Analysis
-
max time kernel
121s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
21/05/2024, 07:49
Behavioral task
behavioral1
Sample
1d965887e2033a596346a7cca9f9aa563807be0265c02d471193c7859d7bb4df_NeikiAnalytics.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
1d965887e2033a596346a7cca9f9aa563807be0265c02d471193c7859d7bb4df_NeikiAnalytics.exe
Resource
win10v2004-20240426-en
General
-
Target
1d965887e2033a596346a7cca9f9aa563807be0265c02d471193c7859d7bb4df_NeikiAnalytics.exe
-
Size
352KB
-
MD5
f9a1151475a7d5624c55de91bb7c6060
-
SHA1
f7a6c0c5239b9503795d97e0059a5583cc57d73f
-
SHA256
1d965887e2033a596346a7cca9f9aa563807be0265c02d471193c7859d7bb4df
-
SHA512
b651c14b55b3a415f0c90e5be572534a3fec226be36e9b73157fa7e358601e7356720c01d2ddaa9ac6e443b660f6e9b76074f07fc5818ced2f92733a1dfd099b
-
SSDEEP
6144:vIGEnprZkRs38t54c6rzNdf3IGEnprZkRs38t54c6rzAdfl:vxEnAR934LxEnAR934I
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 12 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe \"C:\\Windows\\system32\\Shell.exe\"" CSRSS.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe \"C:\\Windows\\system32\\Shell.exe\"" SERVICES.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\Shell.exe" SERVICES.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe \"C:\\Windows\\system32\\Shell.exe\"" SMSS.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe \"C:\\Windows\\system32\\Shell.exe\"" 1d965887e2033a596346a7cca9f9aa563807be0265c02d471193c7859d7bb4df_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe \"C:\\Windows\\system32\\Shell.exe\"" WlNLOGON.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\Shell.exe" WlNLOGON.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe \"C:\\Windows\\system32\\Shell.exe\"" Shell.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\Shell.exe" 1d965887e2033a596346a7cca9f9aa563807be0265c02d471193c7859d7bb4df_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\Shell.exe" Shell.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\Shell.exe" CSRSS.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\Shell.exe" SMSS.EXE -
Modifies visibility of file extensions in Explorer 2 TTPs 6 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" 1d965887e2033a596346a7cca9f9aa563807be0265c02d471193c7859d7bb4df_NeikiAnalytics.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" WlNLOGON.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Shell.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" CSRSS.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" SERVICES.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" SMSS.EXE -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 6 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 1d965887e2033a596346a7cca9f9aa563807be0265c02d471193c7859d7bb4df_NeikiAnalytics.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" WlNLOGON.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" Shell.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" CSRSS.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" SERVICES.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" SMSS.EXE -
Disables use of System Restore points 1 TTPs
-
Drops file in Drivers directory 1 IoCs
description ioc Process File opened for modification C:\Windows\system32\drivers\etc\hosts 1d965887e2033a596346a7cca9f9aa563807be0265c02d471193c7859d7bb4df_NeikiAnalytics.exe -
Executes dropped EXE 5 IoCs
pid Process 2788 WlNLOGON.EXE 2536 Shell.exe 2356 CSRSS.EXE 2564 SERVICES.EXE 888 SMSS.EXE -
Loads dropped DLL 8 IoCs
pid Process 1244 1d965887e2033a596346a7cca9f9aa563807be0265c02d471193c7859d7bb4df_NeikiAnalytics.exe 1244 1d965887e2033a596346a7cca9f9aa563807be0265c02d471193c7859d7bb4df_NeikiAnalytics.exe 1244 1d965887e2033a596346a7cca9f9aa563807be0265c02d471193c7859d7bb4df_NeikiAnalytics.exe 1244 1d965887e2033a596346a7cca9f9aa563807be0265c02d471193c7859d7bb4df_NeikiAnalytics.exe 1244 1d965887e2033a596346a7cca9f9aa563807be0265c02d471193c7859d7bb4df_NeikiAnalytics.exe 1244 1d965887e2033a596346a7cca9f9aa563807be0265c02d471193c7859d7bb4df_NeikiAnalytics.exe 1244 1d965887e2033a596346a7cca9f9aa563807be0265c02d471193c7859d7bb4df_NeikiAnalytics.exe 1244 1d965887e2033a596346a7cca9f9aa563807be0265c02d471193c7859d7bb4df_NeikiAnalytics.exe -
