Analysis

  • max time kernel
    150s
  • max time network
    102s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20-05-2024 10:48

General

  • Target

    ec8be5cdde4517148643db5db9e369e0_NeikiAnalytics.exe

  • Size

    1.2MB

  • MD5

    ec8be5cdde4517148643db5db9e369e0

  • SHA1

    be7ac26962777255857076071c2ccbf08fdebaac

  • SHA256

    089466f082e5ee62814b7c80ff414da0d1f4aa45ed2e95f9c5890c084097dc69

  • SHA512

    c2cb465697e217fce62f38862f4ead2a3ac190109e5cece194bb8c7ca12f5e95d8e6a0ee24d9c37981c2ab485692f756119b92dbd33a56ab49e827cfc9872932

  • SSDEEP

    24576:9j+cktriK2PVboYTicnT1SBb//wDKULTrhSFkOTu+FMu:0SPVboYTVABjRGtSFruNu

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 4 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Drops file in System32 directory 2 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 35 IoCs
  • Drops file in Windows directory 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 2 IoCs
  • Suspicious use of SetWindowsHookEx 15 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ec8be5cdde4517148643db5db9e369e0_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\ec8be5cdde4517148643db5db9e369e0_NeikiAnalytics.exe"
    1⤵
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4520
    • \??\c:\windows\resources\themes\explorer.exe
      c:\windows\resources\themes\explorer.exe
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Drops file in System32 directory
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Drops file in Windows directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2840
      • \??\c:\windows\resources\spoolsv.exe
        c:\windows\resources\spoolsv.exe SE
        3⤵
        • Executes dropped EXE
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • Drops file in Windows directory
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:4704
        • \??\c:\windows\resources\svchost.exe
          c:\windows\resources\svchost.exe
          4⤵
          • Modifies visiblity of hidden/system files in Explorer
          • Executes dropped EXE
          • Adds Run key to start application
          • Drops file in System32 directory
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • Suspicious behavior: GetForegroundWindowSpam
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:2564
          • \??\c:\windows\resources\spoolsv.exe
            c:\windows\resources\spoolsv.exe PR
            5⤵
            • Executes dropped EXE
            • Suspicious use of NtSetInformationThreadHideFromDebugger
            • Suspicious use of SetWindowsHookEx
            PID:5052

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\Resources\Themes\explorer.exe

    Filesize

    1.2MB

    MD5

    62818994b42689b675a246f0b36fe39b

    SHA1

    ad4cca036bd225306b58b202abcddc6158061df0

    SHA256

    1b971dac3eed4c8d6a77ea847ab30000bbf8a88e43b8f5525c7214406c58a27d

    SHA512

    8c5de12958f640f8a0570c479128b664d6c968f72444c95272fc4e309605c98f3638d89a204f567f85a594be87b56b1cccd962ca4270ea67083ce55fd1ad482a

  • C:\Windows\Resources\spoolsv.exe

    Filesize

    1.2MB

    MD5

    66dae5e412513d1b11bb19815b303c56

    SHA1

    e4516f2a0c2d7460ed5a369d1da28c5783f27b9c

    SHA256

    39cddc906be1081bbabaf20e0cec8c14bca0802a692153894f95f51ab97a9261

    SHA512

    209d403d381331797b9718ca4de3c27798b5cbcec11b26472221b631bcb18e340eafa443535b6b8c4fc113b8d51cdaf177f263ff086aa58bd81eb3f100aa19f2

  • \??\c:\windows\resources\svchost.exe

    Filesize

    1.2MB

    MD5

    3ea828c74308b07595863d2a4a5a3d30

    SHA1

    062b36d4d9589cad73b4f7a44a1b98a88e6444dc

    SHA256

    8d93c2c635fcc05db944560ee423ba34d9a3c2020a5318279fd0e6627bb93b33

    SHA512

    14d1f2bbddb9a2e5863e1a1180dedd9594d33b27adea4df4f7759b5ad34fc5934b957ce1afa8af8dae52be779aa8bd42112d21dce27984eb96057f938d2b9afd

