Analysis
-
max time kernel
149s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
21-05-2024 19:22
Static task
static1
Behavioral task
behavioral1
Sample
05d22138a6922cbc0c339ef57fb353e0_NeikiAnalytics.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
05d22138a6922cbc0c339ef57fb353e0_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
05d22138a6922cbc0c339ef57fb353e0_NeikiAnalytics.exe
-
Size
231KB
-
MD5
05d22138a6922cbc0c339ef57fb353e0
-
SHA1
cad9b303363c160e75113145343e8b19d04759c2
-
SHA256
4d8ea5461e52e03df266085b391128585fb821d1b1e25165cad83c332cbb4a1c
-
SHA512
0e1332709cf63ff7e704e605f05fb7dc6436a0c051d3fe171ce1eaa640fb13aa063dd536b5896fb7ed6bde60d4aa1cc2c4d0a9dbcbe5d63869df82a8f0e1565c
-
SSDEEP
6144:x0CshD7CcAxBKfylXLeXGIpbmIIGSWcBGR/Dlv:eLhPCdBaIXLYGimPGSfB4pv
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
Processes:
svchost.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\apppatch\\svchost.exe," svchost.exe -
Executes dropped EXE 1 IoCs
Processes:
svchost.exepid process 3116 svchost.exe -
Modifies WinLogon 2 TTPs 2 IoCs
Processes:
svchost.exe05d22138a6922cbc0c339ef57fb353e0_NeikiAnalytics.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\10a039e6 = "\x10QKäÈ_‹¸¼×‡\n\x13sIÎ?@¬Ï\x0fWâ3~t\a‰\x01\fŽÏg«\x1cÙ‘gÓ·\x19Ï$\x13\x01ß×_\x03‹<C\x19\x19dÏ+‰;ñ)ˬÓË1\x11Ó#\tI\x14‹\x03»3§·Ó#·¡Só\x01aùTœ,_óäk\x14C!\x13W_ÿ·K›\x1bS‹kÑ™s3“)[Ó\u0081‰\x7f/—iSùœ9ÑããëÏÓ)\x0fËs\x01,$\u0081\v$cI»a'ÌD\x11\x7f×1ã¡›\x111“\x19‹ù?\váQ!£üd\x13\x19$ã\tÿ«ƒ\x19\v\x19t£ŒéƒÓ—C\x19û©¡;k“É÷\x01Q¡‰IWÛ\x1cÓ\x04\fË“y™o—+A\u0081“ÔI+Á3sÑ‹Üû«a‹›\x11iã3\x1cÏé\v\x03sS¹·#Sä1‰c‰A„ÿëyK9" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\10a039e6 = "\x10QKäÈ_‹¸¼×‡\n\x13sIÎ?@¬Ï\x0fWâ3~t\a‰\x01\fŽÏg«\x1cÙ‘gÓ·\x19Ï$\x13\x01ß×_\x03‹<C\x19\x19dÏ+‰;ñ)ˬÓË1\x11Ó#\tI\x14‹\x03»3§·Ó#·¡Só\x01aùTœ,_óäk\x14C!\x13W_ÿ·K›\x1bS‹kÑ™s3“)[Ó\u0081‰\x7f/—iSùœ9ÑããëÏÓ)\x0fËs\x01,$\u0081\v$cI»a'ÌD\x11\x7f×1ã¡›\x111“\x19‹ù?\váQ!£üd\x13\x19$ã\tÿ«ƒ\x19\v\x19t£ŒéƒÓ—C\x19û©¡;k“É÷\x01Q¡‰IWÛ\x1cÓ\x04\fË“y™o—+A\u0081“ÔI+Á3sÑ‹Üû«a‹›\x11iã3\x1cÏé\v\x03sS¹·#Sä1‰c‰A„ÿëyK9" 05d22138a6922cbc0c339ef57fb353e0_NeikiAnalytics.exe -
Drops file in Windows directory 2 IoCs
Processes:
05d22138a6922cbc0c339ef57fb353e0_NeikiAnalytics.exedescription ioc process File created C:\Windows\apppatch\svchost.exe 05d22138a6922cbc0c339ef57fb353e0_NeikiAnalytics.exe File opened for modification C:\Windows\apppatch\svchost.exe 05d22138a6922cbc0c339ef57fb353e0_NeikiAnalytics.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