Modifies system executable filetype association 2 TTPs 62 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command SERVICES.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" SERVICES.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command SERVICES.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" SMSS.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" WlNLOGON.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" WlNLOGON.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command Shell.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" Shell.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" CSRSS.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" SMSS.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command 1d965887e2033a596346a7cca9f9aa563807be0265c02d471193c7859d7bb4df_NeikiAnalytics.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell 1d965887e2033a596346a7cca9f9aa563807be0265c02d471193c7859d7bb4df_NeikiAnalytics.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command 1d965887e2033a596346a7cca9f9aa563807be0265c02d471193c7859d7bb4df_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 1d965887e2033a596346a7cca9f9aa563807be0265c02d471193c7859d7bb4df_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" SERVICES.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command Shell.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command SERVICES.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command SMSS.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 1d965887e2033a596346a7cca9f9aa563807be0265c02d471193c7859d7bb4df_NeikiAnalytics.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command SMSS.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command SMSS.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" SMSS.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command SERVICES.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" SERVICES.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" SERVICES.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open 1d965887e2033a596346a7cca9f9aa563807be0265c02d471193c7859d7bb4df_NeikiAnalytics.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command 1d965887e2033a596346a7cca9f9aa563807be0265c02d471193c7859d7bb4df_NeikiAnalytics.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command WlNLOGON.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command Shell.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" CSRSS.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" SERVICES.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command WlNLOGON.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command CSRSS.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command CSRSS.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 1d965887e2033a596346a7cca9f9aa563807be0265c02d471193c7859d7bb4df_NeikiAnalytics.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command WlNLOGON.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command Shell.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" WlNLOGON.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" Shell.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" CSRSS.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" SMSS.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" WlNLOGON.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command WlNLOGON.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command WlNLOGON.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command SERVICES.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command SMSS.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" WlNLOGON.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 1d965887e2033a596346a7cca9f9aa563807be0265c02d471193c7859d7bb4df_NeikiAnalytics.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command 1d965887e2033a596346a7cca9f9aa563807be0265c02d471193c7859d7bb4df_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" CSRSS.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" Shell.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command Shell.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" Shell.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" CSRSS.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command CSRSS.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command CSRSS.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command SMSS.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 1d965887e2033a596346a7cca9f9aa563807be0265c02d471193c7859d7bb4df_NeikiAnalytics.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command 1d965887e2033a596346a7cca9f9aa563807be0265c02d471193c7859d7bb4df_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" Shell.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command CSRSS.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" SMSS.EXE -
resource yara_rule behavioral1/memory/1244-0-0x0000000000400000-0x00000000004AA000-memory.dmp upx behavioral1/files/0x000a000000015d13-12.dat upx behavioral1/files/0x0006000000016c4a-92.dat upx behavioral1/memory/2788-97-0x0000000000400000-0x00000000004AA000-memory.dmp upx behavioral1/files/0x0006000000016c67-98.dat upx behavioral1/memory/1244-99-0x0000000003850000-0x00000000038FA000-memory.dmp upx behavioral1/files/0x0006000000016d05-108.dat upx behavioral1/files/0x0006000000016d1a-117.dat upx behavioral1/memory/1244-124-0x0000000000400000-0x00000000004AA000-memory.dmp upx behavioral1/files/0x0006000000016d22-127.dat upx behavioral1/memory/2788-133-0x0000000000400000-0x00000000004AA000-memory.dmp upx behavioral1/memory/2356-461-0x0000000000400000-0x00000000004AA000-memory.dmp upx behavioral1/memory/2536-150-0x0000000000400000-0x00000000004AA000-memory.dmp upx behavioral1/memory/2788-147-0x0000000000400000-0x00000000004AA000-memory.dmp upx behavioral1/memory/2564-543-0x0000000000400000-0x00000000004AA000-memory.dmp upx behavioral1/memory/888-544-0x0000000000400000-0x00000000004AA000-memory.dmp upx behavioral1/memory/1244-537-0x0000000000400000-0x00000000004AA000-memory.dmp upx -
Adds Run key to start application 2 TTPs 24 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\LogonAdmin = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\CSRSS.EXE" SMSS.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\System Monitoring = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\SMSS.EXE" WlNLOGON.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\LogonAdmin = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\CSRSS.EXE" CSRSS.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\System Monitoring = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\SMSS.EXE" CSRSS.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Run\Depkominfo = "C:\\Windows\\WlNLOGON.EXE" SMSS.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Run\ServiceAdmin = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\SERVICES.EXE" SMSS.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Run\Depkominfo = "C:\\Windows\\WlNLOGON.EXE" CSRSS.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Run\ServiceAdmin = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\SERVICES.EXE" SERVICES.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Run\Depkominfo = "C:\\Windows\\WlNLOGON.EXE" 1d965887e2033a596346a7cca9f9aa563807be0265c02d471193c7859d7bb4df_NeikiAnalytics.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Run\ServiceAdmin = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\SERVICES.EXE" 1d965887e2033a596346a7cca9f9aa563807be0265c02d471193c7859d7bb4df_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\System Monitoring = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\SMSS.EXE" 1d965887e2033a596346a7cca9f9aa563807be0265c02d471193c7859d7bb4df_NeikiAnalytics.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Run\Depkominfo = "C:\\Windows\\WlNLOGON.EXE" WlNLOGON.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Run\ServiceAdmin = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\SERVICES.EXE" Shell.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\LogonAdmin = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\CSRSS.EXE" SERVICES.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\System Monitoring = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\SMSS.EXE" SERVICES.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Run\ServiceAdmin = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\SERVICES.EXE" WlNLOGON.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Run\Depkominfo = "C:\\Windows\\WlNLOGON.EXE" Shell.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\System Monitoring = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\SMSS.EXE" Shell.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Run\ServiceAdmin = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\SERVICES.EXE" CSRSS.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Run\Depkominfo = "C:\\Windows\\WlNLOGON.EXE" SERVICES.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\LogonAdmin = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\CSRSS.EXE" 1d965887e2033a596346a7cca9f9aa563807be0265c02d471193c7859d7bb4df_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\LogonAdmin = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\CSRSS.EXE" WlNLOGON.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\LogonAdmin = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\CSRSS.EXE" Shell.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\System Monitoring = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\SMSS.EXE" SMSS.EXE -
Drops desktop.ini file(s) 2 IoCs
description ioc Process File opened for modification C:\Windows\Desktop.ini 1d965887e2033a596346a7cca9f9aa563807be0265c02d471193c7859d7bb4df_NeikiAnalytics.exe File created C:\Windows\Desktop.ini 1d965887e2033a596346a7cca9f9aa563807be0265c02d471193c7859d7bb4df_NeikiAnalytics.exe -
Drops file in System32 directory 14 IoCs
