Analysis
-
max time kernel
149s -
max time network
134s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
17-05-2024 09:56
Static task
static1
Behavioral task
behavioral1
Sample
e84148b04dae7fe8546aa7ef0b87afe0_NeikiAnalytics.exe
Resource
win7-20240221-en
General
-
Target
e84148b04dae7fe8546aa7ef0b87afe0_NeikiAnalytics.exe
-
Size
4.1MB
-
MD5
e84148b04dae7fe8546aa7ef0b87afe0
-
SHA1
ef20fe50c44cd6a3e6ce736ab0467f9892a17f7a
-
SHA256
b2daf452c9c251e567e2eae4473bbfce6bc09a8fb49af8d5c1c60bf71f27c36c
-
SHA512
c4994a14e262ea920b67af2e41cb7d55bff371da4f2c0a250f989741f5755f7725dc5660c17157321fbc0190defaec2df14ba3b37703fee693ef778ad9a4a7e2
-
SSDEEP
98304:9OEQv7p1EKwgW7O4vptwZo6T+WO0dzEY6Kk7ob384km+FfOT:9r2p15ulARrO0d7kw84IGT
Malware Config
Signatures
-
Glupteba payload 17 IoCs
resource yara_rule behavioral2/memory/4560-2-0x0000000002D30000-0x000000000361B000-memory.dmp family_glupteba behavioral2/memory/4560-3-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/4560-53-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/2716-57-0x0000000002D50000-0x000000000363B000-memory.dmp family_glupteba behavioral2/memory/2716-134-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/1624-209-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/1624-218-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/1624-221-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/1624-224-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/1624-227-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/1624-230-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/1624-233-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/1624-236-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/1624-239-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/1624-242-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/1624-245-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/1624-248-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba -
Modifies Windows Firewall 2 TTPs 1 IoCs
pid Process 668 netsh.exe -
Executes dropped EXE 2 IoCs
pid Process 1624 csrss.exe 1968 injector.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" csrss.exe Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" e84148b04dae7fe8546aa7ef0b87afe0_NeikiAnalytics.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Manipulates WinMonFS driver. 1 IoCs
Roottkits write to WinMonFS to hide directories/files from being detected.
description ioc Process File opened for modification \??\WinMonFS csrss.exe -
Drops file in System32 directory 7 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe -
Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 1 IoCs
Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.
description ioc Process File opened (read-only) \??\VBoxMiniRdrDN e84148b04dae7fe8546aa7ef0b87afe0_NeikiAnalytics.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\rss e84148b04dae7fe8546aa7ef0b87afe0_NeikiAnalytics.exe File created C:\Windows\rss\csrss.exe e84148b04dae7fe8546aa7ef0b87afe0_NeikiAnalytics.exe -
pid Process 1872 powershell.exe 1668 powershell.exe 3408 powershell.exe 1548 powershell.exe 2376 powershell.exe 2688 powershell.exe 2156 powershell.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1492 schtasks.exe 3268 schtasks.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1841 = "Russia TZ 4 Daylight Time" e84148b04dae7fe8546aa7ef0b87afe0_NeikiAnalytics.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1871 = "Russia TZ 7 Daylight Time" e84148b04dae7fe8546aa7ef0b87afe0_NeikiAnalytics.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-872 = "Pakistan Standard Time" e84148b04dae7fe8546aa7ef0b87afe0_NeikiAnalytics.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-661 = "Cen. Australia Daylight Time" e84148b04dae7fe8546aa7ef0b87afe0_NeikiAnalytics.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-292 = "Central European Standard Time" e84148b04dae7fe8546aa7ef0b87afe0_NeikiAnalytics.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-262 = "GMT Standard Time" e84148b04dae7fe8546aa7ef0b87afe0_NeikiAnalytics.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2492 = "Aus Central W. Standard Time" e84148b04dae7fe8546aa7ef0b87afe0_NeikiAnalytics.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-171 = "Central Daylight Time (Mexico)" e84148b04dae7fe8546aa7ef0b87afe0_NeikiAnalytics.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-431 = "Iran Daylight Time" e84148b04dae7fe8546aa7ef0b87afe0_NeikiAnalytics.