Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19-05-2024 21:40

General

  • Target

    412a9dd0f6c9989320e86e2e85d84520_NeikiAnalytics.exe

  • Size

    135KB

  • MD5

    412a9dd0f6c9989320e86e2e85d84520

  • SHA1

    6684e00ceb5925c32a4592a95d2d2f7218dd47e1

  • SHA256

    37859bac6043c36e43fcb9f81bdbcb8a811a30a820b1febd2f9bf0551989d9f9

  • SHA512

    ce1cb04cecc27422aac00284de01db2049e0d414f4a54070a4863b0628c4db127dc041a24c15e689cc80daebe21eb0398a6799a911ede319585c3552b7768eca

  • SSDEEP

    1536:UfsEqouTRcG/Mzvgf7xEuvnXNTRdUzwTekUOisZ1yDDajtXbVd/3:UVqoCl/YgjxEufVU0TbTyDDalv/3

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 4 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Drops file in System32 directory 2 IoCs
  • Drops file in Windows directory 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 2 IoCs
  • Suspicious use of SetWindowsHookEx 10 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\412a9dd0f6c9989320e86e2e85d84520_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\412a9dd0f6c9989320e86e2e85d84520_NeikiAnalytics.exe"
    1⤵
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:388
    • \??\c:\windows\resources\themes\explorer.exe
      c:\windows\resources\themes\explorer.exe
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Drops file in System32 directory
      • Drops file in Windows directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2428
      • \??\c:\windows\resources\spoolsv.exe
        c:\windows\resources\spoolsv.exe SE
        3⤵
        • Executes dropped EXE
        • Drops file in Windows directory
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:432
        • \??\c:\windows\resources\svchost.exe
          c:\windows\resources\svchost.exe
          4⤵
          • Modifies visiblity of hidden/system files in Explorer
          • Executes dropped EXE
          • Adds Run key to start application
          • Drops file in System32 directory
          • Suspicious behavior: GetForegroundWindowSpam
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:4508
          • \??\c:\windows\resources\spoolsv.exe
            c:\windows\resources\spoolsv.exe PR
            5⤵
            • Executes dropped EXE
            • Suspicious use of SetWindowsHookEx
            PID:1560

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\Resources\spoolsv.exe

    Filesize

    135KB

    MD5

    55aa16e7b0ca92e4334fc3f6613426e9

    SHA1

    b4b558eb4342f1505c55712e2b2ecdd794e810e9

    SHA256

    c82a37c3e2c145100aa24e8d4b17be050ba218b7d7a03692fb157bc8eac92757

    SHA512

    24796e4a0b0dcbd67ad536d49237fbb1dc37fab5181cca37656dd4f61cbebb7cf8f86d5aa908b18cf3943c556bef3267fead961464d782694acb0a18bf5a07eb

  • \??\c:\windows\resources\svchost.exe

    Filesize

    135KB

    MD5

    292517a9484b9e8739e99173f4933ff6

    SHA1

    111ccc005f2c790d439fe897d7e4ef6725cc4e77

    SHA256

    9133926c310ab28e345367d347f6b61e8bc65a4b2f4642d5e72b7c5e127960c2

    SHA512

    3ac837b02432d762d5d552e9e74a1babe776309f91029a2c24de2e7b8850e532ee7fca2d40271cbd579da68ac4d58218e6df249ce18072580b6c522644c33975

  • \??\c:\windows\resources\themes\explorer.exe

    Filesize

    135KB

    MD5

    f7eace2898cc536a3c22c399d811807b

    SHA1

    a89da94724fd6d6b7d9c60b96108af576acfed7e

    SHA256

    86b45370a8daf663aac987d3d4d6b0b7ea24502a086ed0701b2ec5fb2ecd8519

    SHA512

    ed424acf73271e3ac08ffde5d98fc5de804173ca06bede9975d7ef234004bf698dbdb3d0b881796da497266568471f93022c0d6dd92ad45dff2bc601fdb851ad

  • memory/388-0-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/388-36-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/432-23-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/432-35-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/1560-34-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/2428-9-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB