Analysis
-
max time kernel
150s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
17-05-2024 04:09
Static task
static1
Behavioral task
behavioral1
Sample
a3c64e52e7d5a52602a9af68a7d6a630_NeikiAnalytics.exe
Resource
win7-20240508-en
General
-
Target
a3c64e52e7d5a52602a9af68a7d6a630_NeikiAnalytics.exe
-
Size
1015KB
-
MD5
a3c64e52e7d5a52602a9af68a7d6a630
-
SHA1
94e5e8a8befc15b8fc30fe429628391aa0465884
-
SHA256
a76cfe68e2df2450412ea3bd95d8e1df0bed4c01b375d0c5afee7e142e05f64d
-
SHA512
c5cb25f47443adecd9d8ec70dc5dec32bc2e17c98e53501445f3fe36a44b083b2fb45d08c6de559c2f7a5e0bc765b42ee1dae806c428284d4fdec5df5614d73d
-
SSDEEP
24576:H7z7G7ws7X71Fkx7I7+Kt47l7ZsZGC757q7g7O7hGLb47hGdb0Gd6zam8:H7z7G7ws7X71Fkx7I7+R7l7xC757qU77
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
http://www.klkjwre9fqwieluoi.info/
http://kukutrustnet777888.info/
Signatures
-
Modifies firewall policy service 2 TTPs 3 IoCs
Processes:
a3c64e52e7d5a52602a9af68a7d6a630_NeikiAnalytics.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" a3c64e52e7d5a52602a9af68a7d6a630_NeikiAnalytics.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" a3c64e52e7d5a52602a9af68a7d6a630_NeikiAnalytics.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "1" a3c64e52e7d5a52602a9af68a7d6a630_NeikiAnalytics.exe -
Processes:
a3c64e52e7d5a52602a9af68a7d6a630_NeikiAnalytics.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" a3c64e52e7d5a52602a9af68a7d6a630_NeikiAnalytics.exe -
Processes:
a3c64e52e7d5a52602a9af68a7d6a630_NeikiAnalytics.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" a3c64e52e7d5a52602a9af68a7d6a630_NeikiAnalytics.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" a3c64e52e7d5a52602a9af68a7d6a630_NeikiAnalytics.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" a3c64e52e7d5a52602a9af68a7d6a630_NeikiAnalytics.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" a3c64e52e7d5a52602a9af68a7d6a630_NeikiAnalytics.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" a3c64e52e7d5a52602a9af68a7d6a630_NeikiAnalytics.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" a3c64e52e7d5a52602a9af68a7d6a630_NeikiAnalytics.exe -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 2992 cmd.exe -
Executes dropped EXE 3 IoCs
Processes:
Logo1_.exea3c64e52e7d5a52602a9af68a7d6a630_NeikiAnalytics.exea3c64e52e7d5a52602a9af68a7d6a630_NeikiAnalytics.exepid process 2348 Logo1_.exe 2596 a3c64e52e7d5a52602a9af68a7d6a630_NeikiAnalytics.exe 316 a3c64e52e7d5a52602a9af68a7d6a630_NeikiAnalytics.exe -
Loads dropped DLL 4 IoCs
Processes:
cmd.execmd.exepid process 2992 cmd.exe 2992 cmd.exe 2412 cmd.exe 2412 cmd.exe -
Processes:
resource yara_rule behavioral1/memory/2596-34-0x00000000005C0000-0x000000000164E000-memory.dmp upx behavioral1/memory/2596-46-0x00000000005C0000-0x000000000164E000-memory.dmp upx behavioral1/memory/2596-47-0x00000000005C0000-0x000000000164E000-memory.dmp upx behavioral1/memory/2596-48-0x00000000005C0000-0x000000000164E000-memory.dmp upx behavioral1/memory/2596-50-0x00000000005C0000-0x000000000164E000-memory.dmp upx behavioral1/memory/2596-49-0x00000000005C0000-0x000000000164E000-memory.dmp upx behavioral1/memory/2596-51-0x00000000005C0000-0x000000000164E000-memory.dmp upx -
Processes:
a3c64e52e7d5a52602a9af68a7d6a630_NeikiAnalytics.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" a3c64e52e7d5a52602a9af68a7d6a630_NeikiAnalytics.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" a3c64e52e7d5a52602a9af68a7d6a630_NeikiAnalytics.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\Svc a3c64e52e7d5a52602a9af68a7d6a630_NeikiAnalytics.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" a3c64e52e7d5a52602a9af68a7d6a630_NeikiAnalytics.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" a3c64e52e7d5a52602a9af68a7d6a630_NeikiAnalytics.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" a3c64e52e7d5a52602a9af68a7d6a630_NeikiAnalytics.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" a3c64e52e7d5a52602a9af68a7d6a630_NeikiAnalytics.exe -
Processes:
a3c64e52e7d5a52602a9af68a7d6a630_NeikiAnalytics.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" a3c64e52e7d5a52602a9af68a7d6a630_NeikiAnalytics.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