05d22138a6922cbc0c339ef57fb353e0_NeikiAnalytics.exesvchost.exepid process 2536 05d22138a6922cbc0c339ef57fb353e0_NeikiAnalytics.exe 2536 05d22138a6922cbc0c339ef57fb353e0_NeikiAnalytics.exe 2536 05d22138a6922cbc0c339ef57fb353e0_NeikiAnalytics.exe 2536 05d22138a6922cbc0c339ef57fb353e0_NeikiAnalytics.exe 2536 05d22138a6922cbc0c339ef57fb353e0_NeikiAnalytics.exe 2536 05d22138a6922cbc0c339ef57fb353e0_NeikiAnalytics.exe 2536 05d22138a6922cbc0c339ef57fb353e0_NeikiAnalytics.exe 2536 05d22138a6922cbc0c339ef57fb353e0_NeikiAnalytics.exe 3116 svchost.exe 3116 svchost.exe 3116 svchost.exe 3116 svchost.exe 3116 svchost.exe 3116 svchost.exe 3116 svchost.exe 3116 svchost.exe 3116 svchost.exe 3116 svchost.exe 3116 svchost.exe 3116 svchost.exe 3116 svchost.exe 3116 svchost.exe 3116 svchost.exe 3116 svchost.exe 3116 svchost.exe 3116 svchost.exe 3116 svchost.exe 3116 svchost.exe 3116 svchost.exe 3116 svchost.exe 3116 svchost.exe 3116 svchost.exe 3116 svchost.exe 3116 svchost.exe 3116 svchost.exe 3116 svchost.exe 3116 svchost.exe 3116 svchost.exe 3116 svchost.exe 3116 svchost.exe 3116 svchost.exe 3116 svchost.exe 3116 svchost.exe 3116 svchost.exe 3116 svchost.exe 3116 svchost.exe 3116 svchost.exe 3116 svchost.exe 3116 svchost.exe 3116 svchost.exe 3116 svchost.exe 3116 svchost.exe 3116 svchost.exe 3116 svchost.exe 3116 svchost.exe 3116 svchost.exe 3116 svchost.exe 3116 svchost.exe 3116 svchost.exe 3116 svchost.exe 3116 svchost.exe 3116 svchost.exe 3116 svchost.exe 3116 svchost.exe -
Suspicious behavior: RenamesItself 1 IoCs
Processes:
05d22138a6922cbc0c339ef57fb353e0_NeikiAnalytics.exepid process 2536 05d22138a6922cbc0c339ef57fb353e0_NeikiAnalytics.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
05d22138a6922cbc0c339ef57fb353e0_NeikiAnalytics.exedescription pid process target process PID 2536 wrote to memory of 3116 2536 05d22138a6922cbc0c339ef57fb353e0_NeikiAnalytics.exe svchost.exe PID 2536 wrote to memory of 3116 2536 05d22138a6922cbc0c339ef57fb353e0_NeikiAnalytics.exe svchost.exe PID 2536 wrote to memory of 3116 2536 05d22138a6922cbc0c339ef57fb353e0_NeikiAnalytics.exe svchost.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\05d22138a6922cbc0c339ef57fb353e0_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\05d22138a6922cbc0c339ef57fb353e0_NeikiAnalytics.exe"1⤵
- Modifies WinLogon
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:2536 -
C:\Windows\apppatch\svchost.exe"C:\Windows\apppatch\svchost.exe"2⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Modifies WinLogon
- Suspicious behavior: EnumeratesProcesses
