Analysis
-
max time kernel
149s -
max time network
159s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
21-05-2024 19:22
Static task
static1
Behavioral task
behavioral1
Sample
05d22138a6922cbc0c339ef57fb353e0_NeikiAnalytics.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
05d22138a6922cbc0c339ef57fb353e0_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
05d22138a6922cbc0c339ef57fb353e0_NeikiAnalytics.exe
-
Size
231KB
-
MD5
05d22138a6922cbc0c339ef57fb353e0
-
SHA1
cad9b303363c160e75113145343e8b19d04759c2
-
SHA256
4d8ea5461e52e03df266085b391128585fb821d1b1e25165cad83c332cbb4a1c
-
SHA512
0e1332709cf63ff7e704e605f05fb7dc6436a0c051d3fe171ce1eaa640fb13aa063dd536b5896fb7ed6bde60d4aa1cc2c4d0a9dbcbe5d63869df82a8f0e1565c
-
SSDEEP
6144:x0CshD7CcAxBKfylXLeXGIpbmIIGSWcBGR/Dlv:eLhPCdBaIXLYGimPGSfB4pv
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
Processes:
svchost.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\apppatch\\svchost.exe," svchost.exe -
Executes dropped EXE 1 IoCs
Processes:
svchost.exepid process 1272 svchost.exe -
Loads dropped DLL 2 IoCs
Processes:
05d22138a6922cbc0c339ef57fb353e0_NeikiAnalytics.exepid process 3068 05d22138a6922cbc0c339ef57fb353e0_NeikiAnalytics.exe 3068 05d22138a6922cbc0c339ef57fb353e0_NeikiAnalytics.exe -
Modifies WinLogon 2 TTPs 2 IoCs
Processes:
05d22138a6922cbc0c339ef57fb353e0_NeikiAnalytics.exesvchost.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\59874 = "B\u008d¶r?iÝ—H" 05d22138a6922cbc0c339ef57fb353e0_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\59874 = "B\u008d¶r?iÝ—H" svchost.exe -
Drops file in Windows directory 2 IoCs
Processes:
05d22138a6922cbc0c339ef57fb353e0_NeikiAnalytics.exedescription ioc process File created C:\Windows\apppatch\svchost.exe 05d22138a6922cbc0c339ef57fb353e0_NeikiAnalytics.exe File opened for modification C:\Windows\apppatch\svchost.exe 05d22138a6922cbc0c339ef57fb353e0_NeikiAnalytics.exe -
Processes:
svchost.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8 svchost.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8\Blob = 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 svchost.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13 svchost.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13\Blob = 040000000100000010000000410352dc0ff7501b16f0028eba6f45c50f00000001000000140000005bcaa1c2780f0bcb5a90770451d96f38963f012d0b000000010000001e000000440053005400200052006f006f0074002000430041002000580033000000090000000100000016000000301406082b0601050507030406082b06010505070301140000000100000014000000c4a7b1a47b2c71fadbe14b9075ffc415608589101d00000001000000100000004558d512eecb27464920897de7b66053030000000100000014000000dac9024f54d8f6df94935fb1732638ca6ad77c131900000001000000100000006cf252fec3e8f20996de5d4dd9aef42420000000010000004e0300003082034a30820232a003020102021044afb080d6a327ba893039862ef8406b300d06092a864886f70d0101050500303f31243022060355040a131b4469676974616c205369676e617475726520547275737420436f2e311730150603550403130e44535420526f6f74204341205833301e170d3030303933303231313231395a170d3231303933303134303131355a303f31243022060355040a131b4469676974616c205369676e617475726520547275737420436f2e311730150603550403130e44535420526f6f7420434120583330820122300d06092a864886f70d01010105000382010f003082010a0282010100dfafe99750088357b4cc6265f69082ecc7d32c6b30ca5becd9c37dc740c118148be0e83376492ae33f214993ac4e0eaf3e48cb65eefcd3210f65d22ad9328f8ce5f777b0127bb595c089a3a9baed732e7a0c063283a27e8a1430cd11a0e12a38b9790a31fd50bd8065dfb7516383c8e28861ea4b6181ec526bb9a2e24b1a289f48a39e0cda098e3e172e1edd20df5bc62a8aab2ebd70adc50b1a25907472c57b6aab34d63089ffe568137b540bc8d6aeec5a9c921e3d64b38cc6dfbfc94170ec1672d526ec38553943d0fcfd185c40f197ebd59a9b8d1dbada25b9c6d8dfc115023aabda6ef13e2ef55c089c3cd68369e4109b192ab62957e3e53d9b9ff0025d0203010001a3423040300f0603551d130101ff040530030101ff300e0603551d0f0101ff040403020106301d0603551d0e04160414c4a7b1a47b2c71fadbe14b9075ffc41560858910300d06092a864886f70d01010505000382010100a31a2c9b17005ca91eee2866373abf83c73f4bc309a095205de3d95944d23e0d3ebd8a4ba0741fce10829c741a1d7e981addcb134bb32044e491e9ccfc7da5db6ae5fee6fde04eddb7003ab57049aff2e5eb02f1d1028b19cb943a5e48c4181e58195f1e025af00cf1b1ada9dc59868b6ee991f586cafab96633aa595bcee2a7167347cb2bcc99b03748cfe3564bf5cf0f0c723287c6f044bb53726d43f526489a5267b758abfe67767178db0da256141339243185a2a8025a3047e1dd5007bc02099000eb6463609b16bc88c912e6d27d918bf93d328d65b4e97cb15776eac5b62839bf15651cc8f677966a0a8d770bd8910b048e07db29b60aee9d82353510 svchost.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
05d22138a6922cbc0c339ef57fb353e0_NeikiAnalytics.exesvchost.exepid process 3068 05d22138a6922cbc0c339ef57fb353e0_NeikiAnalytics.exe 3068 05d22138a6922cbc0c339ef57fb353e0_NeikiAnalytics.exe 3068 05d22138a6922cbc0c339ef57fb353e0_NeikiAnalytics.exe 3068 05d22138a6922cbc0c339ef57fb353e0_NeikiAnalytics.exe 1272 svchost.exe 1272 svchost.exe 1272 svchost.exe 1272 svchost.exe 1272 svchost.exe 1272 svchost.exe 1272 svchost.exe 1272 svchost.exe 1272 svchost.exe 1272 svchost.exe 1272 svchost.exe 1272 svchost.exe 1272 svchost.exe 1272 svchost.exe 1272 svchost.exe 1272 svchost.exe 1272 svchost.exe 1272 svchost.exe 1272 svchost.exe 1272 svchost.exe 1272 svchost.exe 1272 svchost.exe 1272 svchost.exe 1272 svchost.exe 1272 svchost.exe 1272 svchost.exe 1272 svchost.exe 1272 svchost.exe 1272 svchost.exe 1272 svchost.exe 1272 svchost.exe 1272 svchost.exe 1272 svchost.exe 1272 svchost.exe 1272 svchost.exe 1272 svchost.exe 1272 svchost.exe 1272 svchost.exe 1272 svchost.exe 1272 svchost.exe 1272 svchost.exe 1272 svchost.exe 1272 svchost.exe 1272 svchost.exe 1272 svchost.exe 1272 svchost.exe 1272 svchost.exe 1272 svchost.exe 1272 svchost.exe 1272 svchost.exe 1272 svchost.exe 1272 svchost.exe 1272 svchost.exe 1272 svchost.exe 1272 svchost.exe 1272 svchost.exe 1272 svchost.exe 1272 svchost.exe 1272 svchost.exe 1272 svchost.exe -
Suspicious behavior: RenamesItself 1 IoCs
Processes:
05d22138a6922cbc0c339ef57fb353e0_NeikiAnalytics.exepid process 3068 05d22138a6922cbc0c339ef57fb353e0_NeikiAnalytics.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
05d22138a6922cbc0c339ef57fb353e0_NeikiAnalytics.exedescription pid process target process PID 3068 wrote to memory of 1272 3068 05d22138a6922cbc0c339ef57fb353e0_NeikiAnalytics.exe svchost.exe PID 3068 wrote to memory of 1272 3068 05d22138a6922cbc0c339ef57fb353e0_NeikiAnalytics.exe svchost.exe PID 3068 wrote to memory of 1272 3068 05d22138a6922cbc0c339ef57fb353e0_NeikiAnalytics.exe svchost.exe PID 3068 wrote to memory of 1272 3068 05d22138a6922cbc0c339ef57fb353e0_NeikiAnalytics.exe svchost.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\05d22138a6922cbc0c339ef57fb353e0_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\05d22138a6922cbc0c339ef57fb353e0_NeikiAnalytics.exe"1⤵
- Loads dropped DLL
- Modifies WinLogon
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:3068 -
C:\Windows\apppatch\svchost.exe"C:\Windows\apppatch\svchost.exe"2⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Modifies WinLogon
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
PID:1272
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e9a98e7e4fc84e7429f860a78da7f816
SHA15bf2c132a2be6975914508438312f1431ca7210f
SHA256dc18bd91b50dd5b24dba3a07657d2f8eec87f343880be78c815e6a390794b4a9
SHA5129cd6b90a3efe83b926c229330fc667e1f16aa9a809686d90dfc03d8acb9f440f3de18c3e96b0653200a25cf0e3e48a6bfd8eb71d30c982b1efc96bcfa1336452
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59e9677c0c59815b325026b8a6a905ff4
SHA18c23b26bbef9a380636c9dc7cdfc6ed15bdc4a2a
SHA256a386d05375e7b5c9bfc1064fa85b723e82dd51c4f32ceb8f09922470c59486e5
SHA51263b5471f92df3dc3f85dacc1beb42c9f2c2f6fe9e4cbc30d61f7adea4bf0441f7a4dc713f42df2b4cd684d0d520eb1fa7caaf43c423fedcb0afe92a5f29c36cd
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\2XHJXO3H\login[2].htm
Filesize168B
MD5d57e3a550060f85d44a175139ea23021
SHA12c5cb3428a322c9709a34d04dd86fe7628f8f0a6
SHA25643edf068d34276e8ade4113d4d7207de19fc98a2ae1c07298e593edae2a8774c
SHA5120364fe6a010fce7a3f4a6344c84468c64b20fd131f3160fc649db78f1075ba52d8a1c4496e50dbe27c357e01ee52e94cdcda8f7927cba28d5f2f45b9da690063
-
Filesize
22KB
MD5a0d5f21d62a06412c3c96e9d2c47dede
SHA10d682f7878c9eb8bee84ff2b0fa7e778d347e066
SHA25602b1a6a208439241f68eb858068eb766d3eb14564941ad34fdb910f6205c2655
SHA5121b3ac607783431aa9b005e298deffc4d17e590313f311456ac557532b35af4f1ef2d9c38e38b8220bffc8c97b68bca5e560092ceadda4dd75bc4c38cfe5d282c
-
Filesize
593B
MD5926512864979bc27cf187f1de3f57aff
SHA1acdeb9d6187932613c7fa08eaf28f0cd8116f4b5
SHA256b3e893a653ec06c05ee90f2f6e98cc052a92f6616d7cca8c416420e178dcc73f
SHA512f6f9fd3ca9305bec879cfcd38e64111a18e65e30d25c49e9f2cd546cbab9b2dcd03eca81952f6b77c0eaab20192ef7bef0d8d434f6f371811929e75f8620633b
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
457B
MD5531ec87a0b2f9477a52d88b111d0d46a
SHA150a72e5752075309f91c062e0282a7e7cd1e751e
SHA2564875b451859b1eb8d0d3b040b1bb8d654d212edb6d9c721cf0f4372129579385
SHA51207994963fd76b31ef0ba2c7f418dcb3ee0290f6baca2d8ec63a6e6b861557b13fbc20d2f0a10a66f35c4d72d4d2c1920ac88b96174604f2f8856868912327da1
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a
-
Filesize
231KB
MD5fe1a206ad937c7da62a1b017f39c2343
SHA1e93ac2e329aa0130753986471661478f98f1b8f7
SHA2560940d6e441c0f4cdab668b5d67cb3c49ad75f01251be189ae002c9c26a43a1b8
SHA512b6d8d6192bb9fe5f2b1f6a707f14d2fa7c5d05ddf774ce55d3a513ea2340f0b606ccd241f1df704ed1598d4f3b69bfe64e583c4ae03cf4ec94b3d392838c475f