Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
21-05-2024 07:52
Static task
static1
Behavioral task
behavioral1
Sample
1e4f96701c34b11c40dbc60df7a269bf21f1f9e6d48319c6c5a295cc6cfd7bc6_NeikiAnalytics.exe
Resource
win7-20240221-en
General
-
Target
1e4f96701c34b11c40dbc60df7a269bf21f1f9e6d48319c6c5a295cc6cfd7bc6_NeikiAnalytics.exe
-
Size
4.1MB
-
MD5
3e47a07813ad8b2b6f0734896ebde9d0
-
SHA1
19e00ceb9bbdb42752f6d6dc723a6718854f3f27
-
SHA256
1e4f96701c34b11c40dbc60df7a269bf21f1f9e6d48319c6c5a295cc6cfd7bc6
-
SHA512
4e3d56db85bf28a07273bb46b4437cbd059fd409a809a8067ac4166f7f1adde930a429d24f39aa2149a238dec8fe1cf59dd268ac3c69fab7efc020d53848b74c
-
SSDEEP
98304:BsVQ+hudF4keJeyEqK0evsENr9r54Wa5Cc1nHXivj:Bs5hioeyE6OsERj43ns
Malware Config
Signatures
-
Glupteba payload 19 IoCs
Processes:
resource yara_rule behavioral2/memory/3980-2-0x0000000004860000-0x000000000514B000-memory.dmp family_glupteba behavioral2/memory/3980-3-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/4080-130-0x0000000000400000-0x0000000002732000-memory.dmp family_glupteba behavioral2/memory/3980-157-0x0000000004860000-0x000000000514B000-memory.dmp family_glupteba behavioral2/memory/3980-155-0x0000000000400000-0x0000000002732000-memory.dmp family_glupteba behavioral2/memory/3980-213-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/1360-215-0x0000000000400000-0x0000000002732000-memory.dmp family_glupteba behavioral2/memory/1360-217-0x0000000000400000-0x0000000002732000-memory.dmp family_glupteba behavioral2/memory/1360-219-0x0000000000400000-0x0000000002732000-memory.dmp family_glupteba behavioral2/memory/1360-220-0x0000000000400000-0x0000000002732000-memory.dmp family_glupteba behavioral2/memory/1360-223-0x0000000000400000-0x0000000002732000-memory.dmp family_glupteba behavioral2/memory/1360-225-0x0000000000400000-0x0000000002732000-memory.dmp family_glupteba behavioral2/memory/1360-227-0x0000000000400000-0x0000000002732000-memory.dmp family_glupteba behavioral2/memory/1360-228-0x0000000000400000-0x0000000002732000-memory.dmp family_glupteba behavioral2/memory/1360-230-0x0000000000400000-0x0000000002732000-memory.dmp family_glupteba behavioral2/memory/1360-233-0x0000000000400000-0x0000000002732000-memory.dmp family_glupteba behavioral2/memory/1360-235-0x0000000000400000-0x0000000002732000-memory.dmp family_glupteba behavioral2/memory/1360-236-0x0000000000400000-0x0000000002732000-memory.dmp family_glupteba behavioral2/memory/1360-238-0x0000000000400000-0x0000000002732000-memory.dmp family_glupteba -
Modifies Windows Firewall 2 TTPs 1 IoCs
Processes:
netsh.exepid Process 4228 netsh.exe -
Executes dropped EXE 2 IoCs
Processes:
csrss.exeinjector.exepid Process 1360 csrss.exe 3016 injector.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
1e4f96701c34b11c40dbc60df7a269bf21f1f9e6d48319c6c5a295cc6cfd7bc6_NeikiAnalytics.execsrss.exedescription ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" 1e4f96701c34b11c40dbc60df7a269bf21f1f9e6d48319c6c5a295cc6cfd7bc6_NeikiAnalytics.exe Set value (str) \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" csrss.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Manipulates WinMonFS driver. 1 IoCs
Roottkits write to WinMonFS to hide directories/files from being detected.
