Analysis
-
max time kernel
140s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
22-05-2024 22:54
Static task
static1
Behavioral task
behavioral1
Sample
51638aaa58158dd58d2d49d4e140ed20_NeikiAnalytics.exe
Resource
win7-20240221-en
General
-
Target
51638aaa58158dd58d2d49d4e140ed20_NeikiAnalytics.exe
-
Size
4.1MB
-
MD5
51638aaa58158dd58d2d49d4e140ed20
-
SHA1
41beaf282684d291561c96a0ab7dfa051da3f48b
-
SHA256
64421518b12f58757d77928f05284730d5ed451ad19e21cc01c32c69511aa2a5
-
SHA512
760e6511cd0d87e3c2dbf4cab5d919f33c6dccb019b2d59d334f73a496268b0970c5e576613f71a1efde3f13d236582e8cb696930626b1f92cd72667e3b737c3
-
SSDEEP
98304:BvHfbigA34ifkpJZQU0TgaIfW6UkFHwAhDtgwFW+1A:BvHfb2IifudqhIuUHwAjW+S
Malware Config
Signatures
-
Glupteba payload 15 IoCs
Processes:
resource yara_rule behavioral2/memory/4292-2-0x00000000049C0000-0x00000000052AB000-memory.dmp family_glupteba behavioral2/memory/4292-3-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/4292-4-0x0000000000400000-0x0000000002733000-memory.dmp family_glupteba behavioral2/memory/4292-5-0x0000000000400000-0x0000000002733000-memory.dmp family_glupteba behavioral2/memory/4292-7-0x00000000049C0000-0x00000000052AB000-memory.dmp family_glupteba behavioral2/memory/4292-10-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/4292-9-0x0000000000400000-0x0000000002733000-memory.dmp family_glupteba behavioral2/memory/4292-41-0x0000000000400000-0x0000000002733000-memory.dmp family_glupteba behavioral2/memory/4292-59-0x0000000000400000-0x0000000002733000-memory.dmp family_glupteba behavioral2/memory/4292-74-0x0000000000400000-0x0000000002733000-memory.dmp family_glupteba behavioral2/memory/1952-102-0x0000000000400000-0x0000000002733000-memory.dmp family_glupteba behavioral2/memory/1952-116-0x0000000000400000-0x0000000002733000-memory.dmp family_glupteba behavioral2/memory/1952-153-0x0000000000400000-0x0000000002733000-memory.dmp family_glupteba behavioral2/memory/1952-193-0x0000000000400000-0x0000000002733000-memory.dmp family_glupteba behavioral2/memory/628-194-0x0000000000400000-0x0000000002733000-memory.dmp family_glupteba -
Modifies Windows Firewall 2 TTPs 1 IoCs
Processes:
netsh.exepid Process 3552 netsh.exe -
Executes dropped EXE 1 IoCs
Processes:
csrss.exepid Process 628 csrss.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
51638aaa58158dd58d2d49d4e140ed20_NeikiAnalytics.exedescription ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" 51638aaa58158dd58d2d49d4e140ed20_NeikiAnalytics.exe -
Drops file in System32 directory 4 IoCs
Processes:
powershell.exepowershell.exepowershell.exedescription ioc Process File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe -
Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 1 IoCs
Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.
Processes:
51638aaa58158dd58d2d49d4e140ed20_NeikiAnalytics.exedescription ioc Process File opened (read-only) \??\VBoxMiniRdrDN 51638aaa58158dd58d2d49d4e140ed20_NeikiAnalytics.exe -
Drops file in Windows directory 2 IoCs
Processes:
51638aaa58158dd58d2d49d4e140ed20_NeikiAnalytics.exedescription ioc Process File created C:\Windows\rss\csrss.exe 51638aaa58158dd58d2d49d4e140ed20_NeikiAnalytics.exe File opened for modification C:\Windows\rss 51638aaa58158dd58d2d49d4e140ed20_NeikiAnalytics.exe -
Processes:
powershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepid Process 5104 powershell.exe 3152 powershell.exe 1836 powershell.exe 2492 powershell.exe 4036 powershell.exe 3204 powershell.exe 1224 powershell.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Modifies data under HKEY_USERS 64 IoCs
Processes:
powershell.exe51638aaa58158dd58d2d49d4e140ed20_NeikiAnalytics.exepowershell.exepowershell.exepowershell.exedescription ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-192 = "Mountain Standard Time" 51638aaa58158dd58d2d49d4e140ed20_NeikiAnalytics.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-751 = "Tonga Daylight Time" 51638aaa58158dd58d2d49d4e140ed20_NeikiAnalytics.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-1041 = "Ulaanbaatar Daylight Time" 51638aaa58158dd58d2d49d4e140ed20_NeikiAnalytics.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-1872 = "Russia TZ 7 Standard Time" 51638aaa58158dd58d2d49d4e140ed20_NeikiAnalytics.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-211 = "Pacific Daylight Time" 51638aaa58158dd58d2d49d4e140ed20_NeikiAnalytics.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-1042 = "Ulaanbaatar Standard Time" 51638aaa58158dd58d2d49d4e140ed20_NeikiAnalytics.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-2572 = "Turks and Caicos Standard Time" 51638aaa58158dd58d2d49d4e140ed20_NeikiAnalytics.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-831 = "SA Eastern Daylight Time" 51638aaa58158dd58d2d49d4e140ed20_NeikiAnalytics.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-561 = "SE Asia Daylight Time" 51638aaa58158dd58d2d49d4e140ed20_NeikiAnalytics.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-602 = "Taipei Standard Time" 51638aaa58158dd58d2d49d4e140ed20_NeikiAnalytics.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-2371 = "Easter Island Daylight Time" 51638aaa58158dd58d2d49d4e140ed20_NeikiAnalytics.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-252 = "Dateline Standard Time" 51638aaa58158dd58d2d49d4e140ed20_NeikiAnalytics.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-42 = "E. South America Standard Time" 51638aaa58158dd58d2d49d4e140ed20_NeikiAnalytics.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-2372 = "Easter Island Standard Time" 51638aaa58158dd58d2d49d4e140ed20_NeikiAnalytics.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-872 = "Pakistan Standard Time" 51638aaa58158dd58d2d49d4e140ed20_NeikiAnalytics.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-214 = "Pacific Daylight Time (Mexico)" 51638aaa58158dd58d2d49d4e140ed20_NeikiAnalytics.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-104 = "Central Brazilian Daylight Time" 51638aaa58158dd58d2d49d4e140ed20_NeikiAnalytics.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-532 = "Sri Lanka Standard Time" 51638aaa58158dd58d2d49d4e140ed20_NeikiAnalytics.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-161 = "Central Daylight Time" 51638aaa58158dd58d2d49d4e140ed20_NeikiAnalytics.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-2791 = "Novosibirsk Daylight Time" 51638aaa58158dd58d2d49d4e140ed20_NeikiAnalytics.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-112 = "Eastern Standard Time" 51638aaa58158dd58d2d49d4e140ed20_NeikiAnalytics.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-412 = "E. Africa Standard Time" 51638aaa58158dd58d2d49d4e140ed20_NeikiAnalytics.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-1471 = "Magadan Daylight Time" 51638aaa58158dd58d2d49d4e140ed20_NeikiAnalytics.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-2321 = "Sakhalin Daylight Time" 51638aaa58158dd58d2d49d4e140ed20_NeikiAnalytics.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-152 = "Central America Standard Time" 51638aaa58158dd58d2d49d4e140ed20_NeikiAnalytics.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-891 = "Morocco Daylight Time" 51638aaa58158dd58d2d49d4e140ed20_NeikiAnalytics.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-571 = "China Daylight Time" 51638aaa58158dd58d2d49d4e140ed20_NeikiAnalytics.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-2342 = "Haiti Standard Time" 51638aaa58158dd58d2d49d4e140ed20_NeikiAnalytics.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-2771 = "Omsk Daylight Time" 51638aaa58158dd58d2d49d4e140ed20_NeikiAnalytics.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-2532 = "Chatham Islands Standard Time" 51638aaa58158dd58d2d49d4e140ed20_NeikiAnalytics.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-491 = "India Daylight Time" 51638aaa58158dd58d2d49d4e140ed20_NeikiAnalytics.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-1892 = "Russia TZ 3 Standard Time" 51638aaa58158dd58d2d49d4e140ed20_NeikiAnalytics.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-2891 = "Sudan Daylight Time" 51638aaa58158dd58d2d49d4e140ed20_NeikiAnalytics.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-172 = "Central Standard Time (Mexico)" 51638aaa58158dd58d2d49d4e140ed20_NeikiAnalytics.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-792 = "SA Western Standard Time" 51638aaa58158dd58d2d49d4e140ed20_NeikiAnalytics.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe -
Suspicious behavior: EnumeratesProcesses 24 IoCs
Processes:
powershell.exe51638aaa58158dd58d2d49d4e140ed20_NeikiAnalytics.exepowershell.exe51638aaa58158dd58d2d49d4e140ed20_NeikiAnalytics.exepowershell.exepowershell.exepowershell.exepid Process 5104 powershell.exe 5104 powershell.exe 5104 powershell.exe 4292 51638aaa58158dd58d2d49d4e140ed20_NeikiAnalytics.exe 4292 51638aaa58158dd58d2d49d4e140ed20_NeikiAnalytics.exe 3152 powershell.exe 3152 powershell.exe 3152 powershell.exe 1952 51638aaa58158dd58d2d49d4e140ed20_NeikiAnalytics.exe 1952 51638aaa58158dd58d2d49d4e140ed20_NeikiAnalytics.exe 1952 51638aaa58158dd58d2d49d4e140ed20_NeikiAnalytics.exe 1952 51638aaa58158dd58d2d49d4e140ed20_NeikiAnalytics.exe 1952 51638aaa58158dd58d2d49d4e140ed20_NeikiAnalytics.exe 1952 51638aaa58158dd58d2d49d4e140ed20_NeikiAnalytics.exe 1952 51638aaa58158dd58d2d49d4e140ed20_NeikiAnalytics.exe 1952 51638aaa58158dd58d2d49d4e140ed20_NeikiAnalytics.exe 1952 51638aaa58158dd58d2d49d4e140ed20_NeikiAnalytics.exe 1952 51638aaa58158dd58d2d49d4e140ed20_NeikiAnalytics.exe 1836 powershell.exe 1836 powershell.exe 2492 powershell.exe 2492 powershell.exe 4036 powershell.exe 4036 powershell.exe -
Suspicious use of AdjustPrivilegeToken 7 IoCs
Processes:
powershell.exe51638aaa58158dd58d2d49d4e140ed20_NeikiAnalytics.exepowershell.exepowershell.exepowershell.exepowershell.exedescription pid Process Token: SeDebugPrivilege 5104 powershell.exe Token: SeDebugPrivilege 4292 51638aaa58158dd58d2d49d4e140ed20_NeikiAnalytics.exe Token: SeImpersonatePrivilege 4292 51638aaa58158dd58d2d49d4e140ed20_NeikiAnalytics.exe Token: SeDebugPrivilege 3152 powershell.exe Token: SeDebugPrivilege 1836 powershell.exe Token: SeDebugPrivilege 2492 powershell.exe Token: SeDebugPrivilege 4036 powershell.exe -
Suspicious use of WriteProcessMemory 22 IoCs
Processes:
51638aaa58158dd58d2d49d4e140ed20_NeikiAnalytics.exe51638aaa58158dd58d2d49d4e140ed20_NeikiAnalytics.execmd.execsrss.exedescription pid Process procid_target PID 4292 wrote to memory of 5104 4292 51638aaa58158dd58d2d49d4e140ed20_NeikiAnalytics.exe 91 PID 4292 wrote to memory of 5104 4292 51638aaa58158dd58d2d49d4e140ed20_NeikiAnalytics.exe 91 PID 4292 wrote to memory of 5104 4292 51638aaa58158dd58d2d49d4e140ed20_NeikiAnalytics.exe 91 PID 1952 wrote to memory of 3152 1952 51638aaa58158dd58d2d49d4e140ed20_NeikiAnalytics.exe 103 PID 1952 wrote to memory of 3152 1952 51638aaa58158dd58d2d49d4e140ed20_NeikiAnalytics.exe 103 PID 1952 wrote to memory of 3152 1952 51638aaa58158dd58d2d49d4e140ed20_NeikiAnalytics.exe 103 PID 1952 wrote to memory of 4996 1952 51638aaa58158dd58d2d49d4e140ed20_NeikiAnalytics.exe 105 PID 1952 wrote to memory of 4996 1952 51638aaa58158dd58d2d49d4e140ed20_NeikiAnalytics.exe 105 PID 4996 wrote to memory of 3552 4996 cmd.exe 107 PID 4996 wrote to memory of 3552 4996 cmd.exe 107 PID 1952 wrote to memory of 1836 1952 51638aaa58158dd58d2d49d4e140ed20_NeikiAnalytics.exe 108 PID 1952 wrote to memory of 1836 1952 51638aaa58158dd58d2d49d4e140ed20_NeikiAnalytics.exe 108 PID 1952 wrote to memory of 1836 1952 51638aaa58158dd58d2d49d4e140ed20_NeikiAnalytics.exe 108 PID 1952 wrote to memory of 2492 1952 51638aaa58158dd58d2d49d4e140ed20_NeikiAnalytics.exe 110 PID 1952 wrote to memory of 2492 1952 51638aaa58158dd58d2d49d4e140ed20_NeikiAnalytics.exe 110 PID 1952 wrote to memory of 2492 1952 51638aaa58158dd58d2d49d4e140ed20_NeikiAnalytics.exe 110 PID 1952 wrote to memory of 628 1952 51638aaa58158dd58d2d49d4e140ed20_NeikiAnalytics.exe 112 PID 1952 wrote to memory of 628 1952 51638aaa58158dd58d2d49d4e140ed20_NeikiAnalytics.exe 112 PID 1952 wrote to memory of 628 1952 51638aaa58158dd58d2d49d4e140ed20_NeikiAnalytics.exe 112 PID 628 wrote to memory of 4036 628 csrss.exe 113 PID 628 wrote to memory of 4036 628 csrss.exe 113 PID 628 wrote to memory of 4036 628 csrss.exe 113
Processes
-
C:\Users\Admin\AppData\Local\Temp\51638aaa58158dd58d2d49d4e140ed20_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\51638aaa58158dd58d2d49d4e140ed20_NeikiAnalytics.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4292 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5104
-
-
C:\Users\Admin\AppData\Local\Temp\51638aaa58158dd58d2d49d4e140ed20_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\51638aaa58158dd58d2d49d4e140ed20_NeikiAnalytics.exe"2⤵
- Adds Run key to start application
- Checks for VirtualBox DLLs, possible anti-VM trick
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1952 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Drops file in System32 directory
- Command and Scripting Interpreter: PowerShell
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3152
-
-
C:\Windows\system32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"3⤵
- Suspicious use of WriteProcessMemory
PID:4996 -
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes4⤵
- Modifies Windows Firewall
PID:3552
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Drops file in System32 directory
