Analysis

  • max time kernel
    26s
  • max time network
    101s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    19-05-2024 11:57

General

  • Target

    b6d204cf96e004b32efbeaae6852962b_NeikiAnalytics.exe

  • Size

    152KB

  • MD5

    b6d204cf96e004b32efbeaae6852962b

  • SHA1

    549abe4a13e5aa2c6f78b2e5dce3408641568c96

  • SHA256

    6b4f87b48c72cb08688413039bed57be6882933ead00949e7d85f582a504f1e8

  • SHA512

    ed7293f46e23297876d176cfe97a9db4715f2328b5a505b129a39ff991ad9e6e9923453531c698cedc19db0aaf765c3510df2e074db0a42ea7191c22887b46f8

  • SSDEEP

    3072:321sD4b3JiD3GWguwp07jyAKR9G6yx9zwxqpoSEQYynmL:kcKWt75oqLY8mL

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

http://www.klkjwre9fqwieluoi.info/

http://kukutrustnet777888.info/

Signatures

  • Modifies WinLogon for persistence 2 TTPs 4 IoCs
  • Modifies firewall policy service 2 TTPs 6 IoCs
  • Sality

    Sality is backdoor written in C++, first discovered in 2003.

  • UAC bypass 3 TTPs 2 IoCs
  • Windows security bypass 2 TTPs 12 IoCs
  • Deletes itself 1 IoCs
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 2 IoCs
  • UPX packed file 22 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Windows security modification 2 TTPs 14 IoCs
  • Adds Run key to start application 2 TTPs 8 IoCs
  • Checks whether UAC is enabled 1 TTPs 2 IoCs
  • Enumerates connected drives 3 TTPs 12 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in System32 directory 10 IoCs
  • Drops file in Windows directory 35 IoCs
  • Suspicious behavior: EnumeratesProcesses 42 IoCs
  • Suspicious use of AdjustPrivilegeToken 42 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Suspicious use of WriteProcessMemory 29 IoCs
  • System policy modification 1 TTPs 2 IoCs

Processes

  • C:\Windows\system32\taskhost.exe
    "taskhost.exe"
    1⤵
      PID:1116
    • C:\Windows\system32\Dwm.exe
      "C:\Windows\system32\Dwm.exe"
      1⤵
        PID:1164
      • C:\Windows\Explorer.EXE
        C:\Windows\Explorer.EXE
        1⤵
          PID:1212
          • C:\Users\Admin\AppData\Local\Temp\b6d204cf96e004b32efbeaae6852962b_NeikiAnalytics.exe
            "C:\Users\Admin\AppData\Local\Temp\b6d204cf96e004b32efbeaae6852962b_NeikiAnalytics.exe"
            2⤵
            • Modifies WinLogon for persistence
            • Modifies firewall policy service
            • UAC bypass
            • Windows security bypass
            • Loads dropped DLL
            • Windows security modification
            • Adds Run key to start application
            • Checks whether UAC is enabled
            • Enumerates connected drives
            • Drops file in System32 directory
            • Drops file in Windows directory
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            • System policy modification
            PID:836
            • C:\Windows\system\Fun.exe
              C:\Windows\system\Fun.exe
              3⤵
              • Modifies WinLogon for persistence
              • Modifies firewall policy service
              • UAC bypass
              • Windows security bypass
              • Deletes itself
              • Executes dropped EXE
              • Windows security modification
              • Adds Run key to start application
              • Checks whether UAC is enabled
              • Enumerates connected drives
              • Drops file in System32 directory
              • Drops file in Windows directory
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of SetWindowsHookEx
              • Suspicious use of WriteProcessMemory
              • System policy modification
              PID:2740
              • C:\Windows\SVIQ.EXE
                C:\Windows\SVIQ.EXE
                4⤵
                • Modifies WinLogon for persistence
                • Executes dropped EXE
                • Adds Run key to start application
                • Drops file in System32 directory
                • Drops file in Windows directory
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of SetWindowsHookEx
                PID:2680
              • C:\Windows\system\Fun.exe
                C:\Windows\system\Fun.exe
                4⤵
                  PID:2796
              • C:\Windows\dc.exe
                C:\Windows\dc.exe
                3⤵
                • Modifies WinLogon for persistence
                • Executes dropped EXE
                • Adds Run key to start application
                • Drops file in System32 directory
                • Drops file in Windows directory
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of SetWindowsHookEx
                PID:2820
                • C:\Windows\system\Fun.exe
                  C:\Windows\system\Fun.exe
                  4⤵
                    PID:2360
            • C:\Windows\system32\DllHost.exe
              C:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}
              1⤵
                PID:1036
              • C:\Windows\system32\DllHost.exe
                C:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}
                1⤵
                  PID:1280