PID:3116
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
168B
MD5d57e3a550060f85d44a175139ea23021
SHA12c5cb3428a322c9709a34d04dd86fe7628f8f0a6
SHA25643edf068d34276e8ade4113d4d7207de19fc98a2ae1c07298e593edae2a8774c
SHA5120364fe6a010fce7a3f4a6344c84468c64b20fd131f3160fc649db78f1075ba52d8a1c4496e50dbe27c357e01ee52e94cdcda8f7927cba28d5f2f45b9da690063
-
Filesize
593B
MD53b03d93d3487806337b5c6443ce7a62d
SHA193a7a790bb6348606cbdaf5daeaaf4ea8cf731d0
SHA2567392749832c70fcfc2d440d7afc2f880000dd564930d95d634eb1199fa15de30
SHA512770977beaeedafc5c98d0c32edc8c6c850f05e9f363bc9997fa73991646b02e5d40ceed0017b06caeab0db86423844bc4b0a9f0df2d8239230e423a7bfbd4a88
-
Filesize
1KB
MD50091dba950ce4525d24fc68ac6d2cccf
SHA109b26a5bfe5e947b6e483a2a5884699a3df57292
SHA2562ce91664b6aa97ef7e48d49cf41dbb2da3308a79b3f32d4aafb46af35ff86eef
SHA512543d52102acd1bc653397a03b0b2ad68fc7f9d269b02c502f0e052fb520be51b1cde91da3382528f24c8db5baf620ab4b8e83995c6af2b9f68136f048e4ef552
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
Filesize
457B
MD5531ec87a0b2f9477a52d88b111d0d46a
SHA150a72e5752075309f91c062e0282a7e7cd1e751e
SHA2564875b451859b1eb8d0d3b040b1bb8d654d212edb6d9c721cf0f4372129579385
SHA51207994963fd76b31ef0ba2c7f418dcb3ee0290f6baca2d8ec63a6e6b861557b13fbc20d2f0a10a66f35c4d72d4d2c1920ac88b96174604f2f8856868912327da1
-
Filesize
22KB
MD5d2c23f8d69589598be53b88799091eaa
SHA1e80f93eb2b53318f24b05f34e08243fc15735231
SHA256abec5e29994ffe59eb42e29ae78d010ed4b5cb55600abeec29ded2ff1f558417
SHA51233ac6a05ac3b3fb4b0cdbe92a97fa961ee00f9d5cdfb7f3e5283d94def41d9bc24d1ca8e807f35c479e8f8271907c4bdf9f3ede9214470104685b1b38e8edc72
-
Filesize
42KB
MD5a5ef40524927af8e37122ed5f7095c02
SHA136a39885d96a45a3fb890b54bb1a7d59ac396168
SHA256523819c7a601532a23bfa5eecb9fad2007df5c5c8dcacc77b5af210ab947f631
SHA51245854a80179b7a060cb947adbdad3db75e8ca2b9605c3cb033346aded47ae351f33b9f42c6b5a14cd3b7b125a4da653d94a3bb8ba169b7aedf5a3f26fec4f989
-
Filesize
593B
MD5926512864979bc27cf187f1de3f57aff
SHA1acdeb9d6187932613c7fa08eaf28f0cd8116f4b5
SHA256b3e893a653ec06c05ee90f2f6e98cc052a92f6616d7cca8c416420e178dcc73f
SHA512f6f9fd3ca9305bec879cfcd38e64111a18e65e30d25c49e9f2cd546cbab9b2dcd03eca81952f6b77c0eaab20192ef7bef0d8d434f6f371811929e75f8620633b
-
Filesize
231KB
MD5f0508470ab84c76b49863975a0c8a071
SHA13307bda3a164b4542fd50daea69bcfaf47e7ac8e
SHA256764735dd81ec4e6025d506f63b6a0e0e96d86f3a80ae65c7aef84b8247f5b168
SHA51234b74da82a2c16725d537ac4b954317f5eec01b99e4aeeddc6598ee759951d42acdf1e63439d6ea9c564ef505156b0ba064a5c1f427f47657a1a60bdfcabf3d2