Analysis

  • max time kernel
    150s
  • max time network
    139s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19/05/2024, 21:22

General

  • Target

    3d0a6776666a1592b5507af8aa8d4650_NeikiAnalytics.exe

  • Size

    135KB

  • MD5

    3d0a6776666a1592b5507af8aa8d4650

  • SHA1

    afabb2f6d222caaa6a243d4865c49fdf5d888957

  • SHA256

    9ba8ab14309293608264f5bfb08411bc3400e52db5cc0fbbd1f7597ba51be5a7

  • SHA512

    bfa8ffc3622a1bdca1de00f09ebc510be0e4af8a19bfc2552e5e20a552197c7625de7b69966ec2b05e87764e3122ee671d254eea58c5b605682d261d4c62b45f

  • SSDEEP

    1536:UfsEqouTRcG/Mzvgf7xEuvnXNTRdUzwTekUOisZ1yDDajtXbV5dQ:UVqoCl/YgjxEufVU0TbTyDDal7dQ

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 4 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Drops file in System32 directory 2 IoCs
  • Drops file in Windows directory 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 2 IoCs
  • Suspicious use of SetWindowsHookEx 10 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3d0a6776666a1592b5507af8aa8d4650_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\3d0a6776666a1592b5507af8aa8d4650_NeikiAnalytics.exe"
    1⤵
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4596
    • \??\c:\windows\resources\themes\explorer.exe
      c:\windows\resources\themes\explorer.exe
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Drops file in System32 directory
      • Drops file in Windows directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:4436
      • \??\c:\windows\resources\spoolsv.exe
        c:\windows\resources\spoolsv.exe SE
        3⤵
        • Executes dropped EXE
        • Drops file in Windows directory
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2948
        • \??\c:\windows\resources\svchost.exe
          c:\windows\resources\svchost.exe
          4⤵
          • Modifies visiblity of hidden/system files in Explorer
          • Executes dropped EXE
          • Adds Run key to start application
          • Drops file in System32 directory
          • Suspicious behavior: GetForegroundWindowSpam
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:4952
          • \??\c:\windows\resources\spoolsv.exe
            c:\windows\resources\spoolsv.exe PR
            5⤵
            • Executes dropped EXE
            • Suspicious use of SetWindowsHookEx
            PID:3372

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\Resources\Themes\explorer.exe

    Filesize

    135KB

    MD5

    5ef6cfe57b70de8a86f19b5c6328652a

    SHA1

    993ab0d04dec871c890e63b40e9c5eaba0d6a584

    SHA256

    ddc075e64f9cc5cdb4c55be4d0d440ccb1c0023be174fe8c48f699eea8c7d26d

    SHA512

    1d99c6c7041d578a21435a787f21e00c68c932168996fb7addfa728effe8e471856c978f4cf2f55be330a81f0766d2dc7fb31749dc0abf7a6f9a5fbb922e034e

  • C:\Windows\Resources\spoolsv.exe

    Filesize

    135KB

    MD5

    add4d8a09f837920cb8030bb486272bd

    SHA1

    9996c90a797aab9fdfd85fa36d2a3a142abe7896

    SHA256

    424d6d009d5feb73aa20df50c5e403d33a22c9b7cc10db4854222fe8ec122af2

    SHA512

    77bb414ba95f4267befe1cec368cb9d11284c79294cbcf13a59458b8a23b050ed44e6bdae7ceecdd6daa461c6e437f6f2a75bebee6850c4727060b1ae51b0b04

  • C:\Windows\Resources\svchost.exe

    Filesize

    135KB

    MD5

    abc32deed4ea4a9e7166098a6f31d80f

    SHA1

    08d951c997bbe2f1ec5ccf833fbe849605097cd2

    SHA256

    10e4e557dd2aaa17445c720dae587518ae702da2f562997690d27a7dea0ef4ae

    SHA512

    2fe063c8b7970160e11a621d4def5363203d2f076beb8f97deca5a7dc920e177274417555a42c506c2f4ad89ba3a2fa5561c72c4c311f2c5dc5a4f5d41548446

  • memory/2948-17-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/2948-34-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/3372-33-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/4596-0-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/4596-35-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB