Analysis

  • max time kernel
    121s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    22-05-2024 23:37

General

  • Target

    5962c117eb1df6cb926a2755e81e95b0_NeikiAnalytics.exe

  • Size

    91KB

  • MD5

    5962c117eb1df6cb926a2755e81e95b0

  • SHA1

    9c0ac139ff6179b984a6a03587d805cec98f6fc0

  • SHA256

    71af9668af296c05e01a3b76d12d92e0a2aded6f561acf43c7465b29b65fa7ee

  • SHA512

    2382427a90eb55b0ccd4d62863079a80b83fd36f3c608f9afa06bcbc732b45be1ee34fc0daf7c0caf6eb29a2aa44fad7b0f0f0b1a6f3e655a7f8bef9eb991476

  • SSDEEP

    1536:FAwEmBGz1lNNqDaG0PoxhlzmqAwEmBGz1lNNqDaG0Poxhlzm+:FGmUXNQDaG0A8qGmUXNQDaG0A8+

Score
10/10

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 2 IoCs
  • Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Disables RegEdit via registry modification 2 IoCs
  • Disables use of System Restore points 1 TTPs
  • Executes dropped EXE 7 IoCs
  • Loads dropped DLL 12 IoCs
  • Modifies system executable filetype association 2 TTPs 13 IoCs
  • Adds Run key to start application 2 TTPs 5 IoCs
  • Drops file in System32 directory 6 IoCs
  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Control Panel 4 IoCs
  • Modifies registry class 15 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs
  • System policy modification 1 TTPs 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5962c117eb1df6cb926a2755e81e95b0_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\5962c117eb1df6cb926a2755e81e95b0_NeikiAnalytics.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Modifies visibility of file extensions in Explorer
    • Modifies visiblity of hidden/system files in Explorer
    • Disables RegEdit via registry modification
    • Loads dropped DLL
    • Modifies system executable filetype association
    • Adds Run key to start application
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies Control Panel
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    • System policy modification
    PID:2676
    • C:\Windows\xk.exe
      C:\Windows\xk.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:2020
    • C:\Windows\SysWOW64\IExplorer.exe
      C:\Windows\system32\IExplorer.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:2744
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:2880
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:1360
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:2032
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:344
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:992

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\winlogon.exe

    Filesize

    91KB

    MD5

    5962c117eb1df6cb926a2755e81e95b0

    SHA1

    9c0ac139ff6179b984a6a03587d805cec98f6fc0

    SHA256

    71af9668af296c05e01a3b76d12d92e0a2aded6f561acf43c7465b29b65fa7ee

    SHA512

    2382427a90eb55b0ccd4d62863079a80b83fd36f3c608f9afa06bcbc732b45be1ee34fc0daf7c0caf6eb29a2aa44fad7b0f0f0b1a6f3e655a7f8bef9eb991476

  • C:\Windows\xk.exe

    Filesize

    91KB

    MD5

    f256bbdcec8b383d0c4c690c8f419726

    SHA1

    b8e7ebea55905fe82be7b72452eb434654ed9ada

    SHA256

    405d10fdac9a7eda61fed20297d1d83e57ae30904e2b1b478ce3a394ae4cd24e

    SHA512

    f45af82fad5134688faa22708432c4c1d26edfbc1b17177d6a594776119f96995b4a3a53bc7584ba480f8a7db5c96bcb25c66bf5064548d463d43e54e1408f23

  • \Users\Admin\AppData\Local\WINDOWS\CSRSS.EXE

    Filesize

    91KB

    MD5

    8cacb9aa571d28fade0b28c90561af56

    SHA1

    279f181c54c677e8b53f1c8112936cc068806f52

    SHA256

    00c60ee34c13d6bfeec60ead36ca8b31b9ab78e8858b60915afbca8282e2d001

    SHA512

    977de1831c7779ca5bde7300c0b46a49e8a54ee644ca33908d85307cec2c5dafa44cb15f70bd1ed8ec8b7705c89901c7ba71a1a7170bb37d9cb8d4a3e73a8103

