Analysis
-
max time kernel
150s -
max time network
103s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
21-05-2024 20:51
Static task
static1
Behavioral task
behavioral1
Sample
0cf9066eec4de6047b393218eba0b380_NeikiAnalytics.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
0cf9066eec4de6047b393218eba0b380_NeikiAnalytics.exe
Resource
win10v2004-20240426-en
General
-
Target
0cf9066eec4de6047b393218eba0b380_NeikiAnalytics.exe
-
Size
207KB
-
MD5
0cf9066eec4de6047b393218eba0b380
-
SHA1
b78bb01105052dcde889102bfab689994bfaa963
-
SHA256
ba213013ab381e49a31b40450a66cabb3639f4a0e358adc29986722c9cdbb104
-
SHA512
a9ceea225e4b4dd1a982e931ceeb525a309b2a589d126e85a4413858e06c57d1faf5653db7945e4f7c6e311c3e991bafc191e3ab3cdb65c9ab4175230391bab4
-
SSDEEP
3072:5vEfVUzSLhIVbV6i5LirrlZrHyrUHUckoMQ2RN6unX:5vEN2U+T6i5LirrllHy4HUcMQY6c
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
Processes:
svchost.exeexplorer.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" explorer.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
Processes:
explorer.exesvchost.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" svchost.exe -
Modifies Installed Components in the registry 2 TTPs 8 IoCs
Processes:
svchost.exeexplorer.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" svchost.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\WOW6432NODE\MICROSOFT\ACTIVE SETUP\INSTALLED COMPONENTS\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999} svchost.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" explorer.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999} svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" svchost.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} svchost.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} svchost.exe -
Executes dropped EXE 4 IoCs
Processes:
explorer.exespoolsv.exesvchost.exespoolsv.exepid process 4056 explorer.exe 1564 spoolsv.exe 2744 svchost.exe 548 spoolsv.exe -
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
svchost.exeexplorer.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" explorer.exe -
Drops file in Windows directory 6 IoCs
Processes:
0cf9066eec4de6047b393218eba0b380_NeikiAnalytics.exeexplorer.exespoolsv.exesvchost.exedescription ioc process File opened for modification \??\c:\windows\system\explorer.exe 0cf9066eec4de6047b393218eba0b380_NeikiAnalytics.exe File opened for modification \??\c:\windows\system\spoolsv.exe explorer.exe File opened for modification \??\c:\windows\system\svchost.exe spoolsv.exe File opened for modification \??\c:\windows\system\explorer.exe explorer.exe File opened for modification \??\c:\windows\system\svchost.exe svchost.exe File opened for modification C:\Windows\system\udsys.exe explorer.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
0cf9066eec4de6047b393218eba0b380_NeikiAnalytics.exeexplorer.exesvchost.exepid process 4792 0cf9066eec4de6047b393218eba0b380_NeikiAnalytics.exe 4792 0cf9066eec4de6047b393218eba0b380_NeikiAnalytics.exe 4056 explorer.exe 4056 explorer.exe 4056 explorer.exe 4056 explorer.exe 4056 explorer.exe 4056 explorer.exe 2744 svchost.exe 2744 svchost.exe 2744 svchost.exe 2744 svchost.exe 4056 explorer.exe 4056 explorer.exe 2744 svchost.exe 2744 svchost.exe 4056 explorer.exe 4056 explorer.exe 2744 svchost.exe 2744 svchost.exe 4056 explorer.exe 4056 explorer.exe 2744 svchost.exe 2744 svchost.exe 4056 explorer.exe 4056 explorer.exe 2744 svchost.exe 2744 svchost.exe 4056 explorer.exe 4056 explorer.exe 2744 svchost.exe 2744 svchost.exe 4056 explorer.exe 4056 explorer.exe 2744 svchost.exe 2744 svchost.exe 4056 explorer.exe 4056 explorer.exe 2744 svchost.exe 2744 svchost.exe 4056 explorer.exe 4056 explorer.exe 2744 svchost.exe 2744 svchost.exe 4056 explorer.exe 4056 explorer.exe 2744 svchost.exe 2744 svchost.exe 4056 explorer.exe 4056 explorer.exe 2744 svchost.exe 2744 svchost.exe 4056 explorer.exe 4056 explorer.exe 2744 svchost.exe 2744 svchost.exe 4056 explorer.exe 4056 explorer.exe 2744 svchost.exe 2744 svchost.exe 4056 explorer.exe 4056 explorer.exe 2744 svchost.exe 2744 svchost.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
Processes:
explorer.exesvchost.exepid process 4056 explorer.exe 2744 svchost.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
Processes:
0cf9066eec4de6047b393218eba0b380_NeikiAnalytics.exeexplorer.exespoolsv.exesvchost.exespoolsv.exepid process 4792 0cf9066eec4de6047b393218eba0b380_NeikiAnalytics.exe 4792 0cf9066eec4de6047b393218eba0b380_NeikiAnalytics.exe 4056 explorer.exe 4056 explorer.exe 1564 spoolsv.exe 1564 spoolsv.exe 2744 svchost.exe 2744 svchost.exe 548 spoolsv.exe 548 spoolsv.exe 4056 explorer.exe 4056 explorer.exe -
Suspicious use of WriteProcessMemory 21 IoCs
Processes:
0cf9066eec4de6047b393218eba0b380_NeikiAnalytics.exeexplorer.exespoolsv.exesvchost.exedescription pid process target process PID 4792 wrote to memory of 4056 4792 0cf9066eec4de6047b393218eba0b380_NeikiAnalytics.exe explorer.exe PID 4792 wrote to memory of 4056 4792 0cf9066eec4de6047b393218eba0b380_NeikiAnalytics.exe explorer.exe PID 4792 wrote to memory of 4056 4792 0cf9066eec4de6047b393218eba0b380_NeikiAnalytics.exe explorer.exe PID 4056 wrote to memory of 1564 4056 explorer.exe spoolsv.exe PID 4056 wrote to memory of 1564 4056 explorer.exe spoolsv.exe PID 4056 wrote to memory of 1564 4056 explorer.exe spoolsv.exe PID 1564 wrote to memory of 2744 1564 spoolsv.exe svchost.exe PID 1564 wrote to memory of 2744 1564 spoolsv.exe svchost.exe PID 1564 wrote to memory of 2744 1564 spoolsv.exe svchost.exe PID 2744 wrote to memory of 548 2744 svchost.exe spoolsv.exe PID 2744 wrote to memory of 548 2744 svchost.exe spoolsv.exe PID 2744 wrote to memory of 548 2744 svchost.exe spoolsv.exe PID 2744 wrote to memory of 2712 2744 svchost.exe at.exe PID 2744 wrote to memory of 2712 2744 svchost.exe at.exe PID 2744 wrote to memory of 2712 2744 svchost.exe at.exe PID 2744 wrote to memory of 1084 2744 svchost.exe at.exe PID 2744 wrote to memory of 1084 2744 svchost.exe at.exe PID 2744 wrote to memory of 1084 2744 svchost.exe at.exe PID 2744 wrote to memory of 4868 2744 svchost.exe at.exe PID 2744 wrote to memory of 4868 2744 svchost.exe at.exe PID 2744 wrote to memory of 4868 2744 svchost.exe at.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\0cf9066eec4de6047b393218eba0b380_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\0cf9066eec4de6047b393218eba0b380_NeikiAnalytics.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4792 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe2⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Modifies Installed Components in the registry
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4056 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE3⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1564 -
\??\c:\windows\system\svchost.exec:\windows\system\svchost.exe4⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Modifies Installed Components in the registry
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2744 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe PR5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:548 -
C:\Windows\SysWOW64\at.exeat 20:53 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe5⤵PID:2712
-
C:\Windows\SysWOW64\at.exeat 20:54 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe5⤵PID:1084
-
C:\Windows\SysWOW64\at.exeat 20:55 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe5⤵PID:4868
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
206KB
MD518873cfed372a28a6b8b0426a73da029
SHA19b6371d8bc00a1de969a2c3fc9d6e24eae12df9c
SHA25653a7f0d9622609759fb7e346c744a283a15d3fe12b0c9a623eee6f7143e9c520
SHA5124ffcb76b5d1d6e616d779bf15fb485e35c774c21eb742d05f63457d221c41068d4a86d6c5755894877d64f97d44773d8c3c22481fdd76c924bc49610d7ddd6af
-
Filesize
206KB
MD54af681bab8f6e81dc0e6603e830974d8
SHA1fff9d3e6f5a3af9ac11ddbec03c205fdf87a6a88
SHA256490f4362838ebd12493a464110bd5b792139440e975dfad82627941933604f53
SHA5127ba33c205f372218477ebafed673f2ba25bad0625d800d45a2fb515768d7f52a5a213c6a1e4a19b0e112afae8c421337b5fa33ed54c5fc225303fee9688b96e1
-
Filesize
206KB
MD5aa4ba3ae8b67496e082ca38ccc6e1961
SHA159aaf9c59e4d66edda3dc557e05e1645b49d091d
SHA256210c7a6c5f8833e9792917bdeaaaab02ca5d37706c2dbc50c0c0944c3687fab8
SHA5125c0698111e5fd874efe821cbe00a1a229717db1bf27acf0437063f78f7cc7f4bdd6c62393d6ff0416dc30b69ef6a4d7e1c3e9d99bc7c8bd030b87cca1346024f
-
Filesize
206KB
MD53b1745b12f2f66a9bf15747e9388e386
SHA1ff5576d5edb2603a8343f39197a2d625a31e8a64
SHA25647c2826be69fca5bd711b8768cb62a7d33c0d3461f97594a20e8adfafdae1fbe
SHA512e3c7c4eecab2135a1279642acd22af8af35a79853ed40196690e08eb64ff282c9a1e98bdbf8c5f20df1db919ac4f56acd8d714d8b58552a3458b539c6002d9eb