description ioc Process File created C:\Windows\SysWOW64\OEMLOGO.BMP 1d965887e2033a596346a7cca9f9aa563807be0265c02d471193c7859d7bb4df_NeikiAnalytics.exe File opened for modification C:\Windows\SysWOW64\msvbvm60.dll SERVICES.EXE File opened for modification C:\Windows\SysWOW64\msvbvm60.dll SMSS.EXE File created C:\Windows\SysWOW64\OEMINFO.ini 1d965887e2033a596346a7cca9f9aa563807be0265c02d471193c7859d7bb4df_NeikiAnalytics.exe File created C:\Windows\SysWOW64\shell.exe 1d965887e2033a596346a7cca9f9aa563807be0265c02d471193c7859d7bb4df_NeikiAnalytics.exe File opened for modification C:\Windows\SysWOW64\msvbvm60.dll WlNLOGON.EXE File created C:\Windows\SysWOW64\Telematika.scr 1d965887e2033a596346a7cca9f9aa563807be0265c02d471193c7859d7bb4df_NeikiAnalytics.exe File opened for modification C:\Windows\SysWOW64\Telematika.scr 1d965887e2033a596346a7cca9f9aa563807be0265c02d471193c7859d7bb4df_NeikiAnalytics.exe File opened for modification C:\Windows\SysWOW64\OEMLOGO.BMP SMSS.EXE File opened for modification C:\Windows\SysWOW64\OEMINFO.ini SMSS.EXE File opened for modification C:\Windows\SysWOW64\msvbvm60.dll 1d965887e2033a596346a7cca9f9aa563807be0265c02d471193c7859d7bb4df_NeikiAnalytics.exe File opened for modification C:\Windows\SysWOW64\shell.exe 1d965887e2033a596346a7cca9f9aa563807be0265c02d471193c7859d7bb4df_NeikiAnalytics.exe File opened for modification C:\Windows\SysWOW64\msvbvm60.dll Shell.exe File opened for modification C:\Windows\SysWOW64\msvbvm60.dll CSRSS.EXE -
Drops file in Windows directory 19 IoCs
description ioc Process File opened for modification C:\Windows\msvbvm60.dll SMSS.EXE File opened for modification C:\Windows\msvbvm60.dll 1d965887e2033a596346a7cca9f9aa563807be0265c02d471193c7859d7bb4df_NeikiAnalytics.exe File created C:\Windows\WlNLOGON.EXE 1d965887e2033a596346a7cca9f9aa563807be0265c02d471193c7859d7bb4df_NeikiAnalytics.exe File created C:\Windows\Desktop.ini 1d965887e2033a596346a7cca9f9aa563807be0265c02d471193c7859d7bb4df_NeikiAnalytics.exe File created C:\Windows\msvbvm60.dll CSRSS.EXE File opened for modification C:\Windows\msvbvm60.dll SERVICES.EXE File created C:\Windows\msvbvm60.dll SMSS.EXE File opened for modification C:\Windows\WlNLOGON.EXE 1d965887e2033a596346a7cca9f9aa563807be0265c02d471193c7859d7bb4df_NeikiAnalytics.exe File created C:\Windows\120.0.0.1.htm 1d965887e2033a596346a7cca9f9aa563807be0265c02d471193c7859d7bb4df_NeikiAnalytics.exe File opened for modification C:\Windows\ 1d965887e2033a596346a7cca9f9aa563807be0265c02d471193c7859d7bb4df_NeikiAnalytics.exe File created C:\Windows\msvbvm60.dll WlNLOGON.EXE File created C:\Windows\msvbvm60.dll Shell.exe File opened for modification C:\Windows\msvbvm60.dll Shell.exe File created C:\Windows\msvbvm60.dll 1d965887e2033a596346a7cca9f9aa563807be0265c02d471193c7859d7bb4df_NeikiAnalytics.exe File opened for modification C:\Windows\Desktop.ini 1d965887e2033a596346a7cca9f9aa563807be0265c02d471193c7859d7bb4df_NeikiAnalytics.exe File opened for modification C:\Windows\120.0.0.1.htm 1d965887e2033a596346a7cca9f9aa563807be0265c02d471193c7859d7bb4df_NeikiAnalytics.exe File opened for modification C:\Windows\msvbvm60.dll WlNLOGON.EXE File opened for modification C:\Windows\msvbvm60.dll CSRSS.EXE File created C:\Windows\msvbvm60.dll SERVICES.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies Control Panel 42 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Control Panel\International\s2359 = "Bengi" WlNLOGON.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Control Panel\Desktop\ Shell.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Control Panel\Desktop\SCRNSAVE.EXE = "C:\\Windows\\system32\\TELEMA~1.SCR" CSRSS.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Control Panel\Desktop\ScreenSaveTimeOut = "600" SMSS.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Control Panel\International\s2359 = "Bengi" SMSS.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Control Panel\Desktop\ScreenSaveTimeOut = "600" 1d965887e2033a596346a7cca9f9aa563807be0265c02d471193c7859d7bb4df_NeikiAnalytics.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Control Panel\International 1d965887e2033a596346a7cca9f9aa563807be0265c02d471193c7859d7bb4df_NeikiAnalytics.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Control Panel\International\s1159 = "Awan" Shell.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Control Panel\Desktop\ WlNLOGON.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Control Panel\Desktop\SCRNSAVE.EXE = "C:\\Windows\\system32\\TELEMA~1.SCR" Shell.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Control Panel\Desktop\ScreenSaveTimeOut = "600" Shell.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Control Panel\Desktop\ScreenSaverIsSecure = "0" SERVICES.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Control Panel\International\s1159 = "Awan" SERVICES.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Control Panel\Desktop\ SMSS.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Control Panel\International\s2359 = "Bengi" 1d965887e2033a596346a7cca9f9aa563807be0265c02d471193c7859d7bb4df_NeikiAnalytics.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Control Panel\International\s1159 = "Awan" WlNLOGON.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Control Panel\Desktop\SCRNSAVE.EXE = "C:\\Windows\\system32\\TELEMA~1.SCR" 1d965887e2033a596346a7cca9f9aa563807be0265c02d471193c7859d7bb4df_NeikiAnalytics.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Control Panel\International SERVICES.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Control Panel\Desktop\ SERVICES.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Control Panel\Desktop\SCRNSAVE.EXE = "C:\\Windows\\system32\\TELEMA~1.SCR" SERVICES.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Control Panel\Desktop\ScreenSaveTimeOut = "600" SERVICES.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Control Panel\International SMSS.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Control Panel\Desktop\ CSRSS.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Control Panel\Desktop\ScreenSaveTimeOut = "600" CSRSS.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Control Panel\International\s2359 = "Bengi" SERVICES.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Control Panel\Desktop\SCRNSAVE.EXE = "C:\\Windows\\system32\\TELEMA~1.SCR" SMSS.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Control Panel\Desktop\ScreenSaverIsSecure = "0" SMSS.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Control Panel\Desktop\ 1d965887e2033a596346a7cca9f9aa563807be0265c02d471193c7859d7bb4df_NeikiAnalytics.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Control Panel\Desktop\SCRNSAVE.EXE = "C:\\Windows\\system32\\TELEMA~1.SCR" WlNLOGON.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Control Panel\Desktop\ScreenSaverIsSecure = "0" Shell.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Control Panel\International Shell.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Control Panel\International\s1159 = "Awan" SMSS.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Control Panel\Desktop\ScreenSaverIsSecure = "0" WlNLOGON.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Control Panel\International WlNLOGON.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Control Panel\Desktop\ScreenSaveTimeOut = "600" WlNLOGON.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Control Panel\International\s2359 = "Bengi" Shell.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Control Panel\Desktop\ScreenSaverIsSecure = "0" CSRSS.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Control Panel\International CSRSS.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Control Panel\International\s1159 = "Awan" CSRSS.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Control Panel\International\s2359 = "Bengi" CSRSS.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Control Panel\Desktop\ScreenSaverIsSecure = "0" 1d965887e2033a596346a7cca9f9aa563807be0265c02d471193c7859d7bb4df_NeikiAnalytics.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Control Panel\International\s1159 = "Awan" 1d965887e2033a596346a7cca9f9aa563807be0265c02d471193c7859d7bb4df_NeikiAnalytics.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main 1d965887e2033a596346a7cca9f9aa563807be0265c02d471193c7859d7bb4df_NeikiAnalytics.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main WlNLOGON.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main Shell.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main CSRSS.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main SERVICES.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main SMSS.EXE -
Modifies Internet Explorer start page 1 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\start page = "C:\\Windows\\\\120.0.0.1.htm" 1d965887e2033a596346a7cca9f9aa563807be0265c02d471193c7859d7bb4df_NeikiAnalytics.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\start page = "C:\\Windows\\\\120.0.0.1.htm" WlNLOGON.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\start page = "C:\\Windows\\\\120.0.0.1.htm" Shell.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\start page = "C:\\Windows\\\\120.0.0.1.htm" CSRSS.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\start page = "C:\\Windows\\\\120.0.0.1.htm" SERVICES.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\start page = "C:\\Windows\\\\120.0.0.1.htm" SMSS.EXE -
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command SERVICES.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command SMSS.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 1d965887e2033a596346a7cca9f9aa563807be0265c02d471193c7859d7bb4df_NeikiAnalytics.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{645FF040-5081-101B-9F08-00AA002F954E} 1d965887e2033a596346a7cca9f9aa563807be0265c02d471193c7859d7bb4df_NeikiAnalytics.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D} WlNLOGON.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" Shell.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" CSRSS.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command SERVICES.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell 1d965887e2033a596346a7cca9f9aa563807be0265c02d471193c7859d7bb4df_NeikiAnalytics.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D} 1d965887e2033a596346a7cca9f9aa563807be0265c02d471193c7859d7bb4df_NeikiAnalytics.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D} SERVICES.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" SMSS.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command SMSS.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command 1d965887e2033a596346a7cca9f9aa563807be0265c02d471193c7859d7bb4df_NeikiAnalytics.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command WlNLOGON.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{645FF040-5081-101B-9F08-00AA002F954E} SMSS.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command WlNLOGON.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" SERVICES.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command WlNLOGON.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{645FF040-5081-101B-9F08-00AA002F954E} WlNLOGON.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command Shell.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command Shell.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D} Shell.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{645FF040-5081-101B-9F08-00AA002F954E} CSRSS.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command 1d965887e2033a596346a7cca9f9aa563807be0265c02d471193c7859d7bb4df_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" WlNLOGON.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command CSRSS.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command SERVICES.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command SMSS.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command WlNLOGON.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" Shell.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{645FF040-5081-101B-9F08-00AA002F954E} Shell.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" CSRSS.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" SERVICES.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" SMSS.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" WlNLOGON.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command CSRSS.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D} CSRSS.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 1d965887e2033a596346a7cca9f9aa563807be0265c02d471193c7859d7bb4df_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 1d965887e2033a596346a7cca9f9aa563807be0265c02d471193c7859d7bb4df_NeikiAnalytics.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command WlNLOGON.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command Shell.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command SMSS.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command 1d965887e2033a596346a7cca9f9aa563807be0265c02d471193c7859d7bb4df_NeikiAnalytics.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command Shell.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command CSRSS.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{645FF040-5081-101B-9F08-00AA002F954E} SERVICES.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D} SMSS.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" WlNLOGON.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" Shell.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" Shell.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command SERVICES.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" SMSS.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command 1d965887e2033a596346a7cca9f9aa563807be0265c02d471193c7859d7bb4df_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" CSRSS.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" SERVICES.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" SMSS.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open 1d965887e2033a596346a7cca9f9aa563807be0265c02d471193c7859d7bb4df_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 1d965887e2033a596346a7cca9f9aa563807be0265c02d471193c7859d7bb4df_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" WlNLOGON.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" SMSS.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command 1d965887e2033a596346a7cca9f9aa563807be0265c02d471193c7859d7bb4df_NeikiAnalytics.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command Shell.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command CSRSS.EXE -
Suspicious behavior: EnumeratesProcesses 44 IoCs
pid Process 1244 1d965887e2033a596346a7cca9f9aa563807be0265c02d471193c7859d7bb4df_NeikiAnalytics.exe 888 SMSS.EXE 888 SMSS.EXE 888 SMSS.EXE 888 SMSS.EXE 888 SMSS.EXE 888 SMSS.EXE 888 SMSS.EXE 888 SMSS.EXE 888 SMSS.EXE 888 SMSS.EXE 888 SMSS.EXE 888 SMSS.EXE 888 SMSS.EXE 888 SMSS.EXE 888 SMSS.EXE 888 SMSS.EXE 888 SMSS.EXE 888 SMSS.EXE 888 SMSS.EXE 888 SMSS.EXE 888 SMSS.EXE 888 SMSS.EXE 888 SMSS.EXE 888 SMSS.EXE 888 SMSS.EXE 888 SMSS.EXE 888 SMSS.EXE 888 SMSS.EXE 888 SMSS.EXE 888 SMSS.EXE 888 SMSS.EXE 888 SMSS.EXE 888 SMSS.EXE 888 SMSS.EXE 888 SMSS.EXE 888 SMSS.EXE 888 SMSS.EXE 888 SMSS.EXE 888 SMSS.EXE 888 SMSS.EXE 888 SMSS.EXE 888 SMSS.EXE 888 SMSS.EXE -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1244 1d965887e2033a596346a7cca9f9aa563807be0265c02d471193c7859d7bb4df_NeikiAnalytics.exe 2788 WlNLOGON.EXE 2536 Shell.exe 2356 CSRSS.EXE 2564 SERVICES.EXE 888 SMSS.EXE -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 1244 wrote to memory of 2788 1244 1d965887e2033a596346a7cca9f9aa563807be0265c02d471193c7859d7bb4df_NeikiAnalytics.exe 28 PID 1244 wrote to memory of 2788 1244 1d965887e2033a596346a7cca9f9aa563807be0265c02d471193c7859d7bb4df_NeikiAnalytics.exe 28 PID 1244 wrote to memory of 2788 1244 1d965887e2033a596346a7cca9f9aa563807be0265c02d471193c7859d7bb4df_NeikiAnalytics.exe 28 PID 1244 wrote to memory of 2788 1244 1d965887e2033a596346a7cca9f9aa563807be0265c02d471193c7859d7bb4df_NeikiAnalytics.exe 28 PID 1244 wrote to memory of 2536 1244 1d965887e2033a596346a7cca9f9aa563807be0265c02d471193c7859d7bb4df_NeikiAnalytics.exe 29 PID 1244 wrote to memory of 2536 1244 1d965887e2033a596346a7cca9f9aa563807be0265c02d471193c7859d7bb4df_NeikiAnalytics.exe 29 PID 1244 wrote to memory of 2536 1244 1d965887e2033a596346a7cca9f9aa563807be0265c02d471193c7859d7bb4df_NeikiAnalytics.exe 29 PID 1244 wrote to memory of 2536 1244 1d965887e2033a596346a7cca9f9aa563807be0265c02d471193c7859d7bb4df_NeikiAnalytics.exe 29 PID 1244 wrote to memory of 2356 1244 1d965887e2033a596346a7cca9f9aa563807be0265c02d471193c7859d7bb4df_NeikiAnalytics.exe 30 PID 1244 wrote to memory of 2356 1244 1d965887e2033a596346a7cca9f9aa563807be0265c02d471193c7859d7bb4df_NeikiAnalytics.exe 30 PID 1244 wrote to memory of 2356 1244 1d965887e2033a596346a7cca9f9aa563807be0265c02d471193c7859d7bb4df_NeikiAnalytics.exe 30 PID 1244 wrote to memory of 2356 1244 1d965887e2033a596346a7cca9f9aa563807be0265c02d471193c7859d7bb4df_NeikiAnalytics.exe 30 PID 1244 wrote to memory of 2564 1244 1d965887e2033a596346a7cca9f9aa563807be0265c02d471193c7859d7bb4df_NeikiAnalytics.exe 31 PID 1244 wrote to memory of 2564 1244 1d965887e2033a596346a7cca9f9aa563807be0265c02d471193c7859d7bb4df_NeikiAnalytics.exe 31 PID 1244 wrote to memory of 2564 1244 1d965887e2033a596346a7cca9f9aa563807be0265c02d471193c7859d7bb4df_NeikiAnalytics.exe 31 PID 1244 wrote to memory of 2564 1244 1d965887e2033a596346a7cca9f9aa563807be0265c02d471193c7859d7bb4df_NeikiAnalytics.exe 31 PID 1244 wrote to memory of 888 1244 1d965887e2033a596346a7cca9f9aa563807be0265c02d471193c7859d7bb4df_NeikiAnalytics.exe 32 PID 1244 wrote to memory of 888 1244 1d965887e2033a596346a7cca9f9aa563807be0265c02d471193c7859d7bb4df_NeikiAnalytics.exe 32 PID 1244 wrote to memory of 888 1244 1d965887e2033a596346a7cca9f9aa563807be0265c02d471193c7859d7bb4df_NeikiAnalytics.exe 32 PID 1244 wrote to memory of 888 1244 1d965887e2033a596346a7cca9f9aa563807be0265c02d471193c7859d7bb4df_NeikiAnalytics.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\1d965887e2033a596346a7cca9f9aa563807be0265c02d471193c7859d7bb4df_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\1d965887e2033a596346a7cca9f9aa563807be0265c02d471193c7859d7bb4df_NeikiAnalytics.exe"1⤵
- Modifies WinLogon for persistence
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Drops file in Drivers directory
- Loads dropped DLL
- Modifies system executable filetype association
- Adds Run key to start application
- Drops desktop.ini file(s)
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies Control Panel
- Modifies Internet Explorer settings
- Modifies Internet Explorer start page
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1244 -
C:\Windows\WlNLOGON.EXEC:\Windows\WlNLOGON.EXE2⤵
- Modifies WinLogon for persistence
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Modifies system executable filetype association
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies Control Panel
- Modifies Internet Explorer settings
- Modifies Internet Explorer start page
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:2788
-
-
C:\Windows\SysWOW64\Shell.exeC:\Windows\system32\Shell.exe2⤵
- Modifies WinLogon for persistence
