Analysis
-
max time kernel
149s -
max time network
134s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
20-05-2024 11:14
Static task
static1
Behavioral task
behavioral1
Sample
f1a2f89c9b672d215c0ab2c3120beae0_NeikiAnalytics.exe
Resource
win7-20240220-en
General
-
Target
f1a2f89c9b672d215c0ab2c3120beae0_NeikiAnalytics.exe
-
Size
4.1MB
-
MD5
f1a2f89c9b672d215c0ab2c3120beae0
-
SHA1
6d3c7d3fed9f75366705c8903909bdfdcc47e8de
-
SHA256
417a979223fdeecc4f3d956eb53476fd604458e845173efb9c6df5d2e9b7770e
-
SHA512
2d085f492679364daee78cc6a825e355d189c455fc5a311cfa79d4be843da6e65712dd76acb9c06074002d65cfa541b06a99c0e2da865302c43a9e47e427c5a5
-
SSDEEP
98304:nQx32Mq02zAeaet/0/YHlEVnWsL/fnVsJseCa8CK6QwXNx08FM:Qx32Mq02zAeLCVnWszfVfeCa8CLXv/m
Malware Config
Signatures
-
Glupteba payload 19 IoCs
resource yara_rule behavioral2/memory/4500-2-0x0000000004C40000-0x000000000552B000-memory.dmp family_glupteba behavioral2/memory/4500-3-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/4500-4-0x0000000000400000-0x0000000002B0D000-memory.dmp family_glupteba behavioral2/memory/4500-57-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/4500-58-0x0000000004C40000-0x000000000552B000-memory.dmp family_glupteba behavioral2/memory/4500-55-0x0000000000400000-0x0000000002B0D000-memory.dmp family_glupteba behavioral2/memory/1472-84-0x0000000000400000-0x0000000002B0D000-memory.dmp family_glupteba behavioral2/memory/1472-139-0x0000000000400000-0x0000000002B0D000-memory.dmp family_glupteba behavioral2/memory/3912-164-0x0000000000400000-0x0000000002B0D000-memory.dmp family_glupteba behavioral2/memory/3912-222-0x0000000000400000-0x0000000002B0D000-memory.dmp family_glupteba behavioral2/memory/3912-223-0x0000000000400000-0x0000000002B0D000-memory.dmp family_glupteba behavioral2/memory/3912-224-0x0000000000400000-0x0000000002B0D000-memory.dmp family_glupteba behavioral2/memory/3912-225-0x0000000000400000-0x0000000002B0D000-memory.dmp family_glupteba behavioral2/memory/3912-226-0x0000000000400000-0x0000000002B0D000-memory.dmp family_glupteba behavioral2/memory/3912-227-0x0000000000400000-0x0000000002B0D000-memory.dmp family_glupteba behavioral2/memory/3912-228-0x0000000000400000-0x0000000002B0D000-memory.dmp family_glupteba behavioral2/memory/3912-229-0x0000000000400000-0x0000000002B0D000-memory.dmp family_glupteba behavioral2/memory/3912-230-0x0000000000400000-0x0000000002B0D000-memory.dmp family_glupteba behavioral2/memory/3912-231-0x0000000000400000-0x0000000002B0D000-memory.dmp family_glupteba -
Modifies Windows Firewall 2 TTPs 1 IoCs
pid Process 2564 netsh.exe -
Executes dropped EXE 2 IoCs
pid Process 3912 csrss.exe 1128 injector.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" f1a2f89c9b672d215c0ab2c3120beae0_NeikiAnalytics.exe Set value (str) \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" csrss.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Manipulates WinMonFS driver. 1 IoCs
Roottkits write to WinMonFS to hide directories/files from being detected.
description ioc Process File opened for modification \??\WinMonFS csrss.exe -
Drops file in System32 directory 7 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe -
Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 1 IoCs
Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.
description ioc Process File opened (read-only) \??\VBoxMiniRdrDN f1a2f89c9b672d215c0ab2c3120beae0_NeikiAnalytics.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\rss f1a2f89c9b672d215c0ab2c3120beae0_NeikiAnalytics.exe File created C:\Windows\rss\csrss.exe f1a2f89c9b672d215c0ab2c3120beae0_NeikiAnalytics.exe -
pid Process 3612 powershell.exe 3104 powershell.exe 2480 powershell.exe 4424 powershell.exe 3528 powershell.exe 660 powershell.exe 4704 powershell.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 388 1472 WerFault.exe 107 -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4448 schtasks.exe 3332 schtasks.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-532 = "Sri Lanka Standard Time" f1a2f89c9b672d215c0ab2c3120beae0_NeikiAnalytics.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1412 = "Syria Standard Time" f1a2f89c9b672d215c0ab2c3120beae0_NeikiAnalytics.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-51 = "Greenland Daylight Time" f1a2f89c9b672d215c0ab2c3120beae0_NeikiAnalytics.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2872 = "Magallanes Standard Time" f1a2f89c9b672d215c0ab2c3120beae0_NeikiAnalytics.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-962 = "Paraguay Standard Time" f1a2f89c9b672d215c0ab2c3120beae0_NeikiAnalytics.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-842 = "Argentina Standard Time" f1a2f89c9b672d215c0ab2c3120beae0_NeikiAnalytics.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-731 = "Fiji Daylight Time" f1a2f89c9b672d215c0ab2c3120beae0_NeikiAnalytics.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2531 = "Chatham Islands Daylight Time" f1a2f89c9b672d215c0ab2c3120beae0_NeikiAnalytics.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-841 = "Argentina Daylight Time" f1a2f89c9b672d215c0ab2c3120beae0_NeikiAnalytics.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-672 = "AUS Eastern Standard Time" f1a2f89c9b672d215c0ab2c3120beae0_NeikiAnalytics.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2001 = "Cabo Verde Daylight Time" f1a2f89c9b672d215c0ab2c3120beae0_NeikiAnalytics.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-571 = "China Daylight Time" f1a2f89c9b672d215c0ab2c3120beae0_NeikiAnalytics.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-3141 = "South Sudan Daylight Time" f1a2f89c9b672d215c0ab2c3120beae0_NeikiAnalytics.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-181 = "Mountain Daylight Time (Mexico)" f1a2f89c9b672d215c0ab2c3120beae0_NeikiAnalytics.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-541 = "Myanmar Daylight Time" f1a2f89c9b672d215c0ab2c3120beae0_NeikiAnalytics.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-531 = "Sri Lanka Daylight Time" f1a2f89c9b672d215c0ab2c3120beae0_NeikiAnalytics.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2182 = "Astrakhan Standard Time" f1a2f89c9b672d215c0ab2c3120beae0_NeikiAnalytics.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1822 = "Russia TZ 1 Standard Time" f1a2f89c9b672d215c0ab2c3120beae0_NeikiAnalytics.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2511 = "Lord Howe Daylight Time" f1a2f89c9b672d215c0ab2c3120beae0_NeikiAnalytics.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-792 = "SA Western Standard Time" f1a2f89c9b672d215c0ab2c3120beae0_NeikiAnalytics.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2391 = "Aleutian Daylight Time" f1a2f89c9b672d215c0ab2c3120beae0_NeikiAnalytics.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2512 = "Lord Howe Standard Time" f1a2f89c9b672d215c0ab2c3120beae0_NeikiAnalytics.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-562 = "SE Asia Standard Time" f1a2f89c9b672d215c0ab2c3120beae0_NeikiAnalytics.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2392 = "Aleutian Standard Time" f1a2f89c9b672d215c0ab2c3120beae0_NeikiAnalytics.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2161 = "Altai Daylight Time" f1a2f89c9b672d215c0ab2c3120beae0_NeikiAnalytics.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1842 = "Russia TZ 4 Standard Time" f1a2f89c9b672d215c0ab2c3120beae0_NeikiAnalytics.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-211 = "Pacific Daylight Time" f1a2f89c9b672d215c0ab2c3120beae0_NeikiAnalytics.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-172 = "Central Standard Time (Mexico)" f1a2f89c9b672d215c0ab2c3120beae0_NeikiAnalytics.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-212 = "Pacific Standard Time" f1a2f89c9b672d215c0ab2c3120beae0_NeikiAnalytics.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-662 = "Cen. Australia Standard Time" f1a2f89c9b672d215c0ab2c3120beae0_NeikiAnalytics.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-282 = "Central Europe Standard Time" f1a2f89c9b672d215c0ab2c3120beae0_NeikiAnalytics.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-462 = "Afghanistan Standard Time" f1a2f89c9b672d215c0ab2c3120beae0_NeikiAnalytics.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-261 = "GMT Daylight Time" f1a2f89c9b672d215c0ab2c3120beae0_NeikiAnalytics.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-961 = "Paraguay Daylight Time" f1a2f89c9b672d215c0ab2c3120beae0_NeikiAnalytics.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-121 = "SA Pacific Daylight Time" f1a2f89c9b672d215c0ab2c3120beae0_NeikiAnalytics.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3528 powershell.exe 3528 powershell.exe 3528 powershell.exe 4500 f1a2f89c9b672d215c0ab2c3120beae0_NeikiAnalytics.exe 4500 f1a2f89c9b672d215c0ab2c3120beae0_NeikiAnalytics.exe 660 powershell.exe 660 powershell.exe 660 powershell.exe 1472 f1a2f89c9b672d215c0ab2c3120beae0_NeikiAnalytics.exe 1472 f1a2f89c9b672d215c0ab2c3120beae0_NeikiAnalytics.exe 1472 f1a2f89c9b672d215c0ab2c3120beae0_NeikiAnalytics.exe 1472 f1a2f89c9b672d215c0ab2c3120beae0_NeikiAnalytics.exe 1472 f1a2f89c9b672d215c0ab2c3120beae0_NeikiAnalytics.exe 1472 f1a2f89c9b672d215c0ab2c3120beae0_NeikiAnalytics.exe 1472 f1a2f89c9b672d215c0ab2c3120beae0_NeikiAnalytics.exe 1472 f1a2f89c9b672d215c0ab2c3120beae0_NeikiAnalytics.exe 1472 f1a2f89c9b672d215c0ab2c3120beae0_NeikiAnalytics.exe 1472 f1a2f89c9b672d215c0ab2c3120beae0_NeikiAnalytics.exe 4704 powershell.exe 4704 powershell.exe 4704 powershell.exe 3612 powershell.exe 3612 powershell.exe 3612 powershell.exe 3104 powershell.exe 3104 powershell.exe 3104 powershell.exe 2480 powershell.exe 2480 powershell.exe 2480 powershell.exe 4424 powershell.exe 4424 powershell.exe 4424 powershell.exe 1128 injector.exe 1128 injector.exe 1128 injector.exe 1128 injector.exe 1128 injector.exe 1128 injector.exe 1128 injector.exe 3912 csrss.exe 1128 injector.exe 3912 csrss.exe 1128 injector.exe 1128 injector.exe 1128 injector.exe 1128 injector.exe 3912 csrss.exe 3912 csrss.exe 1128 injector.exe 1128 injector.exe 1128 injector.exe 1128 injector.exe 1128 injector.exe 1128 injector.exe 1128 injector.exe 1128 injector.exe 1128 injector.exe 1128 injector.exe 1128 injector.exe 1128 injector.exe 1128 injector.exe 1128 injector.exe 1128 injector.exe -
Suspicious use of AdjustPrivilegeToken 10 IoCs
description pid Process Token: SeDebugPrivilege 3528 powershell.exe Token: SeDebugPrivilege 4500 f1a2f89c9b672d215c0ab2c3120beae0_NeikiAnalytics.exe Token: SeImpersonatePrivilege 4500 f1a2f89c9b672d215c0ab2c3120beae0_NeikiAnalytics.exe Token: SeDebugPrivilege 660 powershell.exe Token: SeDebugPrivilege 4704 powershell.exe Token: SeDebugPrivilege 3612 powershell.exe Token: SeDebugPrivilege 3104 powershell.exe Token: SeDebugPrivilege 2480 powershell.exe Token: SeDebugPrivilege 4424 powershell.exe Token: SeSystemEnvironmentPrivilege 3912 csrss.exe -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 4500 wrote to memory of 3528 4500 f1a2f89c9b672d215c0ab2c3120beae0_NeikiAnalytics.exe 103 PID 4500 wrote to memory of 3528 4500 f1a2f89c9b672d215c0ab2c3120beae0_NeikiAnalytics.exe 103 PID 4500 wrote to memory of 3528 4500 f1a2f89c9b672d215c0ab2c3120beae0_NeikiAnalytics.exe 103 PID 1472 wrote to memory of 660 1472 f1a2f89c9b672d215c0ab2c3120beae0_NeikiAnalytics.exe 108 PID 1472 wrote to memory of 660 1472 f1a2f89c9b672d215c0ab2c3120beae0_NeikiAnalytics.exe 108 PID 1472 wrote to memory of 660 1472 f1a2f89c9b672d215c0ab2c3120beae0_NeikiAnalytics.exe 108 PID 1472 wrote to memory of 2028 1472 f1a2f89c9b672d215c0ab2c3120beae0_NeikiAnalytics.exe 110 PID 1472 wrote to memory of 2028 1472 f1a2f89c9b672d215c0ab2c3120beae0_NeikiAnalytics.exe 110 PID 2028 wrote to memory of 2564 2028 cmd.exe 112 PID 2028 wrote to memory of 2564 2028 cmd.exe 112 PID 1472 wrote to memory of 4704 1472 f1a2f89c9b672d215c0ab2c3120beae0_NeikiAnalytics.exe 114 PID 1472 wrote to memory of 4704 1472 f1a2f89c9b672d215c0ab2c3120beae0_NeikiAnalytics.exe 114 PID 1472 wrote to memory of 4704 1472 f1a2f89c9b672d215c0ab2c3120beae0_NeikiAnalytics.exe 114 PID 1472 wrote to memory of 3612 1472 f1a2f89c9b672d215c0ab2c3120beae0_NeikiAnalytics.exe 116 PID 1472 wrote to memory of 3612 1472 f1a2f89c9b672d215c0ab2c3120beae0_NeikiAnalytics.exe 116 PID 1472 wrote to memory of 3612 1472 f1a2f89c9b672d215c0ab2c3120beae0_NeikiAnalytics.exe 116 PID 1472 wrote to memory of 3912 1472 f1a2f89c9b672d215c0ab2c3120beae0_NeikiAnalytics.exe 119 PID 1472 wrote to memory of 3912 1472 f1a2f89c9b672d215c0ab2c3120beae0_NeikiAnalytics.exe 119 PID 1472 wrote to memory of 3912 1472 f1a2f89c9b672d215c0ab2c3120beae0_NeikiAnalytics.exe 119 PID 3912 wrote to memory of 3104 3912 csrss.exe 123 PID 3912 wrote to memory of 3104 3912 csrss.exe 123 PID 3912 wrote to memory of 3104 3912 csrss.exe 123 PID 3912 wrote to memory of 2480 3912 csrss.exe 129 PID 3912 wrote to memory of 2480 3912 csrss.exe 129 PID 3912 wrote to memory of 2480 3912 csrss.exe 129 PID 3912 wrote to memory of 4424 3912 csrss.exe 131 PID 3912 wrote to memory of 4424 3912 csrss.exe 131 PID 3912 wrote to memory of 4424 3912 csrss.exe 131 PID 3912 wrote to memory of 1128 3912 csrss.exe 133 PID 3912 wrote to memory of 1128 3912 csrss.exe 133 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\f1a2f89c9b672d215c0ab2c3120beae0_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\f1a2f89c9b672d215c0ab2c3120beae0_NeikiAnalytics.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4500 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3528
-
-
C:\Users\Admin\AppData\Local\Temp\f1a2f89c9b672d215c0ab2c3120beae0_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\f1a2f89c9b672d215c0ab2c3120beae0_NeikiAnalytics.exe"2⤵
- Adds Run key to start application
- Checks for VirtualBox DLLs, possible anti-VM trick
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1472 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Drops file in System32 directory
- Command and Scripting Interpreter: PowerShell
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:660
-
-
C:\Windows\system32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"3⤵
- Suspicious use of WriteProcessMemory
PID:2028 -
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes4⤵
- Modifies Windows Firewall
PID:2564
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Drops file in System32 directory
- Command and Scripting Interpreter: PowerShell
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4704
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Drops file in System32 directory
- Command and Scripting Interpreter: PowerShell
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3612
-
-
C:\Windows\rss\csrss.exeC:\Windows\rss\csrss.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Manipulates WinMonFS driver.
