Analysis

  • max time kernel
    119s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    21/05/2024, 12:39

General

  • Target

    4cb3ba825b1fd0b88d02af7ecb1a7cd6e367c6684baffa5d3c98f037d2e5f748_NeikiAnalytics.exe

  • Size

    91KB

  • MD5

    256f14fa9fe7b9d368cd067ecded2de0

  • SHA1

    ca3d237606bf17de27862dc027e001c92240097e

  • SHA256

    4cb3ba825b1fd0b88d02af7ecb1a7cd6e367c6684baffa5d3c98f037d2e5f748

  • SHA512

    805aaabab98311d9d008ea3d07fc020eae4ae09683db0d785cc50f09c6a61d71023259f8a2b043fcc415c4b0a7385a2a9904ceed1516da76bfc07f06d4db4509

  • SSDEEP

    768:E3gRYjXbUeHORIC4ZxBMldNKm8Mxm8I+IxrjPfAQ4o3ImumB3gRYjXbUeHORIC40:uT3OA3+KQsxfS4nT3OA3+KQsxfS4u

Score
10/10

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 2 IoCs
  • Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Disables RegEdit via registry modification 2 IoCs
  • Disables use of System Restore points 1 TTPs
  • Executes dropped EXE 7 IoCs
  • Loads dropped DLL 12 IoCs
  • Modifies system executable filetype association 2 TTPs 13 IoCs
  • Adds Run key to start application 2 TTPs 5 IoCs
  • Drops file in System32 directory 6 IoCs
  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Control Panel 4 IoCs
  • Modifies registry class 15 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs
  • System policy modification 1 TTPs 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4cb3ba825b1fd0b88d02af7ecb1a7cd6e367c6684baffa5d3c98f037d2e5f748_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\4cb3ba825b1fd0b88d02af7ecb1a7cd6e367c6684baffa5d3c98f037d2e5f748_NeikiAnalytics.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Modifies visibility of file extensions in Explorer
    • Modifies visiblity of hidden/system files in Explorer
    • Disables RegEdit via registry modification
    • Loads dropped DLL
    • Modifies system executable filetype association
    • Adds Run key to start application
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies Control Panel
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    • System policy modification
    PID:2368
    • C:\Windows\xk.exe
      C:\Windows\xk.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:2832
    • C:\Windows\SysWOW64\IExplorer.exe
      C:\Windows\system32\IExplorer.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:1256
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:832
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:544
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:1540
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:1048
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:1676

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\WINDOWS\WINLOGON.EXE

    Filesize

    91KB

    MD5

    c3e106d202e3e73ad408fb96a2ad9ce0

    SHA1

    1baaa0de53f9de8ea7bfbb51fae4c23a0973fcc3

    SHA256

    6c507b79cafeb71158fc43fa22e9665ca2e5b3a44cfcb4f1cc4f6ab65843f16b

    SHA512

    c2e2082bfdfcd3c0a5432560479672fd44bea56e335fffabffdfc29da6e74fa341da04e1110d4cfff2d96b7aa0a182f2d3450c20b54d0d0a25648551dd4b0aec

  • C:\Users\Admin\AppData\Local\winlogon.exe

    Filesize

    91KB

    MD5

    256f14fa9fe7b9d368cd067ecded2de0

    SHA1

    ca3d237606bf17de27862dc027e001c92240097e

    SHA256

    4cb3ba825b1fd0b88d02af7ecb1a7cd6e367c6684baffa5d3c98f037d2e5f748

    SHA512

    805aaabab98311d9d008ea3d07fc020eae4ae09683db0d785cc50f09c6a61d71023259f8a2b043fcc415c4b0a7385a2a9904ceed1516da76bfc07f06d4db4509

  • C:\Windows\xk.exe

    Filesize

    91KB

    MD5

    743e430252b7b1aa6686b1d68fef5666

    SHA1

    bfe2568568ff02b8b8403511d68341dd3b31b1be

    SHA256

    2d42bc1ddf1a3c4e01aa524f69a27e253096af6314d83f967c5591f8b827c0aa

    SHA512

    18873ea7cd47f72364244f4160f4c6725702e249cad399f659cbfaf2fb17f01d8e3e03aa977f881dfbe907e063104791eaaa01262b056ab47d5a956ad0e4c521

  • \Users\Admin\AppData\Local\WINDOWS\CSRSS.EXE

    Filesize

    91KB

    MD5

    1731da94d0fbff173257e12c638f3474

    SHA1

    a585501d33813a522818e9d33005ade01ae3287a

    SHA256

    3008a1d157429b5ccf57357c97e6114a97cd8dc37eb9fe35c7f084df641de437

    SHA512

    6f094e6deaad8bdf9321c059db3117fd72417596065e828236c5e5ed3b95106edd437d74077479c5f86bfab175d62dd5ad6a31cecf9bdd91f7e461b9278bc781

  • \Users\Admin\AppData\Local\WINDOWS\LSASS.EXE

    Filesize

    91KB

    MD5

    1efce74331a90a1bcc4452ba12d30587

    SHA1

    29c3d5822099cc7b52b4f4c6a0ee6d083b55210f

    SHA256

    66bd656ee4cd582bbefacec26a00e2702173bb65e4e948ec0c01cae7cf3e82bc

    SHA512

    db66c4118e9aa2e50684972db02469120c4ead51ecfb324e39ce0351b87369a3609db039bd4bed2750f498e37cc0ba1d4311f3f5595daf1eefac65353cc83200

  • \Users\Admin\AppData\Local\WINDOWS\SERVICES.EXE

    Filesize

    91KB

    MD5

    be112b7b624190c753b77240ad404f15

    SHA1

    02441d911121abf361b20c7011915567ff4b20a1

    SHA256

    2c92fe3276145e27f80695fd2f45b8befcfb67738c3821a957ec5eaee7096f90

    SHA512

    bcbea3dd870d9490056d47be3ec1c6d8ca3519fd0395847ef15cbdc9617fa857e67660b21aac064e5aef700e77ee4e8e25649cb3cee724bb5db891a74d65554c

  • \Users\Admin\AppData\Local\WINDOWS\SMSS.EXE

    Filesize

    91KB

    MD5

    a416548b8ec0a8a0ebe58f80b2cf2c23

    SHA1

    9308e84b0702c2b542fb3e263dd985c2cec078cb

    SHA256

    a946c01b87ec7fcd0e5beb7287a13bbc4eb2610ae552bf977af6494a9a10d2ce

    SHA512

    df7fa165a1f94de9947afe457feafee07e09cbb4b5d47c99d1488f7c61fc1f1407ea26d907e47a7ed5f901e2dd47c658800805b3bdf1cddab32f86818cff301d

  • \Windows\SysWOW64\IExplorer.exe

    Filesize

    91KB

    MD5

    e671e5c3a6ddca84a4a684affa0b640a

    SHA1

    f5bf044622d0f518023a5996eef9f4d029ab7ed1

    SHA256

    b93461c52896a414230a04dd9b9e521f27e23f80566a34b90dc735611da74119

    SHA512

    068115b2b78f0160c5db13a29ba8167dea4053746de4cce6ad1b92fda636803862696dd339e0166ee7a3a7539e77e992d30a0ed0a725e0fe5d911fa34f6c6f4c

  • memory/544-163-0x0000000072940000-0x0000000072A93000-memory.dmp

    Filesize

    1.3MB

  • memory/544-169-0x0000000000400000-0x000000000042C000-memory.dmp

    Filesize

    176KB

  • memory/544-167-0x0000000000400000-0x000000000042C000-memory.dmp

    Filesize

    176KB

  • memory/832-155-0x0000000000400000-0x000000000042C000-memory.dmp

    Filesize

    176KB

  • memory/832-147-0x0000000072940000-0x0000000072A93000-memory.dmp

    Filesize

    1.3MB

  • memory/832-151-0x0000000000400000-0x000000000042C000-memory.dmp

    Filesize

    176KB

  • memory/1048-195-0x0000000000400000-0x000000000042C000-memory.dmp

    Filesize

    176KB

  • memory/1048-189-0x0000000072940000-0x0000000072A93000-memory.dmp

    Filesize

    1.3MB

  • memory/1048-197-0x0000000000400000-0x000000000042C000-memory.dmp

    Filesize

    176KB

  • memory/1256-132-0x0000000072940000-0x0000000072A93000-memory.dmp

    Filesize

    1.3MB

  • memory/1256-144-0x0000000000400000-0x000000000042C000-memory.dmp

    Filesize

    176KB

  • memory/1540-181-0x0000000000400000-0x000000000042C000-memory.dmp

    Filesize

    176KB

  • memory/1540-177-0x0000000072940000-0x0000000072A93000-memory.dmp

    Filesize

    1.3MB

  • memory/1540-199-0x0000000000400000-0x000000000042C000-memory.dmp

    Filesize

    176KB

  • memory/1676-212-0x0000000000400000-0x000000000042C000-memory.dmp

    Filesize

    176KB

  • memory/1676-207-0x0000000072940000-0x0000000072A93000-memory.dmp

    Filesize

    1.3MB

  • memory/2368-194-0x0000000002340000-0x000000000236C000-memory.dmp

    Filesize

    176KB

  • memory/2368-0-0x0000000000400000-0x000000000042C000-memory.dmp

    Filesize

    176KB

  • memory/2368-134-0x0000000002340000-0x000000000236C000-memory.dmp

    Filesize

    176KB

  • memory/2368-214-0x0000000000400000-0x000000000042C000-memory.dmp

    Filesize

    176KB

  • memory/2368-113-0x0000000002340000-0x000000000236C000-memory.dmp

    Filesize

    176KB

  • memory/2368-115-0x0000000002340000-0x000000000236C000-memory.dmp

    Filesize

    176KB

  • memory/2368-215-0x0000000000401000-0x0000000000427000-memory.dmp

    Filesize

    152KB

  • memory/2368-4-0x0000000000401000-0x0000000000427000-memory.dmp

    Filesize

    152KB

  • memory/2368-146-0x0000000002340000-0x000000000236C000-memory.dmp

    Filesize

    176KB

  • memory/2368-1-0x0000000000020000-0x0000000000024000-memory.dmp

    Filesize

    16KB

  • memory/2368-161-0x0000000000401000-0x0000000000427000-memory.dmp

    Filesize

    152KB

  • memory/2368-193-0x0000000002340000-0x000000000236C000-memory.dmp

    Filesize

    176KB

  • memory/2368-2-0x0000000072940000-0x0000000072A93000-memory.dmp

    Filesize

    1.3MB

  • memory/2368-3-0x0000000000400000-0x000000000042C000-memory.dmp

    Filesize

    176KB

  • memory/2368-162-0x0000000002340000-0x000000000236C000-memory.dmp

    Filesize

    176KB

  • memory/2832-120-0x0000000000400000-0x000000000042C000-memory.dmp

    Filesize

    176KB

  • memory/2832-125-0x0000000000400000-0x000000000042C000-memory.dmp

    Filesize

    176KB

  • memory/2832-116-0x0000000000400000-0x000000000042C000-memory.dmp

    Filesize

    176KB

  • memory/2832-117-0x0000000000400000-0x000000000042C000-memory.dmp

    Filesize

    176KB

  • memory/2832-118-0x0000000072940000-0x0000000072A93000-memory.dmp

    Filesize

    1.3MB