  • \Users\Admin\AppData\Local\WINDOWS\LSASS.EXE

    Filesize

    91KB

    MD5

    d8552e358ed1374897d3431dcde01ac4

    SHA1

    6b03b79259b5cf643e9cc67c123c582f485d9035

    SHA256

    6aca691b13310ff100e3db2f0945566ca345acb79ca56f7d76a96749056307b1

    SHA512

    31429fd23947a3e62212054dce5c70ee0810e9f740d3d9ed89f659dc934edff964007effb1b4913c689e0eec9d5dce0730b0b324459d56c179882becd6b50732

  • \Users\Admin\AppData\Local\WINDOWS\SERVICES.EXE

    Filesize

    91KB

    MD5

    9ce857bc660d8b5e2e9ab3d0b9a09433

    SHA1

    5e6cdc044cec9a1d24b2c010fb9da4f20a4142cc

    SHA256

    f9e21aad8e639e3843d583e5fe1c80e862d986a3cb2977ae92114a169de7e833

    SHA512

    d76aec10af5f67aab93e7c2d4a3e7bad6e7b0e8af3332c2672ca3c0c45c5fd9bb0fdc5a270cc7bc3470e70db7f59590808f700347de64ba68cf59382648b3a83

  • \Users\Admin\AppData\Local\WINDOWS\SMSS.EXE

    Filesize

    91KB

    MD5

    3a6c01bbe02041805d9820255019e6c1

    SHA1

    ef9dbe96a93526a45ef09273e3fd37cfb289f703

    SHA256

    a45f71a543417e1b1fe9867a706b09dd9832d3be0525eb668ff6125b2318be0f

    SHA512

    0e952f631865edafa452aedaa8b90af08e1e988e35b025c592bee205fd64401d254e9bec6aac3ea73fe1c7bbe014868ffba5decee66ca99027e7e41a130d7f8d

  • \Users\Admin\AppData\Local\WINDOWS\WINLOGON.EXE

    Filesize

    91KB

    MD5

    1583e16e48a2ec82c0c1fa42ccc834f7

    SHA1

    307fa6bd62d3292f4966719e48b4020060bb38d1

    SHA256

    87c91d763f8fb73d4291118b6b1b656ceb544d30647ab1939c4cd726aabba42d

    SHA512

    c79a4068240cc2737b553df5eb8bad5947499d0ac75e88aed452557eb072254618de978d128f7101d2a1dc3d692923db507eeee1fa04ffcaa763f1f4ec7cc48d

  • \Windows\SysWOW64\IExplorer.exe

    Filesize

    91KB

    MD5

    1339b9ed4fce80d8e4d82f3aa5ac9b63

    SHA1

    393186f4ae3cbabdf6462c2fa0a9deb07627d18f

    SHA256

    8cf33d406b0608b5eab8997b66dff66ec5a5413a2824af805ff59eda029db475

    SHA512

    1949ad8f2f4e4b3084450596f8c18c0057298ad215d239b77c52d910804f3b7eba96769d2ecb2bc93c4cdbc1a6f314901f7e3e313ebf8446815e079e9735bea0

  • memory/344-178-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/992-184-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/992-188-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/1360-152-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/2020-117-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/2020-112-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/2032-161-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/2032-171-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/2676-146-0x0000000002380000-0x00000000023AE000-memory.dmp

    Filesize

    184KB

  • memory/2676-155-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/2676-0-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/2676-147-0x0000000002380000-0x00000000023AE000-memory.dmp

    Filesize

    184KB

  • memory/2676-118-0x0000000002380000-0x00000000023AE000-memory.dmp

    Filesize

    184KB

  • memory/2676-110-0x0000000002380000-0x00000000023AE000-memory.dmp

    Filesize

    184KB

  • memory/2676-111-0x0000000002380000-0x00000000023AE000-memory.dmp

    Filesize

    184KB

  • memory/2676-190-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/2744-129-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/2880-141-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB