Analysis

  • max time kernel
    150s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    17-05-2024 04:09

General

  • Target

    a3c64e52e7d5a52602a9af68a7d6a630_NeikiAnalytics.exe

  • Size

    1015KB

  • MD5

    a3c64e52e7d5a52602a9af68a7d6a630

  • SHA1

    94e5e8a8befc15b8fc30fe429628391aa0465884

  • SHA256

    a76cfe68e2df2450412ea3bd95d8e1df0bed4c01b375d0c5afee7e142e05f64d

  • SHA512

    c5cb25f47443adecd9d8ec70dc5dec32bc2e17c98e53501445f3fe36a44b083b2fb45d08c6de559c2f7a5e0bc765b42ee1dae806c428284d4fdec5df5614d73d

  • SSDEEP

    24576:H7z7G7ws7X71Fkx7I7+Kt47l7ZsZGC757q7g7O7hGLb47hGdb0Gd6zam8:H7z7G7ws7X71Fkx7I7+R7l7xC757qU77

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

http://www.klkjwre9fqwieluoi.info/

http://kukutrustnet777888.info/

Signatures

  • Modifies firewall policy service 2 TTPs 3 IoCs
  • Sality

    Sality is backdoor written in C++, first discovered in 2003.

  • UAC bypass 3 TTPs 1 IoCs
  • Windows security bypass 2 TTPs 6 IoCs
  • Deletes itself 1 IoCs
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 4 IoCs
  • UPX packed file 7 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Windows security modification 2 TTPs 7 IoCs
  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 7 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious use of WriteProcessMemory 30 IoCs
  • System policy modification 1 TTPs 1 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1180
      • C:\Users\Admin\AppData\Local\Temp\a3c64e52e7d5a52602a9af68a7d6a630_NeikiAnalytics.exe
        "C:\Users\Admin\AppData\Local\Temp\a3c64e52e7d5a52602a9af68a7d6a630_NeikiAnalytics.exe"
        2⤵
        • Drops file in Windows directory
        • Suspicious use of WriteProcessMemory
        PID:1868
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c C:\Users\Admin\AppData\Local\Temp\$$a121A.bat
          3⤵
          • Deletes itself
          • Loads dropped DLL
          • Suspicious use of WriteProcessMemory
          PID:2992
          • C:\Users\Admin\AppData\Local\Temp\a3c64e52e7d5a52602a9af68a7d6a630_NeikiAnalytics.exe
            "C:\Users\Admin\AppData\Local\Temp\a3c64e52e7d5a52602a9af68a7d6a630_NeikiAnalytics.exe"
            4⤵
            • Modifies firewall policy service
            • UAC bypass
            • Windows security bypass
            • Executes dropped EXE
            • Windows security modification
            • Checks whether UAC is enabled
            • Drops file in Windows directory
            • Suspicious use of WriteProcessMemory
            • System policy modification
            PID:2596
            • C:\Windows\SysWOW64\cmd.exe
              cmd /c C:\Users\Admin\AppData\Local\Temp\$$a1390.bat
              5⤵
              • Loads dropped DLL
              • Suspicious use of WriteProcessMemory
              PID:2412
              • C:\Users\Admin\AppData\Local\Temp\a3c64e52e7d5a52602a9af68a7d6a630_NeikiAnalytics.exe
                "C:\Users\Admin\AppData\Local\Temp\a3c64e52e7d5a52602a9af68a7d6a630_NeikiAnalytics.exe"
                6⤵
                • Executes dropped EXE
                PID:316
        • C:\Windows\Logo1_.exe
          C:\Windows\Logo1_.exe
          3⤵
          • Executes dropped EXE
          • Enumerates connected drives
          • Drops file in Program Files directory
          • Drops file in Windows directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:2348
          • C:\Windows\SysWOW64\net.exe
            net stop "Kingsoft AntiVirus Service"
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:2712
            • C:\Windows\SysWOW64\net1.exe
              C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
              5⤵
                PID:2768