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-442 = "Arabian Standard Time" e84148b04dae7fe8546aa7ef0b87afe0_NeikiAnalytics.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2892 = "Sudan Standard Time" e84148b04dae7fe8546aa7ef0b87afe0_NeikiAnalytics.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2041 = "Eastern Daylight Time (Mexico)" e84148b04dae7fe8546aa7ef0b87afe0_NeikiAnalytics.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-771 = "Montevideo Daylight Time" e84148b04dae7fe8546aa7ef0b87afe0_NeikiAnalytics.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1891 = "Russia TZ 3 Daylight Time" e84148b04dae7fe8546aa7ef0b87afe0_NeikiAnalytics.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1722 = "Libya Standard Time" e84148b04dae7fe8546aa7ef0b87afe0_NeikiAnalytics.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-411 = "E. Africa Daylight Time" e84148b04dae7fe8546aa7ef0b87afe0_NeikiAnalytics.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1972 = "Belarus Standard Time" e84148b04dae7fe8546aa7ef0b87afe0_NeikiAnalytics.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-492 = "India Standard Time" e84148b04dae7fe8546aa7ef0b87afe0_NeikiAnalytics.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-961 = "Paraguay Daylight Time" e84148b04dae7fe8546aa7ef0b87afe0_NeikiAnalytics.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2161 = "Altai Daylight Time" e84148b04dae7fe8546aa7ef0b87afe0_NeikiAnalytics.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-401 = "Arabic Daylight Time" e84148b04dae7fe8546aa7ef0b87afe0_NeikiAnalytics.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2511 = "Lord Howe Daylight Time" e84148b04dae7fe8546aa7ef0b87afe0_NeikiAnalytics.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-3142 = "South Sudan Standard Time" e84148b04dae7fe8546aa7ef0b87afe0_NeikiAnalytics.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-622 = "Korea Standard Time" e84148b04dae7fe8546aa7ef0b87afe0_NeikiAnalytics.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-511 = "Central Asia Daylight Time" e84148b04dae7fe8546aa7ef0b87afe0_NeikiAnalytics.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-681 = "E. Australia Daylight Time" e84148b04dae7fe8546aa7ef0b87afe0_NeikiAnalytics.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-432 = "Iran Standard Time" e84148b04dae7fe8546aa7ef0b87afe0_NeikiAnalytics.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-222 = "Alaskan Standard Time" e84148b04dae7fe8546aa7ef0b87afe0_NeikiAnalytics.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1832 = "Russia TZ 2 Standard Time" e84148b04dae7fe8546aa7ef0b87afe0_NeikiAnalytics.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-501 = "Nepal Daylight Time" e84148b04dae7fe8546aa7ef0b87afe0_NeikiAnalytics.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs powershell.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1668 powershell.exe 1668 powershell.exe 4560 e84148b04dae7fe8546aa7ef0b87afe0_NeikiAnalytics.exe 4560 e84148b04dae7fe8546aa7ef0b87afe0_NeikiAnalytics.exe 3408 powershell.exe 3408 powershell.exe 2716 e84148b04dae7fe8546aa7ef0b87afe0_NeikiAnalytics.exe 2716 e84148b04dae7fe8546aa7ef0b87afe0_NeikiAnalytics.exe 2716 e84148b04dae7fe8546aa7ef0b87afe0_NeikiAnalytics.exe 2716 e84148b04dae7fe8546aa7ef0b87afe0_NeikiAnalytics.exe 2716 e84148b04dae7fe8546aa7ef0b87afe0_NeikiAnalytics.exe 2716 e84148b04dae7fe8546aa7ef0b87afe0_NeikiAnalytics.exe 2716 e84148b04dae7fe8546aa7ef0b87afe0_NeikiAnalytics.exe 2716 e84148b04dae7fe8546aa7ef0b87afe0_NeikiAnalytics.exe 2716 e84148b04dae7fe8546aa7ef0b87afe0_NeikiAnalytics.exe 2716 e84148b04dae7fe8546aa7ef0b87afe0_NeikiAnalytics.exe 1548 powershell.exe 1548 powershell.exe 2376 powershell.exe 2376 powershell.exe 2688 powershell.exe 2688 powershell.exe 2156 powershell.exe 2156 powershell.exe 1872 powershell.exe 1872 powershell.exe 1968 injector.exe 1968 injector.exe 1968 injector.exe 1968 injector.exe 1968 injector.exe 1968 injector.exe 1624 csrss.exe 1624 csrss.exe 1968 injector.exe 1968 injector.exe 1968 injector.exe 1968 injector.exe 1968 injector.exe 1968 injector.exe 1624 csrss.exe 1624 csrss.exe 1968 injector.exe 1968 injector.exe 1968 injector.exe 1968 injector.exe 1968 injector.exe 1968 injector.exe 1968 injector.exe 1968 injector.exe 1968 injector.exe 1968 injector.exe 1968 injector.exe 1968 injector.exe 1968 injector.exe 1968 injector.exe 1968 injector.exe 1968 injector.exe 1968 injector.exe 1968 injector.exe 1968 injector.exe 1968 injector.exe 1968 injector.exe 1968 injector.exe -
Suspicious use of AdjustPrivilegeToken 10 IoCs
description pid Process Token: SeDebugPrivilege 1668 powershell.exe Token: SeDebugPrivilege 4560 e84148b04dae7fe8546aa7ef0b87afe0_NeikiAnalytics.exe Token: SeImpersonatePrivilege 4560 e84148b04dae7fe8546aa7ef0b87afe0_NeikiAnalytics.exe Token: SeDebugPrivilege 3408 powershell.exe Token: SeDebugPrivilege 1548 powershell.exe Token: SeDebugPrivilege 2376 powershell.exe Token: SeDebugPrivilege 2688 powershell.exe Token: SeDebugPrivilege 2156 powershell.exe Token: SeDebugPrivilege 1872 powershell.exe Token: SeSystemEnvironmentPrivilege 1624 csrss.exe -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 4560 wrote to memory of 1668 4560 e84148b04dae7fe8546aa7ef0b87afe0_NeikiAnalytics.exe 93 PID 4560 wrote to memory of 1668 4560 e84148b04dae7fe8546aa7ef0b87afe0_NeikiAnalytics.exe 93 PID 4560 wrote to memory of 1668 4560 e84148b04dae7fe8546aa7ef0b87afe0_NeikiAnalytics.exe 93 PID 2716 wrote to memory of 3408 2716 e84148b04dae7fe8546aa7ef0b87afe0_NeikiAnalytics.exe 100 PID 2716 wrote to memory of 3408 2716 e84148b04dae7fe8546aa7ef0b87afe0_NeikiAnalytics.exe 100 PID 2716 wrote to memory of 3408 2716 e84148b04dae7fe8546aa7ef0b87afe0_NeikiAnalytics.exe 100 PID 2716 wrote to memory of 4336 2716 e84148b04dae7fe8546aa7ef0b87afe0_NeikiAnalytics.exe 102 PID 2716 wrote to memory of 4336 2716 e84148b04dae7fe8546aa7ef0b87afe0_NeikiAnalytics.exe 102 PID 4336 wrote to memory of 668 4336 cmd.exe 104 PID 4336 wrote to memory of 668 4336 cmd.exe 104 PID 2716 wrote to memory of 1548 2716 e84148b04dae7fe8546aa7ef0b87afe0_NeikiAnalytics.exe 105 PID 2716 wrote to memory of 1548 2716 e84148b04dae7fe8546aa7ef0b87afe0_NeikiAnalytics.exe 105 PID 2716 wrote to memory of 1548 2716 e84148b04dae7fe8546aa7ef0b87afe0_NeikiAnalytics.exe 105 PID 2716 wrote to memory of 2376 2716 e84148b04dae7fe8546aa7ef0b87afe0_NeikiAnalytics.exe 107 PID 2716 wrote to memory of 2376 2716 e84148b04dae7fe8546aa7ef0b87afe0_NeikiAnalytics.exe 107 PID 2716 wrote to memory of 2376 2716 e84148b04dae7fe8546aa7ef0b87afe0_NeikiAnalytics.exe 107 PID 2716 wrote to memory of 1624 2716 e84148b04dae7fe8546aa7ef0b87afe0_NeikiAnalytics.exe 109 PID 2716 wrote to memory of 1624 2716 e84148b04dae7fe8546aa7ef0b87afe0_NeikiAnalytics.exe 109 PID 2716 wrote to memory of 1624 2716 e84148b04dae7fe8546aa7ef0b87afe0_NeikiAnalytics.exe 109 PID 1624 wrote to memory of 2688 1624 csrss.exe 110 PID 1624 wrote to memory of 2688 1624 csrss.exe 110 PID 1624 wrote to memory of 2688 1624 csrss.exe 110 PID 1624 wrote to memory of 2156 1624 csrss.exe 115 PID 1624 wrote to memory of 2156 1624 csrss.exe 115 PID 1624 wrote to memory of 2156 1624 csrss.exe 115 PID 1624 wrote to memory of 1872 1624 csrss.exe 119 PID 1624 wrote to memory of 1872 1624 csrss.exe 119 PID 1624 wrote to memory of 1872 1624 csrss.exe 119 PID 1624 wrote to memory of 1968 1624 csrss.exe 122 PID 1624 wrote to memory of 1968 1624 csrss.exe 122 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\e84148b04dae7fe8546aa7ef0b87afe0_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\e84148b04dae7fe8546aa7ef0b87afe0_NeikiAnalytics.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4560 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1668
-
-
C:\Users\Admin\AppData\Local\Temp\e84148b04dae7fe8546aa7ef0b87afe0_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\e84148b04dae7fe8546aa7ef0b87afe0_NeikiAnalytics.exe"2⤵
- Adds Run key to start application
- Checks for VirtualBox DLLs, possible anti-VM trick
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2716 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Drops file in System32 directory
- Command and Scripting Interpreter: PowerShell
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3408
-
-
C:\Windows\system32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"3⤵
- Suspicious use of WriteProcessMemory
PID:4336 -
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes4⤵
- Modifies Windows Firewall
PID:668
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Drops file in System32 directory
- Command and Scripting Interpreter: PowerShell
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1548
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Drops file in System32 directory
- Command and Scripting Interpreter: PowerShell
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2376
-
-
C:\Windows\rss\csrss.exeC:\Windows\rss\csrss.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Manipulates WinMonFS driver.
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1624 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Command and Scripting Interpreter: PowerShell
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2688
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F4⤵
- Creates scheduled task(s)
PID:1492
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /delete /tn ScheduledUpdate /f4⤵PID:544
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Command and Scripting Interpreter: PowerShell
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2156
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Command and Scripting Interpreter: PowerShell
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1872
-
-
C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exeC:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:1968
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F4⤵
- Creates scheduled task(s)
PID:3268
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
281KB
MD5d98e33b66343e7c96158444127a117f6
SHA1bb716c5509a2bf345c6c1152f6e3e1452d39d50d
SHA2565de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1
SHA512705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log
Filesize2KB
MD53d086a433708053f9bf9523e1d87a4e8
SHA1b3ab5d4f282a4c8fe8c3005b8a557ed5a0e37f28
SHA2566f8fd1b8d9788ad54eaeee329232187e24b7b43393a01aeba2d6e9675231fb69
SHA512931ae42b4c68a4507ff2342332b08eb407050d47cf4176137ea022d0f6e513c689e998445a04c6d18d4877391705c586bfce0234632b898d41aaed0957996dfd
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5e2e209dabe58a5181b3a7905447060ed
SHA1ced1dc50e62b701aed97e39b20a071229e29ec67
SHA25620ba91b32ddb8fbdd580b273c8bf18a949787108f88d0eccc788d1041ae078ce
SHA5127066dfd149394fe015d9d8a1849edcceb424d93a0db1e1a186563f32a578d6f3a032145e3a50aec39cfecfcceb02d11b391a12518716018ae2ad055bd94dc508
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5331b65cf3f847a83672ef940bfe17c30
SHA1fcc882065a090632078bcb911dea214faf298da2
SHA25665ca94828ecf3160fe90e7c24046d1e96cf5112cd7ebb353be964e7d5d390e01
SHA512a555ea57901b00ca155256ad09387971c1c98ba72056ed31cc33051572e4c04a5fb546ba3e5e8710044d93d75166f899d713f3447f8bdc3d3feeb7d9d7c90c57
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD574f911a70ea4ce757b22ddc2894108ae
SHA10fba300906f17ad1c73fbd68b917ce6cdd5544fa
SHA256ab0fec0b4a30d6ea19d166a45ae09215de06d164736665e723832eb8983e9117
SHA51262cef800d331b22853c1381daf06109a64fac17ea17039cb4b8cf71ddc65630b3ed30a5c062bc1610693716a87a62e76a3bebed916a0bfcb0f9213aada2584ff
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD59945efdf1704e83b1e2fe727d3a57252
SHA1cc4fbb3198c72c6ce624d3ad1a146651a2984568
SHA256e30d7e885037b1c0c9c5fdef6c7eb4a687ed8a45c7e195ebc9ac71bfda114c83
SHA5124e8ec804b3dfde7e3defec4b46255e87e237c37ac3dfb2d725648febf1c2051988bb7c517256867ab256967178957c25e9bb1f79d572d3306073a41239415888
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5eec4eed6f725d81752d683c3e254e30e
SHA1563b03ae88ac2be8c0272b89c9493daa4f58fb0e
SHA2569ee012a7384073796c469a26cdfc36d24484f30eaea1be83e155659986670567
SHA5129f3c1923371e175a6faae06791c0f889a2575144c958583e69865237d2f8e00c2c7ce52e6dcf8761c54aa66e50184d931005dddbbaf0cfd6592fb5d0b135df03
-
Filesize
4.1MB
MD5e84148b04dae7fe8546aa7ef0b87afe0
SHA1ef20fe50c44cd6a3e6ce736ab0467f9892a17f7a
SHA256b2daf452c9c251e567e2eae4473bbfce6bc09a8fb49af8d5c1c60bf71f27c36c
SHA512c4994a14e262ea920b67af2e41cb7d55bff371da4f2c0a250f989741f5755f7725dc5660c17157321fbc0190defaec2df14ba3b37703fee693ef778ad9a4a7e2