Processes:
csrss.exedescription ioc Process File opened for modification \??\WinMonFS csrss.exe -
Drops file in System32 directory 7 IoCs
Processes:
powershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exedescription ioc Process File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe -
Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 1 IoCs
Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.
Processes:
1e4f96701c34b11c40dbc60df7a269bf21f1f9e6d48319c6c5a295cc6cfd7bc6_NeikiAnalytics.exedescription ioc Process File opened (read-only) \??\VBoxMiniRdrDN 1e4f96701c34b11c40dbc60df7a269bf21f1f9e6d48319c6c5a295cc6cfd7bc6_NeikiAnalytics.exe -
Drops file in Windows directory 2 IoCs
Processes:
1e4f96701c34b11c40dbc60df7a269bf21f1f9e6d48319c6c5a295cc6cfd7bc6_NeikiAnalytics.exedescription ioc Process File opened for modification C:\Windows\rss 1e4f96701c34b11c40dbc60df7a269bf21f1f9e6d48319c6c5a295cc6cfd7bc6_NeikiAnalytics.exe File created C:\Windows\rss\csrss.exe 1e4f96701c34b11c40dbc60df7a269bf21f1f9e6d48319c6c5a295cc6cfd7bc6_NeikiAnalytics.exe -
Processes:
powershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepid Process 4612 powershell.exe 4256 powershell.exe 2752 powershell.exe 3084 powershell.exe 3400 powershell.exe 2728 powershell.exe 4600 powershell.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exepid Process 1296 schtasks.exe 2572 schtasks.exe -
Modifies data under HKEY_USERS 64 IoCs
Processes:
1e4f96701c34b11c40dbc60df7a269bf21f1f9e6d48319c6c5a295cc6cfd7bc6_NeikiAnalytics.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exedescription ioc Process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2492 = "Aus Central W. Standard Time" 1e4f96701c34b11c40dbc60df7a269bf21f1f9e6d48319c6c5a295cc6cfd7bc6_NeikiAnalytics.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-331 = "E. Europe Daylight Time" 1e4f96701c34b11c40dbc60df7a269bf21f1f9e6d48319c6c5a295cc6cfd7bc6_NeikiAnalytics.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-402 = "Arabic Standard Time" 1e4f96701c34b11c40dbc60df7a269bf21f1f9e6d48319c6c5a295cc6cfd7bc6_NeikiAnalytics.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2771 = "Omsk Daylight Time" 1e4f96701c34b11c40dbc60df7a269bf21f1f9e6d48319c6c5a295cc6cfd7bc6_NeikiAnalytics.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-932 = "Coordinated Universal Time" 1e4f96701c34b11c40dbc60df7a269bf21f1f9e6d48319c6c5a295cc6cfd7bc6_NeikiAnalytics.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-661 = "Cen. Australia Daylight Time" 1e4f96701c34b11c40dbc60df7a269bf21f1f9e6d48319c6c5a295cc6cfd7bc6_NeikiAnalytics.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-412 = "E. Africa Standard Time" 1e4f96701c34b11c40dbc60df7a269bf21f1f9e6d48319c6c5a295cc6cfd7bc6_NeikiAnalytics.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-621 = "Korea Daylight Time" 1e4f96701c34b11c40dbc60df7a269bf21f1f9e6d48319c6c5a295cc6cfd7bc6_NeikiAnalytics.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-502 = "Nepal Standard Time" 1e4f96701c34b11c40dbc60df7a269bf21f1f9e6d48319c6c5a295cc6cfd7bc6_NeikiAnalytics.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-682 = "E. Australia Standard Time" 1e4f96701c34b11c40dbc60df7a269bf21f1f9e6d48319c6c5a295cc6cfd7bc6_NeikiAnalytics.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-334 = "Jordan Daylight Time" 1e4f96701c34b11c40dbc60df7a269bf21f1f9e6d48319c6c5a295cc6cfd7bc6_NeikiAnalytics.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-141 = "Canada Central Daylight Time" 1e4f96701c34b11c40dbc60df7a269bf21f1f9e6d48319c6c5a295cc6cfd7bc6_NeikiAnalytics.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2141 = "Transbaikal Daylight Time" 1e4f96701c34b11c40dbc60df7a269bf21f1f9e6d48319c6c5a295cc6cfd7bc6_NeikiAnalytics.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1662 = "Bahia Standard Time" 1e4f96701c34b11c40dbc60df7a269bf21f1f9e6d48319c6c5a295cc6cfd7bc6_NeikiAnalytics.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2041 = "Eastern Daylight Time (Mexico)" 1e4f96701c34b11c40dbc60df7a269bf21f1f9e6d48319c6c5a295cc6cfd7bc6_NeikiAnalytics.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1722 = "Libya Standard Time" 1e4f96701c34b11c40dbc60df7a269bf21f1f9e6d48319c6c5a295cc6cfd7bc6_NeikiAnalytics.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-391 = "Arab Daylight Time" 1e4f96701c34b11c40dbc60df7a269bf21f1f9e6d48319c6c5a295cc6cfd7bc6_NeikiAnalytics.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-12 = "Azores Standard Time" 1e4f96701c34b11c40dbc60df7a269bf21f1f9e6d48319c6c5a295cc6cfd7bc6_NeikiAnalytics.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2791 = "Novosibirsk Daylight Time" 1e4f96701c34b11c40dbc60df7a269bf21f1f9e6d48319c6c5a295cc6cfd7bc6_NeikiAnalytics.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-132 = "US Eastern Standard Time" 1e4f96701c34b11c40dbc60df7a269bf21f1f9e6d48319c6c5a295cc6cfd7bc6_NeikiAnalytics.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-652 = "AUS Central Standard Time" 1e4f96701c34b11c40dbc60df7a269bf21f1f9e6d48319c6c5a295cc6cfd7bc6_NeikiAnalytics.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2452 = "Saint Pierre Standard Time" 1e4f96701c34b11c40dbc60df7a269bf21f1f9e6d48319c6c5a295cc6cfd7bc6_NeikiAnalytics.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-11 = "Azores Daylight Time" 1e4f96701c34b11c40dbc60df7a269bf21f1f9e6d48319c6c5a295cc6cfd7bc6_NeikiAnalytics.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-212 = "Pacific Standard Time" 1e4f96701c34b11c40dbc60df7a269bf21f1f9e6d48319c6c5a295cc6cfd7bc6_NeikiAnalytics.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-434 = "Georgian Daylight Time" 1e4f96701c34b11c40dbc60df7a269bf21f1f9e6d48319c6c5a295cc6cfd7bc6_NeikiAnalytics.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-271 = "Greenwich Daylight Time" 1e4f96701c34b11c40dbc60df7a269bf21f1f9e6d48319c6c5a295cc6cfd7bc6_NeikiAnalytics.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2432 = "Cuba Standard Time" 1e4f96701c34b11c40dbc60df7a269bf21f1f9e6d48319c6c5a295cc6cfd7bc6_NeikiAnalytics.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-51 = "Greenland Daylight Time" 1e4f96701c34b11c40dbc60df7a269bf21f1f9e6d48319c6c5a295cc6cfd7bc6_NeikiAnalytics.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2391 = "Aleutian Daylight Time" 1e4f96701c34b11c40dbc60df7a269bf21f1f9e6d48319c6c5a295cc6cfd7bc6_NeikiAnalytics.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-351 = "FLE Daylight Time" 1e4f96701c34b11c40dbc60df7a269bf21f1f9e6d48319c6c5a295cc6cfd7bc6_NeikiAnalytics.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-892 = "Morocco Standard Time" 1e4f96701c34b11c40dbc60df7a269bf21f1f9e6d48319c6c5a295cc6cfd7bc6_NeikiAnalytics.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-3051 = "Qyzylorda Daylight Time" 1e4f96701c34b11c40dbc60df7a269bf21f1f9e6d48319c6c5a295cc6cfd7bc6_NeikiAnalytics.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
powershell.exe1e4f96701c34b11c40dbc60df7a269bf21f1f9e6d48319c6c5a295cc6cfd7bc6_NeikiAnalytics.exepowershell.exe1e4f96701c34b11c40dbc60df7a269bf21f1f9e6d48319c6c5a295cc6cfd7bc6_NeikiAnalytics.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exeinjector.execsrss.exepid Process 2752 powershell.exe 2752 powershell.exe 3980 1e4f96701c34b11c40dbc60df7a269bf21f1f9e6d48319c6c5a295cc6cfd7bc6_NeikiAnalytics.exe 3980 1e4f96701c34b11c40dbc60df7a269bf21f1f9e6d48319c6c5a295cc6cfd7bc6_NeikiAnalytics.exe 3084 powershell.exe 3084 powershell.exe 4080 1e4f96701c34b11c40dbc60df7a269bf21f1f9e6d48319c6c5a295cc6cfd7bc6_NeikiAnalytics.exe 4080 1e4f96701c34b11c40dbc60df7a269bf21f1f9e6d48319c6c5a295cc6cfd7bc6_NeikiAnalytics.exe 4080 1e4f96701c34b11c40dbc60df7a269bf21f1f9e6d48319c6c5a295cc6cfd7bc6_NeikiAnalytics.exe 4080 1e4f96701c34b11c40dbc60df7a269bf21f1f9e6d48319c6c5a295cc6cfd7bc6_NeikiAnalytics.exe 4080 1e4f96701c34b11c40dbc60df7a269bf21f1f9e6d48319c6c5a295cc6cfd7bc6_NeikiAnalytics.exe 4080 1e4f96701c34b11c40dbc60df7a269bf21f1f9e6d48319c6c5a295cc6cfd7bc6_NeikiAnalytics.exe 4080 1e4f96701c34b11c40dbc60df7a269bf21f1f9e6d48319c6c5a295cc6cfd7bc6_NeikiAnalytics.exe 4080 1e4f96701c34b11c40dbc60df7a269bf21f1f9e6d48319c6c5a295cc6cfd7bc6_NeikiAnalytics.exe 4080 1e4f96701c34b11c40dbc60df7a269bf21f1f9e6d48319c6c5a295cc6cfd7bc6_NeikiAnalytics.exe 4080 1e4f96701c34b11c40dbc60df7a269bf21f1f9e6d48319c6c5a295cc6cfd7bc6_NeikiAnalytics.exe 3400 powershell.exe 3400 powershell.exe 2728 powershell.exe 2728 powershell.exe 4600 powershell.exe 4600 powershell.exe 4612 powershell.exe 4612 powershell.exe 4256 powershell.exe 4256 powershell.exe 3016 injector.exe 3016 injector.exe 3016 injector.exe 3016 injector.exe 3016 injector.exe 3016 injector.exe 1360 csrss.exe 1360 csrss.exe 3016 injector.exe 3016 injector.exe 3016 injector.exe 3016 injector.exe 3016 injector.exe 3016 injector.exe 1360 csrss.exe 1360 csrss.exe 3016 injector.exe 3016 injector.exe 3016 injector.exe 3016 injector.exe 3016 injector.exe 3016 injector.exe 3016 injector.exe 3016 injector.exe 3016 injector.exe 3016 injector.exe 3016 injector.exe 3016 injector.exe 3016 injector.exe 3016 injector.exe 3016 injector.exe 3016 injector.exe 3016 injector.exe 3016 injector.exe 3016 injector.exe 3016 injector.exe 3016 injector.exe 3016 injector.exe -
Suspicious use of AdjustPrivilegeToken 10 IoCs
Processes:
powershell.exe1e4f96701c34b11c40dbc60df7a269bf21f1f9e6d48319c6c5a295cc6cfd7bc6_NeikiAnalytics.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.execsrss.exedescription pid Process Token: SeDebugPrivilege 2752 powershell.exe Token: SeDebugPrivilege 3980 1e4f96701c34b11c40dbc60df7a269bf21f1f9e6d48319c6c5a295cc6cfd7bc6_NeikiAnalytics.exe Token: SeImpersonatePrivilege 3980 1e4f96701c34b11c40dbc60df7a269bf21f1f9e6d48319c6c5a295cc6cfd7bc6_NeikiAnalytics.exe Token: SeDebugPrivilege 3084 powershell.exe Token: SeDebugPrivilege 3400 powershell.exe Token: SeDebugPrivilege 2728 powershell.exe Token: SeDebugPrivilege 4600 powershell.exe Token: SeDebugPrivilege 4612 powershell.exe Token: SeDebugPrivilege 4256 powershell.exe Token: SeSystemEnvironmentPrivilege 1360 csrss.exe -
Suspicious use of WriteProcessMemory 30 IoCs
Processes:
1e4f96701c34b11c40dbc60df7a269bf21f1f9e6d48319c6c5a295cc6cfd7bc6_NeikiAnalytics.exe1e4f96701c34b11c40dbc60df7a269bf21f1f9e6d48319c6c5a295cc6cfd7bc6_NeikiAnalytics.execmd.execsrss.exedescription pid Process procid_target PID 3980 wrote to memory of 2752 3980 1e4f96701c34b11c40dbc60df7a269bf21f1f9e6d48319c6c5a295cc6cfd7bc6_NeikiAnalytics.exe 87 PID 3980 wrote to memory of 2752 3980 1e4f96701c34b11c40dbc60df7a269bf21f1f9e6d48319c6c5a295cc6cfd7bc6_NeikiAnalytics.exe 87 PID 3980 wrote to memory of 2752 3980 1e4f96701c34b11c40dbc60df7a269bf21f1f9e6d48319c6c5a295cc6cfd7bc6_NeikiAnalytics.exe 87 PID 4080 wrote to memory of 3084 4080 1e4f96701c34b11c40dbc60df7a269bf21f1f9e6d48319c6c5a295cc6cfd7bc6_NeikiAnalytics.exe 94 PID 4080 wrote to memory of 3084 4080 1e4f96701c34b11c40dbc60df7a269bf21f1f9e6d48319c6c5a295cc6cfd7bc6_NeikiAnalytics.exe 94 PID 4080 wrote to memory of 3084 4080 1e4f96701c34b11c40dbc60df7a269bf21f1f9e6d48319c6c5a295cc6cfd7bc6_NeikiAnalytics.exe 94 PID 4080 wrote to memory of 3640 4080 1e4f96701c34b11c40dbc60df7a269bf21f1f9e6d48319c6c5a295cc6cfd7bc6_NeikiAnalytics.exe 97 PID 4080 wrote to memory of 3640 4080 1e4f96701c34b11c40dbc60df7a269bf21f1f9e6d48319c6c5a295cc6cfd7bc6_NeikiAnalytics.exe 97 PID 3640 wrote to memory of 4228 3640 cmd.exe 99 PID 3640 wrote to memory of 4228 3640 cmd.exe 99 PID 4080 wrote to memory of 3400 4080 1e4f96701c34b11c40dbc60df7a269bf21f1f9e6d48319c6c5a295cc6cfd7bc6_NeikiAnalytics.exe 100 PID 4080 wrote to memory of 3400 4080 1e4f96701c34b11c40dbc60df7a269bf21f1f9e6d48319c6c5a295cc6cfd7bc6_NeikiAnalytics.exe 100 PID 4080 wrote to memory of 3400 4080 1e4f96701c34b11c40dbc60df7a269bf21f1f9e6d48319c6c5a295cc6cfd7bc6_NeikiAnalytics.exe 100 PID 4080 wrote to memory of 2728 4080 1e4f96701c34b11c40dbc60df7a269bf21f1f9e6d48319c6c5a295cc6cfd7bc6_NeikiAnalytics.exe 104 PID 4080 wrote to memory of 2728 4080 1e4f96701c34b11c40dbc60df7a269bf21f1f9e6d48319c6c5a295cc6cfd7bc6_NeikiAnalytics.exe 104 PID 4080 wrote to memory of 2728 4080 1e4f96701c34b11c40dbc60df7a269bf21f1f9e6d48319c6c5a295cc6cfd7bc6_NeikiAnalytics.exe 104 PID 4080 wrote to memory of 1360 4080 1e4f96701c34b11c40dbc60df7a269bf21f1f9e6d48319c6c5a295cc6cfd7bc6_NeikiAnalytics.exe 106 PID 4080 wrote to memory of 1360 4080 1e4f96701c34b11c40dbc60df7a269bf21f1f9e6d48319c6c5a295cc6cfd7bc6_NeikiAnalytics.exe 106 PID 4080 wrote to memory of 1360 4080 1e4f96701c34b11c40dbc60df7a269bf21f1f9e6d48319c6c5a295cc6cfd7bc6_NeikiAnalytics.exe 106 PID 1360 wrote to memory of 4600 1360 csrss.exe 107 PID 1360 wrote to memory of 4600 1360 csrss.exe 107 PID 1360 wrote to memory of 4600 1360 csrss.exe 107 PID 1360 wrote to memory of 4612 1360 csrss.exe 113 PID 1360 wrote to memory of 4612 1360 csrss.exe 113 PID 1360 wrote to memory of 4612 1360 csrss.exe 113 PID 1360 wrote to memory of 4256 1360 csrss.exe 115 PID 1360 wrote to memory of 4256 1360 csrss.exe 115 PID 1360 wrote to memory of 4256 1360 csrss.exe 115 PID 1360 wrote to memory of 3016 1360 csrss.exe 117 PID 1360 wrote to memory of 3016 1360 csrss.exe 117 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\1e4f96701c34b11c40dbc60df7a269bf21f1f9e6d48319c6c5a295cc6cfd7bc6_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\1e4f96701c34b11c40dbc60df7a269bf21f1f9e6d48319c6c5a295cc6cfd7bc6_NeikiAnalytics.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3980 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2752
-
-
C:\Users\Admin\AppData\Local\Temp\1e4f96701c34b11c40dbc60df7a269bf21f1f9e6d48319c6c5a295cc6cfd7bc6_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\1e4f96701c34b11c40dbc60df7a269bf21f1f9e6d48319c6c5a295cc6cfd7bc6_NeikiAnalytics.exe"2⤵
- Adds Run key to start application
- Checks for VirtualBox DLLs, possible anti-VM trick
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4080 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Drops file in System32 directory
- Command and Scripting Interpreter: PowerShell
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3084
-
-
C:\Windows\system32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"3⤵
- Suspicious use of WriteProcessMemory
PID:3640 -
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes4⤵
- Modifies Windows Firewall
PID:4228
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Drops file in System32 directory
- Command and Scripting Interpreter: PowerShell
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3400
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Drops file in System32 directory
- Command and Scripting Interpreter: PowerShell
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2728
-
-
C:\Windows\rss\csrss.exeC:\Windows\rss\csrss.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Manipulates WinMonFS driver.
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1360 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Command and Scripting Interpreter: PowerShell
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4600
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F4⤵
- Creates scheduled task(s)
PID:1296
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /delete /tn ScheduledUpdate /f4⤵PID:1712
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Command and Scripting Interpreter: PowerShell
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4612
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Command and Scripting Interpreter: PowerShell
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4256
-
-
C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exeC:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:3016
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F4⤵
- Creates scheduled task(s)
PID:2572
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
281KB
MD5d98e33b66343e7c96158444127a117f6
SHA1bb716c5509a2bf345c6c1152f6e3e1452d39d50d
SHA2565de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1
SHA512705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log
Filesize2KB
MD5968cb9309758126772781b83adb8a28f
SHA18da30e71accf186b2ba11da1797cf67f8f78b47c
SHA25692099c10776bb7e3f2a8d1b82d4d40d0c4627e4f1bf754a6e58dfd2c2e97042a
SHA5124bd50732f8af4d688d95999bddfd296115d7033ddc38f86c9fb1f47fde202bffa27e9088bebcaa3064ca946af2f5c1ca6cbde49d0907f0005c7ab42874515dd3
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5783f9bcaff0082fa8069e8500f10e13c
SHA1ac9c3079923206f0c248b93a9aa52581ce0fc0a2
SHA2561e6ebbaf08ffffdbe60067546d2ee81144d375ee132a6e86cf229d6ffb15fd8b
SHA5120d469f044531885ed631fd289037d20d47e8ce28dfca0074bcd5eee89dbc1646ed9b4bcad00c1a5a6143c83757b54cfac098123ecd848d45ee052d74c71cae49
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5288c87ff0f147fa7316c56c6bbf36962
SHA19b86683df56ccaa80c9f755e644892647447234e
SHA256a860691a681b7afbfc98567476d9b406429c906ae17720ad421796a7d1f75a05
SHA512983bc73e42715b2d67d644c45ddc842b9f3a13c35a270b302302d5913e27730f8df90f030d1b3e08bda6910891ef46e4d07e06aa04ed73385d4c34a0fc898804
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD53e79baaf52957092c807912d73c79045
SHA12ec533d7ca4f96609313b0909bf0f10839df8cdd
SHA2562c5538e2e6646c39a02bcb77760aa479816b36d9e110471000804d8d7e3e0a08
SHA5123424b008f1f5f43c6e9e9a9298cc4fdda79efc72dff550191b6de0f1e9fc7d6c37f448ede47013e8a5a41ad32b40ad58235dd891d0c8cdf516c9897f481fdac7
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD56dcbed88037abe82982c545e2ade5d22
SHA129193dd2a9aaa712bb7524c224fc9ca5799cd9ac
SHA25686d139684611ee07e6e36870b4235bf904396ca653dfac03e78cf2b62441ecc5
SHA512a486867de42fa597aea77d6cc032630c4042afcd05ab459652aaf2d2cfeeefda024845d9bacfe27aad4b5d6d894b41ceab2e819bc9b842549c5b651f684c66dc
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5de1cd869db7a3844b8925e893695db4e
SHA161adbfafeb278f02f75a9070c1e194f3e89e7e7d
SHA2565b74b1a684d3c0e8b557c1972864fbf1d84b6882b6e712afa22b62c1671d0e83
SHA5120c3c7e5a9ac886b54d10e17be63108b3c7505927650f10c334bbbc6e99a96638fc8f0a27f08292c2df9298756989fcfce84a39f8f072cdfcedf48a1cb125e039
-
Filesize
4.1MB
MD53e47a07813ad8b2b6f0734896ebde9d0
SHA119e00ceb9bbdb42752f6d6dc723a6718854f3f27
SHA2561e4f96701c34b11c40dbc60df7a269bf21f1f9e6d48319c6c5a295cc6cfd7bc6
SHA5124e3d56db85bf28a07273bb46b4437cbd059fd409a809a8067ac4166f7f1adde930a429d24f39aa2149a238dec8fe1cf59dd268ac3c69fab7efc020d53848b74c