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3912 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Command and Scripting Interpreter: PowerShell
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3104
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F4⤵
- Creates scheduled task(s)
PID:4448
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /delete /tn ScheduledUpdate /f4⤵PID:3284
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Command and Scripting Interpreter: PowerShell
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2480
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Command and Scripting Interpreter: PowerShell
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4424
-
-
C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exeC:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:1128
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F4⤵
- Creates scheduled task(s)
PID:3332
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1472 -s 8683⤵
- Program crash
PID:388
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --field-trial-handle=3144,i,1697479186275492802,18058102846092193784,262144 --variations-seed-version --mojo-platform-channel-handle=3744 /prefetch:81⤵PID:5084
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 1472 -ip 14721⤵PID:4476
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
281KB
MD5d98e33b66343e7c96158444127a117f6
SHA1bb716c5509a2bf345c6c1152f6e3e1452d39d50d
SHA2565de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1
SHA512705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log
Filesize2KB
MD53d086a433708053f9bf9523e1d87a4e8
SHA1b3ab5d4f282a4c8fe8c3005b8a557ed5a0e37f28
SHA2566f8fd1b8d9788ad54eaeee329232187e24b7b43393a01aeba2d6e9675231fb69
SHA512931ae42b4c68a4507ff2342332b08eb407050d47cf4176137ea022d0f6e513c689e998445a04c6d18d4877391705c586bfce0234632b898d41aaed0957996dfd
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5cc1d9cac825fe46da831cd6a27652baf
SHA1d728e6c5d3df6d3edeb320f7c71c665b438018cb
SHA256a217b750365f0d34619c7a875019f9d451dfac039288a6af394b8376f6baa510
SHA5121033a5939126942047dda438f48f723439c08e1a73c8aa21e41ae936f7ffddf24cd89898d2ddf08bdd699194497034a152deafac2fac8306cc6095121e232105
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5550f12bb458988c3787f956130cef826
SHA1e80ed4d01d9b65ce30cca32c5b3952b535cf7cf0
SHA256ffdc1ded529800b2380253cf2eac573e2498894f5c25faf94255b3616260793f
SHA5128a40ebb480c784f27f88b2c17aec59c6812846fad71dd7f07e5cbe11756cee950fa57fc820b227850d108e554237908a89d4a88d848661fe23ecb2aa9aa055a3
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5dd308f0e332b5b67e349ae40d13175a5
SHA1cad74051dfa9896723142af94f76b25c4629f08c
SHA2562ed53c05582b1059a6473d05682a81b6f7aca4e74247e9a4cd73fce28bb9631d
SHA5120f456831b2d46bbc12a3e9d826e561a511b4d8ed786b2dcf56386879c3ac83b2c64654c1552f667a6ffab29240ee9a75550f6b117bf2f77f7ff2eb66285aa54e
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD58cffb136fca4241a302e9f053f924779
SHA1accb13cb656db7487c825ca4bb26392e150af4a9
SHA25672e4db41d607668cd58fb41c1bd95dd371d427722ae7557553ed0942fd1d3d89
SHA512e009d68637134abb4820cdc1f6f68e56a3581e8fbc6eb4e16b29c542ec99d99725220e7cb741fb11315bac82c76413f8b63874badb12adab8eb4d018788d3e57
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD581ec68bc1c05da59ca63c30b3868b39d
SHA14d7e83efb190ae13c5d6209ff80038317bfec0cc
SHA25654fdee88ba46836f47262c9c78fe3a17aa97db007eb2175686f5b319311722fa
SHA51287cc1eeaf37802e6e7a29fc7088952dcd3b658648e9ac3062ac1a5ad233c24694009b543bc782f43f83527ce99a27a3f795d2cfac50b498b518f3b225a829611
-
Filesize
4.1MB
MD5f1a2f89c9b672d215c0ab2c3120beae0
SHA16d3c7d3fed9f75366705c8903909bdfdcc47e8de
SHA256417a979223fdeecc4f3d956eb53476fd604458e845173efb9c6df5d2e9b7770e
SHA5122d085f492679364daee78cc6a825e355d189c455fc5a311cfa79d4be843da6e65712dd76acb9c06074002d65cfa541b06a99c0e2da865302c43a9e47e427c5a5