Logo1_.exedescription ioc process File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
Processes:
Logo1_.exedescription ioc process File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\rmid.exe Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Hearts\Hearts.exe Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Minesweeper\it-IT\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\it\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveProjectToolset\ProjectTool\Project Report Type\Fancy\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jstat.exe Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Purble Place\it-IT\_desktop.ini Logo1_.exe File created C:\Program Files\Google\Chrome\Application\106.0.5249.119\WidevineCdm\_platform_specific\win_x64\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\ast\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Setup Files\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\MSOXMLED.EXE Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Calendar.Gadget\ja-JP\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Currency.Gadget\fr-FR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Hearts\de-DE\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\ca@valencia\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\cs\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveProjectToolset\ProjectTool\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Media Player\wmpconfig.exe Logo1_.exe File created C:\Program Files\Microsoft Games\Multiplayer\Backgammon\es-ES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\ink\ja-JP\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\TRANSLAT\ENES\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\Multiplayer\Spades\fr-FR\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\eu\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ku_IQ\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\TextConv\it-IT\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification_5.5.0.165303\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\hy\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.httpclient4.ssl.feature_1.0.0.v20140827-1444\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\images\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\Annotations\Stamps\ENU\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\ink\fr-FR\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Clock.Gadget\de-DE\js\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\plugins\access_output\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\pa\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\cgg\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Purble Place\en-US\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\Hearts\es-ES\_desktop.ini Logo1_.exe File created C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\de-DE\css\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\update_tracking\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\te\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Synchronization Services\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\extcheck.exe Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\es-ES\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\as_IN\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\en-US\js\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\modules\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\lg\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\sl\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Google\Update\Offline\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\Certificates\Verisign\Components\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows NT\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jre7\lib\amd64\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\Office Setup Controller\Proofing.en-us\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Stacking\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\Office Setup Controller\OneNote.en-us\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.rcp_4.4.0.v20141007-2301\META-INF\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\mai\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\it-IT\css\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\AccessWeb\_desktop.ini Logo1_.exe -
Drops file in Windows directory 7 IoCs
Processes:
Logo1_.exea3c64e52e7d5a52602a9af68a7d6a630_NeikiAnalytics.exea3c64e52e7d5a52602a9af68a7d6a630_NeikiAnalytics.exedescription ioc process File created C:\Windows\vDll.dll Logo1_.exe File created C:\Windows\rundl132.exe a3c64e52e7d5a52602a9af68a7d6a630_NeikiAnalytics.exe File created C:\Windows\Logo1_.exe a3c64e52e7d5a52602a9af68a7d6a630_NeikiAnalytics.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe File opened for modification C:\Windows\rundl132.exe a3c64e52e7d5a52602a9af68a7d6a630_NeikiAnalytics.exe File created C:\Windows\Logo1_.exe a3c64e52e7d5a52602a9af68a7d6a630_NeikiAnalytics.exe File opened for modification C:\Windows\SYSTEM.INI a3c64e52e7d5a52602a9af68a7d6a630_NeikiAnalytics.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 10 IoCs
Processes:
Logo1_.exepid process 2348 Logo1_.exe 2348 Logo1_.exe 2348 Logo1_.exe 2348 Logo1_.exe 2348 Logo1_.exe 2348 Logo1_.exe 2348 Logo1_.exe 2348 Logo1_.exe 2348 Logo1_.exe 2348 Logo1_.exe -
Suspicious use of WriteProcessMemory 30 IoCs
Processes:
a3c64e52e7d5a52602a9af68a7d6a630_NeikiAnalytics.exeLogo1_.execmd.exenet.exea3c64e52e7d5a52602a9af68a7d6a630_NeikiAnalytics.execmd.exedescription pid process target process PID 1868 wrote to memory of 2992 1868 a3c64e52e7d5a52602a9af68a7d6a630_NeikiAnalytics.exe cmd.exe PID 1868 wrote to memory of 2992 1868 a3c64e52e7d5a52602a9af68a7d6a630_NeikiAnalytics.exe cmd.exe PID 1868 wrote to memory of 2992 1868 a3c64e52e7d5a52602a9af68a7d6a630_NeikiAnalytics.exe cmd.exe PID 1868 wrote to memory of 2992 1868 a3c64e52e7d5a52602a9af68a7d6a630_NeikiAnalytics.exe cmd.exe PID 1868 wrote to memory of 2348 1868 a3c64e52e7d5a52602a9af68a7d6a630_NeikiAnalytics.exe Logo1_.exe PID 1868 wrote to memory of 2348 1868 a3c64e52e7d5a52602a9af68a7d6a630_NeikiAnalytics.exe Logo1_.exe PID 1868 wrote to memory of 2348 1868 a3c64e52e7d5a52602a9af68a7d6a630_NeikiAnalytics.exe Logo1_.exe PID 1868 wrote to memory of 2348 1868 a3c64e52e7d5a52602a9af68a7d6a630_NeikiAnalytics.exe Logo1_.exe PID 2348 wrote to memory of 2712 2348 Logo1_.exe net.exe PID 2348 wrote to memory of 2712 2348 Logo1_.exe net.exe PID 2348 wrote to memory of 2712 2348 Logo1_.exe net.exe PID 2348 wrote to memory of 2712 2348 Logo1_.exe net.exe PID 2992 wrote to memory of 2596 2992 cmd.exe a3c64e52e7d5a52602a9af68a7d6a630_NeikiAnalytics.exe PID 2992 wrote to memory of 2596 2992 cmd.exe a3c64e52e7d5a52602a9af68a7d6a630_NeikiAnalytics.exe PID 2992 wrote to memory of 2596 2992 cmd.exe a3c64e52e7d5a52602a9af68a7d6a630_NeikiAnalytics.exe PID 2992 wrote to memory of 2596 2992 cmd.exe a3c64e52e7d5a52602a9af68a7d6a630_NeikiAnalytics.exe PID 2712 wrote to memory of 2768 2712 net.exe net1.exe PID 2712 wrote to memory of 2768 2712 net.exe net1.exe PID 2712 wrote to memory of 2768 2712 net.exe net1.exe PID 2712 wrote to memory of 2768 2712 net.exe net1.exe PID 2596 wrote to memory of 2412 2596 a3c64e52e7d5a52602a9af68a7d6a630_NeikiAnalytics.exe cmd.exe PID 2596 wrote to memory of 2412 2596 a3c64e52e7d5a52602a9af68a7d6a630_NeikiAnalytics.exe cmd.exe PID 2596 wrote to memory of 2412 2596 a3c64e52e7d5a52602a9af68a7d6a630_NeikiAnalytics.exe cmd.exe PID 2596 wrote to memory of 2412 2596 a3c64e52e7d5a52602a9af68a7d6a630_NeikiAnalytics.exe cmd.exe PID 2412 wrote to memory of 316 2412 cmd.exe a3c64e52e7d5a52602a9af68a7d6a630_NeikiAnalytics.exe PID 2412 wrote to memory of 316 2412 cmd.exe a3c64e52e7d5a52602a9af68a7d6a630_NeikiAnalytics.exe PID 2412 wrote to memory of 316 2412 cmd.exe a3c64e52e7d5a52602a9af68a7d6a630_NeikiAnalytics.exe PID 2412 wrote to memory of 316 2412 cmd.exe a3c64e52e7d5a52602a9af68a7d6a630_NeikiAnalytics.exe PID 2348 wrote to memory of 1180 2348 Logo1_.exe Explorer.EXE PID 2348 wrote to memory of 1180 2348 Logo1_.exe Explorer.EXE -
System policy modification 1 TTPs 1 IoCs
Processes:
a3c64e52e7d5a52602a9af68a7d6a630_NeikiAnalytics.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" a3c64e52e7d5a52602a9af68a7d6a630_NeikiAnalytics.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1180
