Analysis

  • max time kernel
    150s
  • max time network
    103s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21-05-2024 20:51

General

  • Target

    0cf9066eec4de6047b393218eba0b380_NeikiAnalytics.exe

  • Size

    207KB

  • MD5

    0cf9066eec4de6047b393218eba0b380

  • SHA1

    b78bb01105052dcde889102bfab689994bfaa963

  • SHA256

    ba213013ab381e49a31b40450a66cabb3639f4a0e358adc29986722c9cdbb104

  • SHA512

    a9ceea225e4b4dd1a982e931ceeb525a309b2a589d126e85a4413858e06c57d1faf5653db7945e4f7c6e311c3e991bafc191e3ab3cdb65c9ab4175230391bab4

  • SSDEEP

    3072:5vEfVUzSLhIVbV6i5LirrlZrHyrUHUckoMQ2RN6unX:5vEN2U+T6i5LirrllHy4HUcMQY6c

Score
10/10

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 2 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Modifies Installed Components in the registry 2 TTPs 8 IoCs
  • Executes dropped EXE 4 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Drops file in Windows directory 6 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 2 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0cf9066eec4de6047b393218eba0b380_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\0cf9066eec4de6047b393218eba0b380_NeikiAnalytics.exe"
    1⤵
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4792
    • \??\c:\windows\system\explorer.exe
      c:\windows\system\explorer.exe
      2⤵
      • Modifies WinLogon for persistence
      • Modifies visiblity of hidden/system files in Explorer
      • Modifies Installed Components in the registry
      • Executes dropped EXE
      • Adds Run key to start application
      • Drops file in Windows directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:4056
      • \??\c:\windows\system\spoolsv.exe
        c:\windows\system\spoolsv.exe SE
        3⤵
        • Executes dropped EXE
        • Drops file in Windows directory
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1564
        • \??\c:\windows\system\svchost.exe
          c:\windows\system\svchost.exe
          4⤵
          • Modifies WinLogon for persistence
          • Modifies visiblity of hidden/system files in Explorer
          • Modifies Installed Components in the registry
          • Executes dropped EXE
          • Adds Run key to start application
          • Drops file in Windows directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: GetForegroundWindowSpam
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:2744
          • \??\c:\windows\system\spoolsv.exe
            c:\windows\system\spoolsv.exe PR
            5⤵
            • Executes dropped EXE
            • Suspicious use of SetWindowsHookEx
            PID:548
          • C:\Windows\SysWOW64\at.exe
            at 20:53 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe
            5⤵
              PID:2712
            • C:\Windows\SysWOW64\at.exe
              at 20:54 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe
              5⤵
                PID:1084
              • C:\Windows\SysWOW64\at.exe
                at 20:55 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe
                5⤵
                  PID:4868

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Roaming\mrsys.exe

          Filesize

          206KB

          MD5

          18873cfed372a28a6b8b0426a73da029

          SHA1

          9b6371d8bc00a1de969a2c3fc9d6e24eae12df9c

          SHA256

          53a7f0d9622609759fb7e346c744a283a15d3fe12b0c9a623eee6f7143e9c520

          SHA512

          4ffcb76b5d1d6e616d779bf15fb485e35c774c21eb742d05f63457d221c41068d4a86d6c5755894877d64f97d44773d8c3c22481fdd76c924bc49610d7ddd6af

        • C:\Windows\System\explorer.exe

          Filesize

          206KB

          MD5

          4af681bab8f6e81dc0e6603e830974d8

          SHA1

          fff9d3e6f5a3af9ac11ddbec03c205fdf87a6a88

          SHA256

          490f4362838ebd12493a464110bd5b792139440e975dfad82627941933604f53

          SHA512

          7ba33c205f372218477ebafed673f2ba25bad0625d800d45a2fb515768d7f52a5a213c6a1e4a19b0e112afae8c421337b5fa33ed54c5fc225303fee9688b96e1

        • C:\Windows\System\spoolsv.exe

          Filesize

          206KB

          MD5

          aa4ba3ae8b67496e082ca38ccc6e1961

          SHA1

          59aaf9c59e4d66edda3dc557e05e1645b49d091d

          SHA256

          210c7a6c5f8833e9792917bdeaaaab02ca5d37706c2dbc50c0c0944c3687fab8

          SHA512

          5c0698111e5fd874efe821cbe00a1a229717db1bf27acf0437063f78f7cc7f4bdd6c62393d6ff0416dc30b69ef6a4d7e1c3e9d99bc7c8bd030b87cca1346024f

        • C:\Windows\System\svchost.exe

          Filesize

          206KB

          MD5

          3b1745b12f2f66a9bf15747e9388e386

          SHA1

          ff5576d5edb2603a8343f39197a2d625a31e8a64

          SHA256

          47c2826be69fca5bd711b8768cb62a7d33c0d3461f97594a20e8adfafdae1fbe

          SHA512

          e3c7c4eecab2135a1279642acd22af8af35a79853ed40196690e08eb64ff282c9a1e98bdbf8c5f20df1db919ac4f56acd8d714d8b58552a3458b539c6002d9eb

        • memory/548-33-0x0000000000400000-0x0000000000440000-memory.dmp

          Filesize

          256KB

        • memory/1564-18-0x0000000000400000-0x0000000000440000-memory.dmp

          Filesize

          256KB

        • memory/1564-37-0x0000000000400000-0x0000000000440000-memory.dmp

          Filesize

          256KB

        • memory/4792-0-0x0000000000400000-0x0000000000440000-memory.dmp

          Filesize

          256KB

        • memory/4792-36-0x0000000000400000-0x0000000000440000-memory.dmp

          Filesize

          256KB