Analysis
-
max time kernel
21s -
max time network
101s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
19-05-2024 11:57
Static task
static1
Behavioral task
behavioral1
Sample
b6d204cf96e004b32efbeaae6852962b_NeikiAnalytics.exe
Resource
win7-20240508-en
Errors
General
-
Target
b6d204cf96e004b32efbeaae6852962b_NeikiAnalytics.exe
-
Size
152KB
-
MD5
b6d204cf96e004b32efbeaae6852962b
-
SHA1
549abe4a13e5aa2c6f78b2e5dce3408641568c96
-
SHA256
6b4f87b48c72cb08688413039bed57be6882933ead00949e7d85f582a504f1e8
-
SHA512
ed7293f46e23297876d176cfe97a9db4715f2328b5a505b129a39ff991ad9e6e9923453531c698cedc19db0aaf765c3510df2e074db0a42ea7191c22887b46f8
-
SSDEEP
3072:321sD4b3JiD3GWguwp07jyAKR9G6yx9zwxqpoSEQYynmL:kcKWt75oqLY8mL
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
http://www.klkjwre9fqwieluoi.info/
http://kukutrustnet777888.info/
Signatures
-
Modifies WinLogon for persistence 2 TTPs 4 IoCs
Processes:
b6d204cf96e004b32efbeaae6852962b_NeikiAnalytics.exeFun.exeSVIQ.EXEdc.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "Explorer.exe C:\\Windows\\system32\\WinSit.exe" b6d204cf96e004b32efbeaae6852962b_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "Explorer.exe C:\\Windows\\system32\\WinSit.exe" Fun.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "Explorer.exe C:\\Windows\\system32\\WinSit.exe" SVIQ.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "Explorer.exe C:\\Windows\\system32\\WinSit.exe" dc.exe -
Modifies firewall policy service 2 TTPs 6 IoCs
Processes:
b6d204cf96e004b32efbeaae6852962b_NeikiAnalytics.exeFun.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" b6d204cf96e004b32efbeaae6852962b_NeikiAnalytics.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" b6d204cf96e004b32efbeaae6852962b_NeikiAnalytics.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "1" b6d204cf96e004b32efbeaae6852962b_NeikiAnalytics.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" Fun.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" Fun.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "1" Fun.exe -
Processes:
b6d204cf96e004b32efbeaae6852962b_NeikiAnalytics.exeFun.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" b6d204cf96e004b32efbeaae6852962b_NeikiAnalytics.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Fun.exe -
Processes:
b6d204cf96e004b32efbeaae6852962b_NeikiAnalytics.exeFun.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" b6d204cf96e004b32efbeaae6852962b_NeikiAnalytics.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" b6d204cf96e004b32efbeaae6852962b_NeikiAnalytics.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" b6d204cf96e004b32efbeaae6852962b_NeikiAnalytics.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UacDisableNotify = "1" b6d204cf96e004b32efbeaae6852962b_NeikiAnalytics.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" Fun.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" Fun.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UacDisableNotify = "1" Fun.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" b6d204cf96e004b32efbeaae6852962b_NeikiAnalytics.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" b6d204cf96e004b32efbeaae6852962b_NeikiAnalytics.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" Fun.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" Fun.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" Fun.exe -
Deletes itself 1 IoCs
Processes:
Fun.exepid process 3404 Fun.exe -
Executes dropped EXE 3 IoCs
Processes:
Fun.exeSVIQ.EXEdc.exepid process 3404 Fun.exe 1092 SVIQ.EXE 3916 dc.exe -
Processes:
resource yara_rule behavioral2/memory/1824-5-0x0000000002B00000-0x0000000003B8E000-memory.dmp upx behavioral2/memory/1824-6-0x0000000002B00000-0x0000000003B8E000-memory.dmp upx behavioral2/memory/1824-4-0x0000000002B00000-0x0000000003B8E000-memory.dmp upx behavioral2/memory/1824-3-0x0000000002B00000-0x0000000003B8E000-memory.dmp upx behavioral2/memory/1824-1-0x0000000002B00000-0x0000000003B8E000-memory.dmp upx behavioral2/memory/1824-9-0x0000000002B00000-0x0000000003B8E000-memory.dmp upx behavioral2/memory/1824-15-0x0000000002B00000-0x0000000003B8E000-memory.dmp upx behavioral2/memory/1824-10-0x0000000002B00000-0x0000000003B8E000-memory.dmp upx behavioral2/memory/1824-12-0x0000000002B00000-0x0000000003B8E000-memory.dmp upx behavioral2/memory/1824-14-0x0000000002B00000-0x0000000003B8E000-memory.dmp upx behavioral2/memory/1824-37-0x0000000002B00000-0x0000000003B8E000-memory.dmp upx behavioral2/memory/1824-36-0x0000000002B00000-0x0000000003B8E000-memory.dmp upx behavioral2/memory/1824-110-0x0000000002B00000-0x0000000003B8E000-memory.dmp upx behavioral2/memory/1824-111-0x0000000002B00000-0x0000000003B8E000-memory.dmp upx behavioral2/memory/1824-112-0x0000000002B00000-0x0000000003B8E000-memory.dmp upx behavioral2/memory/3404-133-0x0000000003CD0000-0x0000000004D5E000-memory.dmp upx behavioral2/memory/3404-134-0x0000000003CD0000-0x0000000004D5E000-memory.dmp upx behavioral2/memory/3404-135-0x0000000003CD0000-0x0000000004D5E000-memory.dmp upx behavioral2/memory/3404-144-0x0000000003CD0000-0x0000000004D5E000-memory.dmp upx behavioral2/memory/3404-131-0x0000000003CD0000-0x0000000004D5E000-memory.dmp upx behavioral2/memory/3404-128-0x0000000003CD0000-0x0000000004D5E000-memory.dmp upx behavioral2/memory/3404-132-0x0000000003CD0000-0x0000000004D5E000-memory.dmp upx behavioral2/memory/3404-130-0x0000000003CD0000-0x0000000004D5E000-memory.dmp upx behavioral2/memory/3404-137-0x0000000003CD0000-0x0000000004D5E000-memory.dmp upx behavioral2/memory/3404-136-0x0000000003CD0000-0x0000000004D5E000-memory.dmp upx behavioral2/memory/3404-148-0x0000000003CD0000-0x0000000004D5E000-memory.dmp upx behavioral2/memory/3404-149-0x0000000003CD0000-0x0000000004D5E000-memory.dmp upx behavioral2/memory/3404-150-0x0000000003CD0000-0x0000000004D5E000-memory.dmp upx behavioral2/memory/3404-152-0x0000000003CD0000-0x0000000004D5E000-memory.dmp upx behavioral2/memory/3404-151-0x0000000003CD0000-0x0000000004D5E000-memory.dmp upx behavioral2/memory/3404-154-0x0000000003CD0000-0x0000000004D5E000-memory.dmp upx behavioral2/memory/3404-155-0x0000000003CD0000-0x0000000004D5E000-memory.dmp upx behavioral2/memory/3404-156-0x0000000003CD0000-0x0000000004D5E000-memory.dmp upx behavioral2/memory/3404-157-0x0000000003CD0000-0x0000000004D5E000-memory.dmp upx behavioral2/memory/3404-159-0x0000000003CD0000-0x0000000004D5E000-memory.dmp upx behavioral2/memory/3404-161-0x0000000003CD0000-0x0000000004D5E000-memory.dmp upx behavioral2/memory/3404-197-0x0000000003CD0000-0x0000000004D5E000-memory.dmp upx -
Processes:
Fun.exeb6d204cf96e004b32efbeaae6852962b_NeikiAnalytics.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" Fun.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UacDisableNotify = "1" Fun.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\Svc Fun.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" b6d204cf96e004b32efbeaae6852962b_NeikiAnalytics.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" b6d204cf96e004b32efbeaae6852962b_NeikiAnalytics.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UacDisableNotify = "1" b6d204cf96e004b32efbeaae6852962b_NeikiAnalytics.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" Fun.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\Svc b6d204cf96e004b32efbeaae6852962b_NeikiAnalytics.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" Fun.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" Fun.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" Fun.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" b6d204cf96e004b32efbeaae6852962b_NeikiAnalytics.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" b6d204cf96e004b32efbeaae6852962b_NeikiAnalytics.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" b6d204cf96e004b32efbeaae6852962b_NeikiAnalytics.exe -
Adds Run key to start application 2 TTPs 8 IoCs
Processes:
SVIQ.EXEdc.exeb6d204cf96e004b32efbeaae6852962b_NeikiAnalytics.exeFun.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\dc2k5 = "C:\\Windows\\SVIQ.EXE" SVIQ.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\dc2k5 = "C:\\Windows\\SVIQ.EXE" dc.exe Set value (str) \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Fun = "C:\\Windows\\system\\Fun.exe" b6d204cf96e004b32efbeaae6852962b_NeikiAnalytics.exe Set value (str) \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Fun = "C:\\Windows\\system\\Fun.exe" Fun.exe Set value (str) \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Fun = "C:\\Windows\\system\\Fun.exe" SVIQ.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Fun = "C:\\Windows\\system\\Fun.exe" dc.exe Set value (str) \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\dc2k5 = "C:\\Windows\\SVIQ.EXE" b6d204cf96e004b32efbeaae6852962b_NeikiAnalytics.exe Set value (str) \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\dc2k5 = "C:\\Windows\\SVIQ.EXE" Fun.exe -
Processes:
b6d204cf96e004b32efbeaae6852962b_NeikiAnalytics.exeFun.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" b6d204cf96e004b32efbeaae6852962b_NeikiAnalytics.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Fun.exe -
Enumerates connected drives 3 TTPs 4 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
Fun.exedescription ioc process File opened (read-only) \??\E: Fun.exe File opened (read-only) \??\G: Fun.exe File opened (read-only) \??\H: Fun.exe File opened (read-only) \??\I: Fun.exe -
Drops file in System32 directory 10 IoCs
Processes:
Fun.exeSVIQ.EXEdc.exeb6d204cf96e004b32efbeaae6852962b_NeikiAnalytics.exedescription ioc process File opened for modification C:\Windows\SysWOW64\WinSit.exe Fun.exe File opened for modification C:\Windows\SysWOW64\config\Win.exe Fun.exe File opened for modification C:\Windows\SysWOW64\config\Win.exe SVIQ.EXE File opened for modification C:\Windows\SysWOW64\WinSit.exe dc.exe File created C:\Windows\SysWOW64\WinSit.exe b6d204cf96e004b32efbeaae6852962b_NeikiAnalytics.exe File opened for modification C:\Windows\SysWOW64\WinSit.exe b6d204cf96e004b32efbeaae6852962b_NeikiAnalytics.exe File created C:\Windows\SysWOW64\config\Win.exe b6d204cf96e004b32efbeaae6852962b_NeikiAnalytics.exe File opened for modification C:\Windows\SysWOW64\config\Win.exe b6d204cf96e004b32efbeaae6852962b_NeikiAnalytics.exe File opened for modification C:\Windows\SysWOW64\WinSit.exe SVIQ.EXE File opened for modification C:\Windows\SysWOW64\config\Win.exe dc.exe -
Drops file in Windows directory 35 IoCs
Processes:
b6d204cf96e004b32efbeaae6852962b_NeikiAnalytics.exeFun.exedc.exeSVIQ.EXEdescription ioc process File created C:\Windows\Help\Other.exe b6d204cf96e004b32efbeaae6852962b_NeikiAnalytics.exe File opened for modification C:\Windows\inf\Other.exe Fun.exe File created C:\Windows\system\Fun.exe dc.exe File opened for modification C:\Windows\SVIQ.EXE b6d204cf96e004b32efbeaae6852962b_NeikiAnalytics.exe File opened for modification C:\Windows\inf\Other.exe b6d204cf96e004b32efbeaae6852962b_NeikiAnalytics.exe File opened for modification C:\Windows\wininit.ini b6d204cf96e004b32efbeaae6852962b_NeikiAnalytics.exe File created C:\Windows\SVIQ.EXE SVIQ.EXE File opened for modification C:\Windows\Help\Other.exe SVIQ.EXE File opened for modification C:\Windows\system\Fun.exe Fun.exe File opened for modification C:\Windows\wininit.ini Fun.exe File opened for modification C:\Windows\dc.exe SVIQ.EXE File opened for modification C:\Windows\inf\Other.exe SVIQ.EXE File opened for modification C:\Windows\wininit.ini SVIQ.EXE File created C:\Windows\dc.exe b6d204cf96e004b32efbeaae6852962b_NeikiAnalytics.exe File created C:\Windows\SVIQ.EXE b6d204cf96e004b32efbeaae6852962b_NeikiAnalytics.exe File created C:\Windows\inf\Other.exe b6d204cf96e004b32efbeaae6852962b_NeikiAnalytics.exe File opened for modification C:\Windows\Help\Other.exe dc.exe File opened for modification C:\Windows\SVIQ.exe SVIQ.EXE File opened for modification C:\Windows\wininit.ini dc.exe File opened for modification C:\Windows\system\Fun.exe SVIQ.EXE File opened for modification C:\Windows\system\Fun.exe b6d204cf96e004b32efbeaae6852962b_NeikiAnalytics.exe File opened for modification C:\Windows\dc.exe Fun.exe File opened for modification C:\Windows\SVIQ.EXE Fun.exe File created C:\Windows\system\Fun.exe SVIQ.EXE File created C:\Windows\dc.exe dc.exe File opened for modification C:\Windows\inf\Other.exe dc.exe File opened for modification C:\Windows\dc.exe dc.exe File opened for modification C:\Windows\SYSTEM.INI b6d204cf96e004b32efbeaae6852962b_NeikiAnalytics.exe File created C:\Windows\system\Fun.exe b6d204cf96e004b32efbeaae6852962b_NeikiAnalytics.exe File opened for modification C:\Windows\dc.exe b6d204cf96e004b32efbeaae6852962b_NeikiAnalytics.exe File opened for modification C:\Windows\Help\Other.exe b6d204cf96e004b32efbeaae6852962b_NeikiAnalytics.exe File created C:\Windows\system\Fun.exe Fun.exe File opened for modification C:\Windows\Help\Other.exe Fun.exe File created C:\Windows\SVIQ.EXE dc.exe File opened for modification C:\Windows\system\Fun.exe dc.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
b6d204cf96e004b32efbeaae6852962b_NeikiAnalytics.exeFun.exeSVIQ.EXEdc.exepid process 1824 b6d204cf96e004b32efbeaae6852962b_NeikiAnalytics.exe 1824 b6d204cf96e004b32efbeaae6852962b_NeikiAnalytics.exe 1824 b6d204cf96e004b32efbeaae6852962b_NeikiAnalytics.exe 1824 b6d204cf96e004b32efbeaae6852962b_NeikiAnalytics.exe 1824 b6d204cf96e004b32efbeaae6852962b_NeikiAnalytics.exe 1824 b6d204cf96e004b32efbeaae6852962b_NeikiAnalytics.exe 3404 Fun.exe 3404 Fun.exe 1092 SVIQ.EXE 1092 SVIQ.EXE 3916 dc.exe 3916 dc.exe 3404 Fun.exe 3404 Fun.exe 1092 SVIQ.EXE 1092 SVIQ.EXE 3916 dc.exe 3916 dc.exe 1824 b6d204cf96e004b32efbeaae6852962b_NeikiAnalytics.exe 1824 b6d204cf96e004b32efbeaae6852962b_NeikiAnalytics.exe 3404 Fun.exe 3404 Fun.exe 1092 SVIQ.EXE 1092 SVIQ.EXE 3916 dc.exe 3916 dc.exe 3404 Fun.exe 3404 Fun.exe 1092 SVIQ.EXE 1092 SVIQ.EXE 3916 dc.exe 3916 dc.exe 3404 Fun.exe 3404 Fun.exe 1092 SVIQ.EXE 1092 SVIQ.EXE 3916 dc.exe 3916 dc.exe 3404 Fun.exe 3404 Fun.exe 1092 SVIQ.EXE 1092 SVIQ.EXE 3916 dc.exe 3916 dc.exe 3404 Fun.exe 3404 Fun.exe 3404 Fun.exe 3404 Fun.exe 1092 SVIQ.EXE 1092 SVIQ.EXE 3916 dc.exe 3916 dc.exe 3404 Fun.exe 3404 Fun.exe 1092 SVIQ.EXE 1092 SVIQ.EXE 3916 dc.exe 3916 dc.exe 3404 Fun.exe 3404 Fun.exe 1092 SVIQ.EXE 1092 SVIQ.EXE 3916 dc.exe 3916 dc.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
b6d204cf96e004b32efbeaae6852962b_NeikiAnalytics.exedescription pid process Token: SeDebugPrivilege 1824 b6d204cf96e004b32efbeaae6852962b_NeikiAnalytics.exe Token: SeDebugPrivilege 1824 b6d204cf96e004b32efbeaae6852962b_NeikiAnalytics.exe Token: SeDebugPrivilege 1824 b6d204cf96e004b32efbeaae6852962b_NeikiAnalytics.exe Token: SeDebugPrivilege 1824 b6d204cf96e004b32efbeaae6852962b_NeikiAnalytics.exe Token: SeDebugPrivilege 1824 b6d204cf96e004b32efbeaae6852962b_NeikiAnalytics.exe Token: SeDebugPrivilege 1824 b6d204cf96e004b32efbeaae6852962b_NeikiAnalytics.exe Token: SeDebugPrivilege 1824 b6d204cf96e004b32efbeaae6852962b_NeikiAnalytics.exe Token: SeDebugPrivilege 1824 b6d204cf96e004b32efbeaae6852962b_NeikiAnalytics.exe Token: SeDebugPrivilege 1824 b6d204cf96e004b32efbeaae6852962b_NeikiAnalytics.exe Token: SeDebugPrivilege 1824 b6d204cf96e004b32efbeaae6852962b_NeikiAnalytics.exe Token: SeDebugPrivilege 1824 b6d204cf96e004b32efbeaae6852962b_NeikiAnalytics.exe Token: SeDebugPrivilege 1824 b6d204cf96e004b32efbeaae6852962b_NeikiAnalytics.exe Token: SeDebugPrivilege 1824 b6d204cf96e004b32efbeaae6852962b_NeikiAnalytics.exe Token: SeDebugPrivilege 1824 b6d204cf96e004b32efbeaae6852962b_NeikiAnalytics.exe Token: SeDebugPrivilege 1824 b6d204cf96e004b32efbeaae6852962b_NeikiAnalytics.exe Token: SeDebugPrivilege 1824 b6d204cf96e004b32efbeaae6852962b_NeikiAnalytics.exe Token: SeDebugPrivilege 1824 b6d204cf96e004b32efbeaae6852962b_NeikiAnalytics.exe Token: SeDebugPrivilege 1824 b6d204cf96e004b32efbeaae6852962b_NeikiAnalytics.exe Token: SeDebugPrivilege 1824 b6d204cf96e004b32efbeaae6852962b_NeikiAnalytics.exe Token: SeDebugPrivilege 1824 b6d204cf96e004b32efbeaae6852962b_NeikiAnalytics.exe Token: SeDebugPrivilege 1824 b6d204cf96e004b32efbeaae6852962b_NeikiAnalytics.exe Token: SeDebugPrivilege 1824 b6d204cf96e004b32efbeaae6852962b_NeikiAnalytics.exe Token: SeDebugPrivilege 1824 b6d204cf96e004b32efbeaae6852962b_NeikiAnalytics.exe Token: SeDebugPrivilege 1824 b6d204cf96e004b32efbeaae6852962b_NeikiAnalytics.exe Token: SeDebugPrivilege 1824 b6d204cf96e004b32efbeaae6852962b_NeikiAnalytics.exe Token: SeDebugPrivilege 1824 b6d204cf96e004b32efbeaae6852962b_NeikiAnalytics.exe Token: SeDebugPrivilege 1824 b6d204cf96e004b32efbeaae6852962b_NeikiAnalytics.exe Token: SeDebugPrivilege 1824 b6d204cf96e004b32efbeaae6852962b_NeikiAnalytics.exe Token: SeDebugPrivilege 1824 b6d204cf96e004b32efbeaae6852962b_NeikiAnalytics.exe Token: SeDebugPrivilege 1824 b6d204cf96e004b32efbeaae6852962b_NeikiAnalytics.exe Token: SeDebugPrivilege 1824 b6d204cf96e004b32efbeaae6852962b_NeikiAnalytics.exe Token: SeDebugPrivilege 1824 b6d204cf96e004b32efbeaae6852962b_NeikiAnalytics.exe Token: SeDebugPrivilege 1824 b6d204cf96e004b32efbeaae6852962b_NeikiAnalytics.exe Token: SeDebugPrivilege 1824 b6d204cf96e004b32efbeaae6852962b_NeikiAnalytics.exe Token: SeDebugPrivilege 1824 b6d204cf96e004b32efbeaae6852962b_NeikiAnalytics.exe Token: SeDebugPrivilege 1824 b6d204cf96e004b32efbeaae6852962b_NeikiAnalytics.exe Token: SeDebugPrivilege 1824 b6d204cf96e004b32efbeaae6852962b_NeikiAnalytics.exe Token: SeDebugPrivilege 1824 b6d204cf96e004b32efbeaae6852962b_NeikiAnalytics.exe Token: SeDebugPrivilege 1824 b6d204cf96e004b32efbeaae6852962b_NeikiAnalytics.exe Token: SeDebugPrivilege 1824 b6d204cf96e004b32efbeaae6852962b_NeikiAnalytics.exe Token: SeDebugPrivilege 1824 b6d204cf96e004b32efbeaae6852962b_NeikiAnalytics.exe Token: SeDebugPrivilege 1824 b6d204cf96e004b32efbeaae6852962b_NeikiAnalytics.exe Token: SeDebugPrivilege 1824 b6d204cf96e004b32efbeaae6852962b_NeikiAnalytics.exe Token: SeDebugPrivilege 1824 b6d204cf96e004b32efbeaae6852962b_NeikiAnalytics.exe Token: SeDebugPrivilege 1824 b6d204cf96e004b32efbeaae6852962b_NeikiAnalytics.exe Token: SeDebugPrivilege 1824 b6d204cf96e004b32efbeaae6852962b_NeikiAnalytics.exe Token: SeDebugPrivilege 1824 b6d204cf96e004b32efbeaae6852962b_NeikiAnalytics.exe Token: SeDebugPrivilege 1824 b6d204cf96e004b32efbeaae6852962b_NeikiAnalytics.exe Token: SeDebugPrivilege 1824 b6d204cf96e004b32efbeaae6852962b_NeikiAnalytics.exe Token: SeDebugPrivilege 1824 b6d204cf96e004b32efbeaae6852962b_NeikiAnalytics.exe Token: SeDebugPrivilege 1824 b6d204cf96e004b32efbeaae6852962b_NeikiAnalytics.exe Token: SeDebugPrivilege 1824 b6d204cf96e004b32efbeaae6852962b_NeikiAnalytics.exe Token: SeDebugPrivilege 1824 b6d204cf96e004b32efbeaae6852962b_NeikiAnalytics.exe Token: SeDebugPrivilege 1824 b6d204cf96e004b32efbeaae6852962b_NeikiAnalytics.exe Token: SeDebugPrivilege 1824 b6d204cf96e004b32efbeaae6852962b_NeikiAnalytics.exe Token: SeDebugPrivilege 1824 b6d204cf96e004b32efbeaae6852962b_NeikiAnalytics.exe Token: SeDebugPrivilege 1824 b6d204cf96e004b32efbeaae6852962b_NeikiAnalytics.exe Token: SeDebugPrivilege 1824 b6d204cf96e004b32efbeaae6852962b_NeikiAnalytics.exe Token: SeDebugPrivilege 1824 b6d204cf96e004b32efbeaae6852962b_NeikiAnalytics.exe Token: SeDebugPrivilege 1824 b6d204cf96e004b32efbeaae6852962b_NeikiAnalytics.exe Token: SeDebugPrivilege 1824 b6d204cf96e004b32efbeaae6852962b_NeikiAnalytics.exe Token: SeDebugPrivilege 1824 b6d204cf96e004b32efbeaae6852962b_NeikiAnalytics.exe Token: SeDebugPrivilege 1824 b6d204cf96e004b32efbeaae6852962b_NeikiAnalytics.exe Token: SeDebugPrivilege 1824 b6d204cf96e004b32efbeaae6852962b_NeikiAnalytics.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
Processes:
b6d204cf96e004b32efbeaae6852962b_NeikiAnalytics.exeFun.exeSVIQ.EXEdc.exepid process 1824 b6d204cf96e004b32efbeaae6852962b_NeikiAnalytics.exe 1824 b6d204cf96e004b32efbeaae6852962b_NeikiAnalytics.exe 3404 Fun.exe 3404 Fun.exe 1092 SVIQ.EXE 1092 SVIQ.EXE 3916 dc.exe 3916 dc.exe -
Suspicious use of WriteProcessMemory 48 IoCs
Processes:
b6d204cf96e004b32efbeaae6852962b_NeikiAnalytics.exeFun.exedescription pid process target process PID 1824 wrote to memory of 748 1824 b6d204cf96e004b32efbeaae6852962b_NeikiAnalytics.exe fontdrvhost.exe PID 1824 wrote to memory of 752 1824 b6d204cf96e004b32efbeaae6852962b_NeikiAnalytics.exe fontdrvhost.exe PID 1824 wrote to memory of 1016 1824 b6d204cf96e004b32efbeaae6852962b_NeikiAnalytics.exe dwm.exe PID 1824 wrote to memory of 3060 1824 b6d204cf96e004b32efbeaae6852962b_NeikiAnalytics.exe sihost.exe PID 1824 wrote to memory of 2816 1824 b6d204cf96e004b32efbeaae6852962b_NeikiAnalytics.exe svchost.exe PID 1824 wrote to memory of 3108 1824 b6d204cf96e004b32efbeaae6852962b_NeikiAnalytics.exe taskhostw.exe PID 1824 wrote to memory of 3444 1824 b6d204cf96e004b32efbeaae6852962b_NeikiAnalytics.exe Explorer.EXE PID 1824 wrote to memory of 3548 1824 b6d204cf96e004b32efbeaae6852962b_NeikiAnalytics.exe svchost.exe PID 1824 wrote to memory of 3740 1824 b6d204cf96e004b32efbeaae6852962b_NeikiAnalytics.exe DllHost.exe PID 1824 wrote to memory of 3836 1824 b6d204cf96e004b32efbeaae6852962b_NeikiAnalytics.exe StartMenuExperienceHost.exe PID 1824 wrote to memory of 3900 1824 b6d204cf96e004b32efbeaae6852962b_NeikiAnalytics.exe RuntimeBroker.exe PID 1824 wrote to memory of 3980 1824 b6d204cf96e004b32efbeaae6852962b_NeikiAnalytics.exe SearchApp.exe PID 1824 wrote to memory of 2040 1824 b6d204cf96e004b32efbeaae6852962b_NeikiAnalytics.exe RuntimeBroker.exe PID 1824 wrote to memory of 4384 1824 b6d204cf96e004b32efbeaae6852962b_NeikiAnalytics.exe TextInputHost.exe PID 1824 wrote to memory of 3268 1824 b6d204cf96e004b32efbeaae6852962b_NeikiAnalytics.exe RuntimeBroker.exe PID 1824 wrote to memory of 3092 1824 b6d204cf96e004b32efbeaae6852962b_NeikiAnalytics.exe backgroundTaskHost.exe PID 1824 wrote to memory of 4844 1824 b6d204cf96e004b32efbeaae6852962b_NeikiAnalytics.exe backgroundTaskHost.exe PID 1824 wrote to memory of 3404 1824 b6d204cf96e004b32efbeaae6852962b_NeikiAnalytics.exe Fun.exe PID 1824 wrote to memory of 3404 1824 b6d204cf96e004b32efbeaae6852962b_NeikiAnalytics.exe Fun.exe PID 1824 wrote to memory of 3404 1824 b6d204cf96e004b32efbeaae6852962b_NeikiAnalytics.exe Fun.exe PID 3404 wrote to memory of 1092 3404 Fun.exe SVIQ.EXE PID 3404 wrote to memory of 1092 3404 Fun.exe SVIQ.EXE PID 3404 wrote to memory of 1092 3404 Fun.exe SVIQ.EXE PID 1824 wrote to memory of 3916 1824 b6d204cf96e004b32efbeaae6852962b_NeikiAnalytics.exe dc.exe PID 1824 wrote to memory of 3916 1824 b6d204cf96e004b32efbeaae6852962b_NeikiAnalytics.exe dc.exe PID 1824 wrote to memory of 3916 1824 b6d204cf96e004b32efbeaae6852962b_NeikiAnalytics.exe dc.exe PID 3404 wrote to memory of 748 3404 Fun.exe fontdrvhost.exe PID 3404 wrote to memory of 752 3404 Fun.exe fontdrvhost.exe PID 3404 wrote to memory of 1016 3404 Fun.exe dwm.exe PID 3404 wrote to memory of 3060 3404 Fun.exe sihost.exe PID 3404 wrote to memory of 2816 3404 Fun.exe svchost.exe PID 3404 wrote to memory of 3108 3404 Fun.exe taskhostw.exe PID 3404 wrote to memory of 3444 3404 Fun.exe Explorer.EXE PID 3404 wrote to memory of 3548 3404 Fun.exe svchost.exe PID 3404 wrote to memory of 3740 3404 Fun.exe DllHost.exe PID 3404 wrote to memory of 3836 3404 Fun.exe StartMenuExperienceHost.exe PID 3404 wrote to memory of 3900 3404 Fun.exe RuntimeBroker.exe PID 3404 wrote to memory of 3980 3404 Fun.exe SearchApp.exe PID 3404 wrote to memory of 2040 3404 Fun.exe RuntimeBroker.exe PID 3404 wrote to memory of 4384 3404 Fun.exe TextInputHost.exe PID 3404 wrote to memory of 3268 3404 Fun.exe RuntimeBroker.exe PID 3404 wrote to memory of 3092 3404 Fun.exe backgroundTaskHost.exe PID 3404 wrote to memory of 1092 3404 Fun.exe SVIQ.EXE PID 3404 wrote to memory of 1092 3404 Fun.exe SVIQ.EXE PID 3404 wrote to memory of 3916 3404 Fun.exe dc.exe PID 3404 wrote to memory of 3916 3404 Fun.exe dc.exe PID 3404 wrote to memory of 496 3404 Fun.exe RuntimeBroker.exe PID 3404 wrote to memory of 4232 3404 Fun.exe RuntimeBroker.exe -
System policy modification 1 TTPs 2 IoCs
Processes:
b6d204cf96e004b32efbeaae6852962b_NeikiAnalytics.exeFun.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" b6d204cf96e004b32efbeaae6852962b_NeikiAnalytics.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Fun.exe
Processes
-
C:\Windows\system32\fontdrvhost.exe"fontdrvhost.exe"1⤵PID:748
-
C:\Windows\system32\fontdrvhost.exe"fontdrvhost.exe"1⤵PID:752
-
C:\Windows\system32\dwm.exe"dwm.exe"1⤵PID:1016
-
C:\Windows\system32\sihost.exesihost.exe1⤵PID:3060
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc1⤵PID:2816
-
C:\Windows\system32\taskhostw.exetaskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}1⤵PID:3108
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3444
-
C:\Users\Admin\AppData\Local\Temp\b6d204cf96e004b32efbeaae6852962b_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\b6d204cf96e004b32efbeaae6852962b_NeikiAnalytics.exe"2⤵
- Modifies WinLogon for persistence
- Modifies firewall policy service
- UAC bypass
- Windows security bypass
- Windows security modification
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1824 -
C:\Windows\system\Fun.exeC:\Windows\system\Fun.exe3⤵
- Modifies WinLogon for persistence
- Modifies firewall policy service
- UAC bypass
- Windows security bypass
- Deletes itself
- Executes dropped EXE
- Windows security modification
- Adds Run key to start application
- Checks whether UAC is enabled
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:3404 -
C:\Windows\SVIQ.EXEC:\Windows\SVIQ.EXE4⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1092
-
-
-
C:\Windows\dc.exeC:\Windows\dc.exe3⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3916
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k ClipboardSvcGroup -p -s cbdhsvc1⤵PID:3548
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:3740
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵PID:3836
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:3900
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵PID:3980
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:2040
-
C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\InputApp\TextInputHost.exe"C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\InputApp\TextInputHost.exe" -ServerName:InputApp.AppX9jnwykgrccxc8by3hsrsh07r423xzvav.mca1⤵PID:4384
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:3268
-
C:\Windows\system32\backgroundTaskHost.exe"C:\Windows\system32\backgroundTaskHost.exe" -ServerName:CortanaUI.AppX3bn25b6f886wmg6twh46972vprk9tnbf.mca1⤵PID:3092
-
C:\Windows\system32\backgroundTaskHost.exe"C:\Windows\system32\backgroundTaskHost.exe" -ServerName:App.AppXmtcan0h2tfbfy7k9kn8hbxb6dmzz1zh0.mca1⤵PID:4844
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:496
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:4232
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
3Disable or Modify Tools
3Modify Registry
7Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152KB
MD5b6d204cf96e004b32efbeaae6852962b
SHA1549abe4a13e5aa2c6f78b2e5dce3408641568c96
SHA2566b4f87b48c72cb08688413039bed57be6882933ead00949e7d85f582a504f1e8
SHA512ed7293f46e23297876d176cfe97a9db4715f2328b5a505b129a39ff991ad9e6e9923453531c698cedc19db0aaf765c3510df2e074db0a42ea7191c22887b46f8
-
Filesize
257B
MD5d45f374ad2864e147cda9746ecec7411
SHA1bc52d781d3d75a24a408e2241e5fefccd67b833f
SHA2565f3c4553782153771f5ab4da20b392ba8a5877c27a01283f3cff2e34e34b4870
SHA512542ffea3a21405f26dee18d48ce2e9feab61823eb6482b2169e8d3c0c4711bdc40352701716490855a3d74e40c52f6ee67559def8112a82090eb637d535654b0
-
Filesize
41B
MD5e839977c0d22c9aa497b0b1d90d8a372
SHA1b5048e501399138796b38f3d3666e1a88c397e83
SHA256478db7f82fd7ef4860f7acd2f534ec303175500d7f4e1e36161d31c900d234e2
SHA5124c8ba5a26b6f738f8d25c32d019cee63e9a32d28e3aeb8fe31b965d7603c24a3539e469c8eb569747b47dadc9c43cdd1066ddb37ed8138bee5d0c74b5d0c275d
-
Filesize
100KB
MD5b5620c37c74c5169ff50b6f8e3be6414
SHA1215f44a10af373a581220521175661b4e13d79c8
SHA256e37776934bb6e126694877f13c311f3d7c1ad2720acdf4a5a9c902d51855b2c9
SHA512d003c01d12747dbc2b03de504a8586b6190eab292e7bbac1959374fde5a4f0731c7adb165981ba2aeb909f303278bc64f13a64dc853ac0bf3ffbcf49fefc4d2d