-
C:\Users\Admin\AppData\Local\Temp\a3c64e52e7d5a52602a9af68a7d6a630_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\a3c64e52e7d5a52602a9af68a7d6a630_NeikiAnalytics.exe"2⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1868 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$$a121A.bat3⤵
- Deletes itself
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2992 -
C:\Users\Admin\AppData\Local\Temp\a3c64e52e7d5a52602a9af68a7d6a630_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\a3c64e52e7d5a52602a9af68a7d6a630_NeikiAnalytics.exe"4⤵
- Modifies firewall policy service
- UAC bypass
- Windows security bypass
- Executes dropped EXE
- Windows security modification
- Checks whether UAC is enabled
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2596 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$$a1390.bat5⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2412 -
C:\Users\Admin\AppData\Local\Temp\a3c64e52e7d5a52602a9af68a7d6a630_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\a3c64e52e7d5a52602a9af68a7d6a630_NeikiAnalytics.exe"6⤵
- Executes dropped EXE
PID:316 -
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2348 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:2712 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:2768
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
3Disable or Modify Tools
3Modify Registry
5Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
251KB
MD54cd836cb7315137caef2e00f915022f6
SHA1640651bd615542cd88f9b0ba32aefd49add3cbf7
SHA256d81a2f9c21d3c144a4819e634be2940e7528d43d748a5ce84ea3ff38f4e0c4e2
SHA5126da5df97fee3ef22ecd7174524f775fd95b755fdaab21417c865664f3da999c02eb0f33cb736204cb353c260b7b92f6589006c07b3b57a2b52d468a1322234f6
-
Filesize
471KB
MD54cfdb20b04aa239d6f9e83084d5d0a77
SHA1f22863e04cc1fd4435f785993ede165bd8245ac6
SHA25630ed17ca6ae530e8bf002bcef6048f94dba4b3b10252308147031f5c86ace1b9
SHA51235b4c2f68a7caa45f2bb14b168947e06831f358e191478a6659b49f30ca6f538dc910fe6067448d5d8af4cb8558825d70f94d4bd67709aee414b2be37d49be86
-
Filesize
620B
MD55c3b16d63d9a5c0a0a8ec9cb81619bf1
SHA1ac44bd6bd032365e6803554494ec5690477f2a0d
SHA2565beeb6dccf0778e55ab0ef4d33a4e379b320d22a6550760fb2e625b2b2d4707b
SHA512c7e62da8e74b66dd88c153ed9ff17204a9eb8d46d9241af54fffff5d67c3816cfdbdbbed17360ecf5a2f9c7485c056b23b5e8bb3383a3e6f181ea89b6e8df840
-
Filesize
620B
MD58e353e0cbf4c6ce452469a2456629f23
SHA1374b1ad1f3a8ba0410298066f39c20952a5493ae
SHA25638ed42ba742bf3b8821735020e85924d2c3aad7ed29b94a2100fb089597bcb4d
SHA5122fd8fbb07dec701c2bab842e4a82b15301202f9e8153284b58cfd4841f94a3b246def4540ec611c232c014b7b1879e3e7bdae181a3cee88d0335432294be3d28
-
Filesize
962KB
MD504e9563c7bba02d1378bf3eeef7bc4bb
SHA1be811a8564a5c215fb9d037e093273bdef0806a0
SHA2569fb2f67b3cfa0bcf0b2557792b652e8f0b08ff18a7f8a03127abbaf840ef6d93
SHA512c9f59138844261359d7e1f00613ca8691cb9100bf4ebccf29091522fe99fb9b97878703637acf2cdccabbf7bc049c6bc0f96e21cfbf208c2a16b3e5557d99619
-
Filesize
989KB
MD5f22571c6d92113e9cff6c5c2dc5a7366
SHA170cb002b768551b0fe90f1c226cf38b0e5067746
SHA2566fa687e8e811b62ba14ba7d99bae55dcad0fc54a27f1014a1b80bd0f922db369
SHA51201d7794270e24647e9aa4a84e79d999d30d8194f7b53f88e1468cb178e4e51e4a768bb746090fe27902b77608dfa05f1a6ded11dccdc5cdf29017d5fbaf91ac3
-
Filesize
26KB
MD57fed7b53952578d87020b408a92977f7
SHA137142388d44b6402b174d18c26052474dd291980
SHA256fbf4af6393fcd93fea4f2081dc472703c282967d35d5231e93592643b93eb882
SHA512a1ed93f597ee723adbd62a9d7b2b7027685bd13ee64f99aab90e20338e9ab51f67fea3b4556782189161a861a3a42d0f627ad4e136abf8d52c1519523982cdd1
-
Filesize
26KB
MD557d96c198adb32be1a39065a02a20f3c
SHA1abbe60c6ab6a703bdea9ce99bf2fc59510001abe
SHA25608611b2014b8e9d4ea0ffed9cb688dc5bacaf2ec1403e368f60ed1e90e373f27
SHA51273cc04e41fd0885c34cbfebbaf16d1fb067cacc851986a47f0c812a37615cab9e043b8c1c1dd2a7c091cca1c99bdcb8560f579b7b87c49a38cb0b0b7cf7307fa
-
Filesize
9B
MD5de299d58575b595bc358a5c5edd0767d
SHA10d30c906a5b5647289c7788d31dd3afd642350a4
SHA25632ef1af1131d89e96d59ac0d3f8e232e839355587a679a2df2479b5277a704e3
SHA512c8e20bb98c427a3a0eea8769df090d59353f0b484321e82b381cfca18b111bd1d782713f2f5bf815e5832a0e12ec909a0324fe9ba013c626327cabf27a464bbc