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateCore.exe

        Filesize

        251KB

        MD5

        4cd836cb7315137caef2e00f915022f6

        SHA1

        640651bd615542cd88f9b0ba32aefd49add3cbf7

        SHA256

        d81a2f9c21d3c144a4819e634be2940e7528d43d748a5ce84ea3ff38f4e0c4e2

        SHA512

        6da5df97fee3ef22ecd7174524f775fd95b755fdaab21417c865664f3da999c02eb0f33cb736204cb353c260b7b92f6589006c07b3b57a2b52d468a1322234f6

      • C:\ProgramData\Package Cache\{ca67548a-5ebe-413a-b50c-4b9ceb6d66c6}\vcredist_x64.exe

        Filesize

        471KB

        MD5

        4cfdb20b04aa239d6f9e83084d5d0a77

        SHA1

        f22863e04cc1fd4435f785993ede165bd8245ac6

        SHA256

        30ed17ca6ae530e8bf002bcef6048f94dba4b3b10252308147031f5c86ace1b9

        SHA512

        35b4c2f68a7caa45f2bb14b168947e06831f358e191478a6659b49f30ca6f538dc910fe6067448d5d8af4cb8558825d70f94d4bd67709aee414b2be37d49be86

      • C:\Users\Admin\AppData\Local\Temp\$$a121A.bat

        Filesize

        620B

        MD5

        5c3b16d63d9a5c0a0a8ec9cb81619bf1

        SHA1

        ac44bd6bd032365e6803554494ec5690477f2a0d

        SHA256

        5beeb6dccf0778e55ab0ef4d33a4e379b320d22a6550760fb2e625b2b2d4707b

        SHA512

        c7e62da8e74b66dd88c153ed9ff17204a9eb8d46d9241af54fffff5d67c3816cfdbdbbed17360ecf5a2f9c7485c056b23b5e8bb3383a3e6f181ea89b6e8df840

      • C:\Users\Admin\AppData\Local\Temp\$$a1390.bat

        Filesize

        620B

        MD5

        8e353e0cbf4c6ce452469a2456629f23

        SHA1

        374b1ad1f3a8ba0410298066f39c20952a5493ae

        SHA256

        38ed42ba742bf3b8821735020e85924d2c3aad7ed29b94a2100fb089597bcb4d

        SHA512

        2fd8fbb07dec701c2bab842e4a82b15301202f9e8153284b58cfd4841f94a3b246def4540ec611c232c014b7b1879e3e7bdae181a3cee88d0335432294be3d28

      • C:\Users\Admin\AppData\Local\Temp\a3c64e52e7d5a52602a9af68a7d6a630_NeikiAnalytics.exe

        Filesize

        962KB

        MD5

        04e9563c7bba02d1378bf3eeef7bc4bb

        SHA1

        be811a8564a5c215fb9d037e093273bdef0806a0

        SHA256

        9fb2f67b3cfa0bcf0b2557792b652e8f0b08ff18a7f8a03127abbaf840ef6d93

        SHA512

        c9f59138844261359d7e1f00613ca8691cb9100bf4ebccf29091522fe99fb9b97878703637acf2cdccabbf7bc049c6bc0f96e21cfbf208c2a16b3e5557d99619

      • C:\Users\Admin\AppData\Local\Temp\a3c64e52e7d5a52602a9af68a7d6a630_NeikiAnalytics.exe.exe

        Filesize

        989KB

        MD5

        f22571c6d92113e9cff6c5c2dc5a7366

        SHA1

        70cb002b768551b0fe90f1c226cf38b0e5067746

        SHA256

        6fa687e8e811b62ba14ba7d99bae55dcad0fc54a27f1014a1b80bd0f922db369

        SHA512

        01d7794270e24647e9aa4a84e79d999d30d8194f7b53f88e1468cb178e4e51e4a768bb746090fe27902b77608dfa05f1a6ded11dccdc5cdf29017d5fbaf91ac3

