcb82fb9561a365a57393465072f50cbe88