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Modifies system executable filetype association
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies Control Panel
- Modifies Internet Explorer settings
- Modifies Internet Explorer start page
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:2536
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE"2⤵
- Modifies WinLogon for persistence
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Modifies system executable filetype association
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies Control Panel
- Modifies Internet Explorer settings
- Modifies Internet Explorer start page
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:2356
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"2⤵
- Modifies WinLogon for persistence
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Modifies system executable filetype association
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies Control Panel
- Modifies Internet Explorer settings
- Modifies Internet Explorer start page
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:2564
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE"2⤵
- Modifies WinLogon for persistence
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Modifies system executable filetype association
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies Control Panel
- Modifies Internet Explorer settings
- Modifies Internet Explorer start page
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:888
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Event Triggered Execution
1Change Default File Association
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Event Triggered Execution
1Change Default File Association
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
352KB
MD5f9a1151475a7d5624c55de91bb7c6060
SHA1f7a6c0c5239b9503795d97e0059a5583cc57d73f
SHA2561d965887e2033a596346a7cca9f9aa563807be0265c02d471193c7859d7bb4df
SHA512b651c14b55b3a415f0c90e5be572534a3fec226be36e9b73157fa7e358601e7356720c01d2ddaa9ac6e443b660f6e9b76074f07fc5818ced2f92733a1dfd099b
-
Filesize
65B
MD5990a0bd866566534e37192439277e040
SHA190abfe04350a375df3beddd411256143e606461b
SHA256ee3aaf1bcc2539bdddb6f25f4d0902cd023d83d902196d1bf2fcd37a73469038
SHA512e598c68ae8f1a62cbc870fb7cf2c634ba24d1f1bfa62428a23aac7c914b3a775fa06564b6e084eaf9215086da433a80e49f2cbe81ca990414df3e57716dea4b7
-
Filesize
1.3MB
MD55343a19c618bc515ceb1695586c6c137
SHA14dedae8cbde066f31c8e6b52c0baa3f8b1117742
SHA2562246b4feae199408ea66d4a90c1589026f4a5800ce5a28e583b94506a8a73dce
SHA512708d8a252a167fa94e3e1a49e2630d07613ff75a9a3e779a0c1fcbec44aa853a68c401f31a2b84152f46a05f7d93f4e5e502afc7a60236a22ac58dea73fa5606
-
Filesize
462B
MD545d327d7d806625d696945dea064d7a2
SHA181a36b2a66c8dcce870a82409c6f772cc06addf0
SHA256e022ef7261dfe3e79b78e4bff605ae3f0480cd54d80b7c3358bd9091a0f0f04a
SHA5128b78bb4fa2c05d509cf171525b0ba7bf735a8890854f0ef16b29c9456ff547ccd86423068f61c21b8f35a0797ee44f9a8697861c34f133c6c26dfcf99e8f849c
-
Filesize
40KB
MD54de286f5923036648db750d58ba496e8
SHA10252d5d6c7a3b7dfa71fca4b30a53522fd7c6f67
SHA256eb79555170611879e79b4cdba59bdf679e63df9d7927d01354e5cf859274c58c
SHA512069daaa01a04add11a9e5fc0988b5d42e6ad50011fa148df41ffb3a905ffc170ab65ba66f4ad921306503d8792dd192c173c532232fc7ef146c09aa76ddf548f
-
Filesize
352KB
MD5819eb3e70aa20a783749498dd3bc4934
SHA1e4329709cacfd7e40fc0819eab513c2b2a6bc801
SHA2565225785b49a5fd6e00f19b4533d7c8264be3f69ee373d91cc084f4a3fc440c3f
SHA512ffcf3db641e0064e40269fca72983bd7108fb307208aea4def069f0c3a521735fbd26bd248b08693bc244d982f92bbac3869d10f60dfb22cf1028eb7cb4874dc
-
Filesize
352KB
MD56c52fd86b5bd8d4cc37585716801e03e
SHA18bef6a85b8ec3adeec12364dc0657c773e3317ea
SHA2561d47e953b07044a9b3c49d9790b7dd1d279d69d79e77f27fd1a8a08429f0e820
SHA5126418c32545aae6193fdf81671679a5ae0154027f5ebae51613a12bc5df3969f9fb6f7667282e9716ff6df4272335e934cb0764dc0ba51881b2180fdb23858639
-
Filesize
352KB
MD5f5497354b7f94a9f09f9078c7c66ecfc
SHA1d87a504419b7c95c2d1c73d54d7d6f1dfa85bcce
SHA256b9fb4d3cbcdd8040c23170b3af5f1b3e279c314feae0fd3bb2e71a93df08114b
SHA512ab0d934171d7af10446bd370a2b45e7f670db558cb02a614e75715d1b76a742d9549b41029559d5347ed44da2d408a02b53a473f727dcd8d658b7a7bdfad16f9
-
Filesize
352KB
MD5fc0285c828f338f7cdddb291769bcf2c
SHA1ca34f448d0eb6a0557021a2871feed9f478ffff3
SHA2569fd6dc2424d7ec285b6c14b32ce48f21a374b0385eaa1081898a0d0871a1d5a0
SHA5125cb0391db1388087630c92c5d1c3f0e1daa7e674b7e7dde6fe68668f97d831e675e4ff816effcbf9193bd0104a394c910f3cfb43cd7b1556d4102533df3598e3
-
Filesize
352KB
MD53ee4ef6905c407947bd0430c2461e25d
SHA1cfa7f35dd3c44124901aa5d75e4fd6f2d22734fa
SHA2560e752f246ada786c447464ca4c7657230be46832fb2d5fca27581064e882679c
SHA512497d8988fe25cb84ad7e955a0e4f1ea28fd36e61277699f864f6b5f74b53286c7db0b2a72daa1fb02f274b9c6def80aaeecc1037f5b01545e1de72fff999de2b