Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21/05/2024, 12:39

General

  • Target

    4cb3ba825b1fd0b88d02af7ecb1a7cd6e367c6684baffa5d3c98f037d2e5f748_NeikiAnalytics.exe

  • Size

    91KB

  • MD5

    256f14fa9fe7b9d368cd067ecded2de0

  • SHA1

    ca3d237606bf17de27862dc027e001c92240097e

  • SHA256

    4cb3ba825b1fd0b88d02af7ecb1a7cd6e367c6684baffa5d3c98f037d2e5f748

  • SHA512

    805aaabab98311d9d008ea3d07fc020eae4ae09683db0d785cc50f09c6a61d71023259f8a2b043fcc415c4b0a7385a2a9904ceed1516da76bfc07f06d4db4509

  • SSDEEP

    768:E3gRYjXbUeHORIC4ZxBMldNKm8Mxm8I+IxrjPfAQ4o3ImumB3gRYjXbUeHORIC40:uT3OA3+KQsxfS4nT3OA3+KQsxfS4u

Score
10/10

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 2 IoCs
  • Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Disables RegEdit via registry modification 2 IoCs
  • Disables use of System Restore points 1 TTPs
  • Executes dropped EXE 7 IoCs
  • Modifies system executable filetype association 2 TTPs 13 IoCs
  • Adds Run key to start application 2 TTPs 5 IoCs
  • Drops file in System32 directory 6 IoCs
  • Drops file in Windows directory 2 IoCs
  • Modifies Control Panel 4 IoCs
  • Modifies registry class 15 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs
  • System policy modification 1 TTPs 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4cb3ba825b1fd0b88d02af7ecb1a7cd6e367c6684baffa5d3c98f037d2e5f748_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\4cb3ba825b1fd0b88d02af7ecb1a7cd6e367c6684baffa5d3c98f037d2e5f748_NeikiAnalytics.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Modifies visibility of file extensions in Explorer
    • Modifies visiblity of hidden/system files in Explorer
    • Disables RegEdit via registry modification
    • Modifies system executable filetype association
    • Adds Run key to start application
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies Control Panel
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    • System policy modification
    PID:5072
    • C:\Windows\xk.exe
      C:\Windows\xk.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:2096
    • C:\Windows\SysWOW64\IExplorer.exe
      C:\Windows\system32\IExplorer.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:3244
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:4116
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:3692
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:1876
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:2752
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:448

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\WINDOWS\CSRSS.EXE

    Filesize

    91KB

    MD5

    ea771bdd04f61263bee939a57d1a5bbc

    SHA1

    e943630964e256cd942de3413fbcc28ee1b51a62

    SHA256

    e5014b1d1a4b1eefe613fff886eab5703f218035ba3e0a7f3a1f72ea88d3d53f

    SHA512

    384546c92576c87dc8a37036ed4762245a77e7077cb263dbab200ba35da72fc7bafb20286537b36071039ec98a87a359b0719261a627234c81a97758981d7aea

  • C:\Users\Admin\AppData\Local\WINDOWS\LSASS.EXE

    Filesize

    91KB

    MD5

    cf84a2c79ef66ae562501e0807514cf3

    SHA1

    4ebabcca52e62207874e664f7c0bfe6e63994ebe

    SHA256

    1df7c7c19ad4e2283bf1f144f02a64ba53cafc7bbe97a19903361438599063ea

    SHA512

    67d67f1d28f38ff558f9ba6aecbb63c20f35d947186d8043992437b6f30711619f7f74d6219442e0aca0b1e6b362958210549fbdbbb08a92dc6c6eca9172f13c

  • C:\Users\Admin\AppData\Local\WINDOWS\SERVICES.EXE

    Filesize

    91KB

    MD5

    1eb91528299a0a7b874a0f0671755f72

    SHA1

    b48075ad284fe674deea8c04f9a22bde40c64979

    SHA256

    986ab7887805528149ea105a29ba1010e231a9344f6521be0718b3c803026d29

    SHA512

    4ac7fa8569dd57800b1862dac570916c0b2f7d329907ee28ee881037fee9d27f728011dd78656dffe4544d87758130e79468dd1d0e6887dc73688798e8e7193b

  • C:\Users\Admin\AppData\Local\WINDOWS\SMSS.EXE

    Filesize

    91KB

    MD5

    722971c835dfce1ac962daad1a78ec13

    SHA1

    b62d451f929f2b543f98b2c66cb3291558d5c65b

    SHA256

    a21af4652e4f046be6529d589d269f2d07f05d9f557a42826dd2ae745b0b2936

    SHA512

    7892dc353218301bcd17107ba8ead5bb03654b0baf7f785f8f519034f3195862334cfa1b73b38fd35991c26cdb42d3d631643081cdf983035bd652a2246fe914

  • C:\Users\Admin\AppData\Local\WINDOWS\WINLOGON.EXE

    Filesize

    91KB

    MD5

    7914b22824d49f99b02361b641164258

    SHA1

    393749d7b663daf1c738f5f7a9685ed00fc18fcf

    SHA256

    e595a9a3673c11e9d395e493a6614bef2d6119a7f5e9c18d4a27754b4b1d3233

    SHA512

    812873a1745163cd89e76e90dfaa4d072c4f154224e840ea1eea40b381157f43de5746e5a42f453a8703c4ae827063c272e00e63a9a738b569cf0b5275b2c2f1

  • C:\Users\Admin\AppData\Local\winlogon.exe

    Filesize

    91KB

    MD5

    256f14fa9fe7b9d368cd067ecded2de0

    SHA1

    ca3d237606bf17de27862dc027e001c92240097e

    SHA256

    4cb3ba825b1fd0b88d02af7ecb1a7cd6e367c6684baffa5d3c98f037d2e5f748

    SHA512

    805aaabab98311d9d008ea3d07fc020eae4ae09683db0d785cc50f09c6a61d71023259f8a2b043fcc415c4b0a7385a2a9904ceed1516da76bfc07f06d4db4509

  • C:\Windows\SysWOW64\IExplorer.exe

    Filesize

    91KB

    MD5

    dec1e6fff20356383e8e43be0d158bb2

    SHA1

    777dc650a883da06236775cf828657be37822bfa

    SHA256

    6ed4c4a2b9e5ca4375822793e235705dc966c86bb34e858f0dd262211f63b0cf

    SHA512

    95821264db5b5010eed2a24edd992c8253d811d12bd0e99cacaf4be80c97cc815312f5f91ab0bfd10849d7023741a28b12f4da98ea75b9970ed55e8d9b7effff

  • C:\Windows\xk.exe

    Filesize

    91KB

    MD5

    022b10eeaa5218ceb0e71c30b51aa1e2

    SHA1

    61794d2658399c169bba38fbd46b54473a24fc71

    SHA256

    9d5f6bd9a9a6f50aad3299e3e4c67bd5fd15fbe6ec92bf91dd5c449d5bf4106a

    SHA512

    59f2642b1b4c29d2a1f65e6c2c4b198e9b9c469f40b838f878474348486e6fb7f0f47320329629c36e3fb2bce11a260aafe1a183f7ded7ad57485eb178bfe02e

  • memory/448-174-0x0000000075840000-0x000000007599D000-memory.dmp

    Filesize

    1.4MB

  • memory/448-179-0x0000000000400000-0x000000000042C000-memory.dmp

    Filesize

    176KB

  • memory/1876-159-0x0000000000400000-0x000000000042C000-memory.dmp

    Filesize

    176KB

  • memory/1876-155-0x0000000075840000-0x000000007599D000-memory.dmp

    Filesize

    1.4MB

  • memory/1876-161-0x0000000000400000-0x000000000042C000-memory.dmp

    Filesize

    176KB

  • memory/2096-118-0x0000000000400000-0x000000000042C000-memory.dmp

    Filesize

    176KB

  • memory/2096-112-0x0000000075840000-0x000000007599D000-memory.dmp

    Filesize

    1.4MB

  • memory/2096-114-0x0000000000400000-0x000000000042C000-memory.dmp

    Filesize

    176KB

  • memory/2752-165-0x0000000075840000-0x000000007599D000-memory.dmp

    Filesize

    1.4MB

  • memory/2752-172-0x0000000000400000-0x000000000042C000-memory.dmp

    Filesize

    176KB

  • memory/3244-122-0x0000000000400000-0x000000000042C000-memory.dmp

    Filesize

    176KB

  • memory/3244-128-0x0000000000400000-0x000000000042C000-memory.dmp

    Filesize

    176KB

  • memory/3244-123-0x0000000075840000-0x000000007599D000-memory.dmp

    Filesize

    1.4MB

  • memory/3692-143-0x0000000075840000-0x000000007599D000-memory.dmp

    Filesize

    1.4MB

  • memory/3692-149-0x0000000000400000-0x000000000042C000-memory.dmp

    Filesize

    176KB

  • memory/3692-145-0x0000000000400000-0x000000000042C000-memory.dmp

    Filesize

    176KB

  • memory/4116-133-0x0000000075840000-0x000000007599D000-memory.dmp

    Filesize

    1.4MB

  • memory/4116-137-0x0000000000400000-0x000000000042C000-memory.dmp

    Filesize

    176KB

  • memory/4116-139-0x0000000000400000-0x000000000042C000-memory.dmp

    Filesize

    176KB

  • memory/4116-132-0x0000000000400000-0x000000000042C000-memory.dmp

    Filesize

    176KB

  • memory/5072-152-0x00000000001C0000-0x00000000001C4000-memory.dmp

    Filesize

    16KB

  • memory/5072-4-0x0000000000401000-0x0000000000427000-memory.dmp

    Filesize

    152KB

  • memory/5072-0-0x0000000000400000-0x000000000042C000-memory.dmp

    Filesize

    176KB

  • memory/5072-2-0x0000000075840000-0x000000007599D000-memory.dmp

    Filesize

    1.4MB

  • memory/5072-154-0x0000000000401000-0x0000000000427000-memory.dmp

    Filesize

    152KB

  • memory/5072-3-0x0000000000400000-0x000000000042C000-memory.dmp

    Filesize

    176KB

  • memory/5072-1-0x00000000001C0000-0x00000000001C4000-memory.dmp

    Filesize

    16KB

  • memory/5072-182-0x0000000000401000-0x0000000000427000-memory.dmp

    Filesize

    152KB

  • memory/5072-181-0x0000000000400000-0x000000000042C000-memory.dmp

    Filesize

    176KB