  • memory/2564-61-0x0000000000400000-0x0000000000793000-memory.dmp

    Filesize

    3.6MB

  • memory/2564-57-0x0000000000400000-0x0000000000793000-memory.dmp

    Filesize

    3.6MB

  • memory/2564-69-0x0000000000400000-0x0000000000793000-memory.dmp

    Filesize

    3.6MB

  • memory/2564-27-0x0000000000400000-0x0000000000793000-memory.dmp

    Filesize

    3.6MB

  • memory/2564-65-0x0000000000400000-0x0000000000793000-memory.dmp

    Filesize

    3.6MB

  • memory/2564-49-0x0000000000400000-0x0000000000793000-memory.dmp

    Filesize

    3.6MB

  • memory/2564-59-0x0000000000400000-0x0000000000793000-memory.dmp

    Filesize

    3.6MB

  • memory/2564-67-0x0000000000400000-0x0000000000793000-memory.dmp

    Filesize

    3.6MB

  • memory/2564-55-0x0000000000400000-0x0000000000793000-memory.dmp

    Filesize

    3.6MB

  • memory/2564-43-0x0000000000400000-0x0000000000793000-memory.dmp

    Filesize

    3.6MB

  • memory/2564-53-0x0000000000400000-0x0000000000793000-memory.dmp

    Filesize

    3.6MB

  • memory/2564-45-0x0000000000400000-0x0000000000793000-memory.dmp

    Filesize

    3.6MB

  • memory/2564-51-0x0000000000400000-0x0000000000793000-memory.dmp

    Filesize

    3.6MB

  • memory/2564-47-0x0000000000400000-0x0000000000793000-memory.dmp

    Filesize

    3.6MB

  • memory/2840-58-0x0000000000400000-0x0000000000793000-memory.dmp

    Filesize

    3.6MB

  • memory/2840-54-0x0000000000400000-0x0000000000793000-memory.dmp

    Filesize

    3.6MB

  • memory/2840-50-0x0000000000400000-0x0000000000793000-memory.dmp

    Filesize

    3.6MB

  • memory/2840-46-0x0000000000400000-0x0000000000793000-memory.dmp

    Filesize

    3.6MB

  • memory/2840-52-0x0000000000400000-0x0000000000793000-memory.dmp

    Filesize

    3.6MB

  • memory/2840-44-0x0000000000400000-0x0000000000793000-memory.dmp

    Filesize

    3.6MB

  • memory/2840-42-0x0000000000400000-0x0000000000793000-memory.dmp

    Filesize

    3.6MB

  • memory/2840-64-0x0000000000400000-0x0000000000793000-memory.dmp

    Filesize

    3.6MB

  • memory/2840-56-0x0000000000400000-0x0000000000793000-memory.dmp

    Filesize

    3.6MB

  • memory/2840-9-0x0000000000400000-0x0000000000793000-memory.dmp

    Filesize

    3.6MB

  • memory/2840-68-0x0000000000400000-0x0000000000793000-memory.dmp

    Filesize

    3.6MB

  • memory/2840-48-0x0000000000400000-0x0000000000793000-memory.dmp

    Filesize

    3.6MB

  • memory/2840-60-0x0000000000400000-0x0000000000793000-memory.dmp

    Filesize

    3.6MB

  • memory/2840-66-0x0000000000400000-0x0000000000793000-memory.dmp

    Filesize

    3.6MB

  • memory/2840-62-0x0000000000400000-0x0000000000793000-memory.dmp

    Filesize

    3.6MB

  • memory/4520-41-0x0000000000400000-0x0000000000793000-memory.dmp

    Filesize

    3.6MB

  • memory/4520-0-0x0000000000400000-0x0000000000793000-memory.dmp

    Filesize

    3.6MB

  • memory/4704-18-0x0000000000400000-0x0000000000793000-memory.dmp

    Filesize

    3.6MB

  • memory/4704-39-0x0000000000400000-0x0000000000793000-memory.dmp

    Filesize

    3.6MB

  • memory/5052-32-0x0000000000400000-0x0000000000793000-memory.dmp

    Filesize

    3.6MB

  • memory/5052-38-0x0000000000400000-0x0000000000793000-memory.dmp

    Filesize

    3.6MB