- Command and Scripting Interpreter: PowerShell
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1836
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Drops file in System32 directory
- Command and Scripting Interpreter: PowerShell
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2492
-
-
C:\Windows\rss\csrss.exeC:\Windows\rss\csrss.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:628 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Command and Scripting Interpreter: PowerShell
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4036
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F4⤵
- Creates scheduled task(s)
PID:4632
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /delete /tn ScheduledUpdate /f4⤵PID:1848
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Command and Scripting Interpreter: PowerShell
PID:3204
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Command and Scripting Interpreter: PowerShell
PID:1224
-
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4080 --field-trial-handle=2252,i,16504368816373493055,9578615028378602855,262144 --variations-seed-version /prefetch:81⤵PID:1956
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log
Filesize2KB
MD53d086a433708053f9bf9523e1d87a4e8
SHA1b3ab5d4f282a4c8fe8c3005b8a557ed5a0e37f28
SHA2566f8fd1b8d9788ad54eaeee329232187e24b7b43393a01aeba2d6e9675231fb69
SHA512931ae42b4c68a4507ff2342332b08eb407050d47cf4176137ea022d0f6e513c689e998445a04c6d18d4877391705c586bfce0234632b898d41aaed0957996dfd
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD54878ca8cb12e511da7e855a850550a2e
SHA1ed09ac4c10c81c1335b1eb7cde75d4904bf59be9
SHA256a3a16fea9b81911a7ac90d0942bd93a528626841745bc5ffcbf09a77498de650
SHA512e6659548ca5c2d0d101b5d2d68f19061e1cc3495e3333139db12b957a21fb79cd78e2f73a716beff21f2a068a5d60dd451b608383631ba4362995be5881ca3cd
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5a30c4cbacaf280c62762ec9184280516
SHA14cc08c948d3a53be69e92f2d3c8e5fbdbb187f88
SHA256ac8b41afd84372b1556f2559e937595503290fab518e0378199fbb9137cdb3b4
SHA512e9eebb0eace7c948eb187ce0330f08cefbdd8c8d141016cf0810c483dd0e7c79771c8a451bbe99e96a4f4e5f762d92ccbfd7945c775f252be4acf6c3cca35e3d
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD59fad373650d8f832a01d4e2430610fd2
SHA157ca3c87c8c5771750c2ff39f3296c006575cacc
SHA256334be638c1ba1b0a4aea8ed49d65aafb15f07799bb85c1a845a29dc61e7cb3e9
SHA512c7defb6a0abe6925bc8775c4ce00821f5d308f2b562b3e0e96a4ca76baacc8934620716de737efc70a2ae9798ff5441c127a22b97208859ca9d4880d0a7e8aba
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD59712b981208ca5269b0910ff515b6a89
SHA13816dd3ec11a18af12f4634aa89c0737fd7b12ef
SHA2569ff0ecd48c8d713019df88bffcb1f9af53a8859bfe43f6d50843a14a389a54fe
SHA512e4ee0f014b24e6599e58103c7c3f3f5ea0f68e80f0911b4f8cfb24d3a82919956d8383fe1a4fdc24963dd817838c643596454acf2c801660a4c2f93f9adba682
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5b32df3f88cf6732b8b6094da2677a756
SHA1956c2329f529f3375ac4a4cbd47ee7baf6951525
SHA256d366244404881126332acb2bc20e6627e64de07cde441c7c3a757e7442fc32d5
SHA51207425eb4846a90f72fe74ba24bb54b81f2bd66d8033ce833d5b93d5db17ee09bb8d58fd1d889520e2f1be1e77f8abe68b13c890586cd7e0acc781e2ed0488948
-
Filesize
4.1MB
MD551638aaa58158dd58d2d49d4e140ed20
SHA141beaf282684d291561c96a0ab7dfa051da3f48b
SHA25664421518b12f58757d77928f05284730d5ed451ad19e21cc01c32c69511aa2a5
SHA512760e6511cd0d87e3c2dbf4cab5d919f33c6dccb019b2d59d334f73a496268b0970c5e576613f71a1efde3f13d236582e8cb696930626b1f92cd72667e3b737c3