      • C:\Windows\Logo1_.exe

        Filesize

        26KB

        MD5

        7fed7b53952578d87020b408a92977f7

        SHA1

        37142388d44b6402b174d18c26052474dd291980

        SHA256

        fbf4af6393fcd93fea4f2081dc472703c282967d35d5231e93592643b93eb882

        SHA512

        a1ed93f597ee723adbd62a9d7b2b7027685bd13ee64f99aab90e20338e9ab51f67fea3b4556782189161a861a3a42d0f627ad4e136abf8d52c1519523982cdd1

      • C:\Windows\rundl132.exe

        Filesize

        26KB

        MD5

        57d96c198adb32be1a39065a02a20f3c

        SHA1

        abbe60c6ab6a703bdea9ce99bf2fc59510001abe

        SHA256

        08611b2014b8e9d4ea0ffed9cb688dc5bacaf2ec1403e368f60ed1e90e373f27

        SHA512

        73cc04e41fd0885c34cbfebbaf16d1fb067cacc851986a47f0c812a37615cab9e043b8c1c1dd2a7c091cca1c99bdcb8560f579b7b87c49a38cb0b0b7cf7307fa

      • F:\$RECYCLE.BIN\S-1-5-21-2737914667-933161113-3798636211-1000\_desktop.ini

        Filesize

        9B

        MD5

        de299d58575b595bc358a5c5edd0767d

        SHA1

        0d30c906a5b5647289c7788d31dd3afd642350a4

        SHA256

        32ef1af1131d89e96d59ac0d3f8e232e839355587a679a2df2479b5277a704e3

        SHA512

        c8e20bb98c427a3a0eea8769df090d59353f0b484321e82b381cfca18b111bd1d782713f2f5bf815e5832a0e12ec909a0324fe9ba013c626327cabf27a464bbc

      • memory/316-63-0x0000000000400000-0x0000000000446000-memory.dmp

        Filesize

        280KB

      • memory/1180-67-0x0000000002AA0000-0x0000000002AA1000-memory.dmp

        Filesize

        4KB

      • memory/1868-17-0x0000000000260000-0x0000000000294000-memory.dmp

        Filesize

        208KB

      • memory/1868-0-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/1868-16-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2348-76-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2348-128-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2348-82-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2348-134-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2348-1910-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2348-69-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2348-3371-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2348-19-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2412-65-0x0000000000190000-0x00000000001D6000-memory.dmp

        Filesize

        280KB

      • memory/2412-64-0x0000000000190000-0x00000000001D6000-memory.dmp

        Filesize

        280KB

      • memory/2596-32-0x0000000000400000-0x0000000000445000-memory.dmp

        Filesize

        276KB

      • memory/2596-57-0x0000000000400000-0x0000000000445000-memory.dmp

        Filesize

        276KB

      • memory/2596-51-0x00000000005C0000-0x000000000164E000-memory.dmp

        Filesize

        16.6MB

      • memory/2596-49-0x00000000005C0000-0x000000000164E000-memory.dmp

        Filesize

        16.6MB

      • memory/2596-50-0x00000000005C0000-0x000000000164E000-memory.dmp

        Filesize

        16.6MB

      • memory/2596-48-0x00000000005C0000-0x000000000164E000-memory.dmp

        Filesize

        16.6MB

      • memory/2596-47-0x00000000005C0000-0x000000000164E000-memory.dmp

        Filesize

        16.6MB

      • memory/2596-46-0x00000000005C0000-0x000000000164E000-memory.dmp

        Filesize

        16.6MB

      • memory/2596-34-0x00000000005C0000-0x000000000164E000-memory.dmp

        Filesize

        16.6MB

      • memory/2992-31-0x0000000000400000-0x0000000000445000-memory.dmp

        Filesize

        276KB

      • memory/2992-30-0x0000000000400000-0x0000000000445000-memory.dmp

        Filesize

        276KB