                Network

                MITRE ATT&CK Enterprise v15

                Replay Monitor

                Loading Replay Monitor...

                Downloads

                • C:\Windows\SVIQ.EXE
                  Filesize

                  152KB

                  MD5

                  b6d204cf96e004b32efbeaae6852962b

                  SHA1

                  549abe4a13e5aa2c6f78b2e5dce3408641568c96

                  SHA256

                  6b4f87b48c72cb08688413039bed57be6882933ead00949e7d85f582a504f1e8

                  SHA512

                  ed7293f46e23297876d176cfe97a9db4715f2328b5a505b129a39ff991ad9e6e9923453531c698cedc19db0aaf765c3510df2e074db0a42ea7191c22887b46f8

                • C:\Windows\SYSTEM.INI
                  Filesize

                  257B

                  MD5

                  eb16cc3010bdbabeee4d6517e72f6416

                  SHA1

                  598d6ef3966a163c64cd0f061c3115a5d3a673e3

                  SHA256

                  4ff89e3861f195b0afb777e488c5a57715f60ea34f6000195b07fb0b7fe7d876

                  SHA512

                  886f6c8227ad25aeaf891e87319dce09bdc12692b3e452c4db0c68d01c5987cf937baff7fd4d6730eeb4ca19ceaf744ea24ea28c15996d6e9afaae0ce67980b2

                • C:\Windows\wininit.ini
                  Filesize

                  41B

                  MD5

                  e839977c0d22c9aa497b0b1d90d8a372

                  SHA1

                  b5048e501399138796b38f3d3666e1a88c397e83

                  SHA256

                  478db7f82fd7ef4860f7acd2f534ec303175500d7f4e1e36161d31c900d234e2

                  SHA512

                  4c8ba5a26b6f738f8d25c32d019cee63e9a32d28e3aeb8fe31b965d7603c24a3539e469c8eb569747b47dadc9c43cdd1066ddb37ed8138bee5d0c74b5d0c275d

                • C:\gqoepd.exe
                  Filesize

                  100KB

                  MD5

                  a186c23b0f5e815d41519a3904ed2df6

                  SHA1

                  9d07aede414d6e8a2316fdd62d6925f72a63c3c0

                  SHA256

                  9cfc820d4eb33d9b00f32b67f78429056059aa0751f5b20c093ad8ec40311610

                  SHA512

                  c4e3a9efcb3597c15c57824eff124651553340c792af09743e7ec60556c3c846125f0390ce010cc3becf605b5d597d8575a9b7ebaff91fe80b706111a12fd232

                • memory/836-30-0x00000000025A0000-0x000000000362E000-memory.dmp
                  Filesize

                  16.6MB

                • memory/836-4-0x00000000025A0000-0x000000000362E000-memory.dmp
                  Filesize

                  16.6MB

                • memory/836-7-0x00000000025A0000-0x000000000362E000-memory.dmp
                  Filesize

                  16.6MB

                • memory/836-12-0x00000000025A0000-0x000000000362E000-memory.dmp
                  Filesize

                  16.6MB

                • memory/836-9-0x00000000025A0000-0x000000000362E000-memory.dmp
                  Filesize

                  16.6MB

                • memory/836-5-0x00000000025A0000-0x000000000362E000-memory.dmp
                  Filesize

                  16.6MB

                • memory/836-31-0x00000000025A0000-0x000000000362E000-memory.dmp
                  Filesize

                  16.6MB

                • memory/836-45-0x00000000036C0000-0x00000000036C2000-memory.dmp
                  Filesize

                  8KB

                • memory/836-44-0x00000000036C0000-0x00000000036C2000-memory.dmp
                  Filesize

                  8KB

                • memory/836-13-0x00000000025A0000-0x000000000362E000-memory.dmp
                  Filesize

                  16.6MB

                • memory/836-43-0x00000000036D0000-0x00000000036D1000-memory.dmp
                  Filesize

                  4KB

                • memory/836-41-0x00000000036D0000-0x00000000036D1000-memory.dmp
                  Filesize

                  4KB

                • memory/836-40-0x00000000036C0000-0x00000000036C2000-memory.dmp
                  Filesize

                  8KB

                • memory/836-2-0x00000000025A0000-0x000000000362E000-memory.dmp
                  Filesize

                  16.6MB

                • memory/836-0-0x0000000000400000-0x0000000000428000-memory.dmp
                  Filesize

                  160KB

                • memory/836-56-0x0000000005D70000-0x0000000005D98000-memory.dmp
                  Filesize

                  160KB

                • memory/836-55-0x0000000005D70000-0x0000000005D98000-memory.dmp
                  Filesize

                  160KB

                • memory/836-8-0x00000000025A0000-0x000000000362E000-memory.dmp
                  Filesize

                  16.6MB

                • memory/836-10-0x00000000025A0000-0x000000000362E000-memory.dmp
                  Filesize

                  16.6MB

                • memory/836-147-0x0000000000400000-0x0000000000428000-memory.dmp
                  Filesize

                  160KB

                • memory/836-128-0x00000000025A0000-0x000000000362E000-memory.dmp
                  Filesize

                  16.6MB

                • memory/836-130-0x00000000025A0000-0x000000000362E000-memory.dmp
                  Filesize

                  16.6MB

                • memory/836-129-0x00000000025A0000-0x000000000362E000-memory.dmp
                  Filesize

                  16.6MB

                • memory/836-148-0x00000000025A0000-0x000000000362E000-memory.dmp
                  Filesize

                  16.6MB

                • memory/1116-32-0x0000000000410000-0x0000000000412000-memory.dmp
                  Filesize

                  8KB

                • memory/2680-87-0x0000000000400000-0x0000000000428000-memory.dmp
                  Filesize

                  160KB

                • memory/2740-86-0x0000000002540000-0x0000000002568000-memory.dmp
                  Filesize

                  160KB

                • memory/2740-155-0x0000000004D00000-0x0000000005D8E000-memory.dmp
                  Filesize

                  16.6MB

                • memory/2740-153-0x0000000004D00000-0x0000000005D8E000-memory.dmp
                  Filesize

                  16.6MB

                • memory/2740-156-0x0000000004D00000-0x0000000005D8E000-memory.dmp
                  Filesize

                  16.6MB

                • memory/2740-188-0x0000000004D00000-0x0000000005D8E000-memory.dmp
                  Filesize

                  16.6MB

                • memory/2740-172-0x0000000004720000-0x0000000004721000-memory.dmp
                  Filesize

                  4KB

                • memory/2740-149-0x0000000004D00000-0x0000000005D8E000-memory.dmp
                  Filesize

                  16.6MB

                • memory/2740-152-0x0000000004D00000-0x0000000005D8E000-memory.dmp
                  Filesize

                  16.6MB

                • memory/2740-261-0x0000000004D00000-0x0000000005D8E000-memory.dmp
                  Filesize

                  16.6MB