Analysis

  • max time kernel
    131s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22-05-2024 23:37

General

  • Target

    5962c117eb1df6cb926a2755e81e95b0_NeikiAnalytics.exe

  • Size

    91KB

  • MD5

    5962c117eb1df6cb926a2755e81e95b0

  • SHA1

    9c0ac139ff6179b984a6a03587d805cec98f6fc0

  • SHA256

    71af9668af296c05e01a3b76d12d92e0a2aded6f561acf43c7465b29b65fa7ee

  • SHA512

    2382427a90eb55b0ccd4d62863079a80b83fd36f3c608f9afa06bcbc732b45be1ee34fc0daf7c0caf6eb29a2aa44fad7b0f0f0b1a6f3e655a7f8bef9eb991476

  • SSDEEP

    1536:FAwEmBGz1lNNqDaG0PoxhlzmqAwEmBGz1lNNqDaG0Poxhlzm+:FGmUXNQDaG0A8qGmUXNQDaG0A8+

Score
10/10

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 2 IoCs
  • Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Disables RegEdit via registry modification 2 IoCs
  • Disables use of System Restore points 1 TTPs
  • Executes dropped EXE 7 IoCs
  • Modifies system executable filetype association 2 TTPs 13 IoCs
  • Adds Run key to start application 2 TTPs 5 IoCs
  • Drops file in System32 directory 6 IoCs
  • Drops file in Windows directory 2 IoCs
  • Modifies Control Panel 4 IoCs
  • Modifies registry class 15 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs
  • System policy modification 1 TTPs 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5962c117eb1df6cb926a2755e81e95b0_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\5962c117eb1df6cb926a2755e81e95b0_NeikiAnalytics.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Modifies visibility of file extensions in Explorer
    • Modifies visiblity of hidden/system files in Explorer
    • Disables RegEdit via registry modification
    • Modifies system executable filetype association
    • Adds Run key to start application
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies Control Panel
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    • System policy modification
    PID:3948
    • C:\Windows\xk.exe
      C:\Windows\xk.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:4756
    • C:\Windows\SysWOW64\IExplorer.exe
      C:\Windows\system32\IExplorer.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:4388
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:2320
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:4248
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:5604
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:2896
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:3844

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\WINDOWS\CSRSS.EXE

    Filesize

    91KB

    MD5

    3f02724eeafb8c42c7e725c6794275c1

    SHA1

    3c13b201344419e944375991d0cd80736419996a

    SHA256

    46850e6ebec56ddb1c923333e8f8992a97f412cf869fec418f1f496c835e77f5

    SHA512

    39493637814243a840b8e71c831c07c09a6dea45eacea51a6c5170cfa74891a61b2218e6bbd3427694b5ae37027b03003fa97222df14f1096ef3e80ee4126699

  • C:\Users\Admin\AppData\Local\WINDOWS\LSASS.EXE

    Filesize

    91KB

    MD5

    97276ab685bda54f3aae75515eb7e233

    SHA1

    2b88c96d181a74f10f49a97400822faeb998d8aa

    SHA256

    33e1df6fe75b2bc9e59135fd499a0a8825df599bd7fac160f09ea034fb138dec

    SHA512

    26efa0dfdd6acba5321d843370eac9289813e297ab383a4416ebca1e25497efd5351a611cd8b4c0bedfaf225fd178e3b9819f929d48dc866fd8edaec32bf06f6

  • C:\Users\Admin\AppData\Local\WINDOWS\SERVICES.EXE

    Filesize

    91KB

    MD5

    f3589f04fa59e6decf0fab66d7ffea7f

    SHA1

    5d2710c9d02ec8dc6c130e9d80b93cd943be1a9d

    SHA256

    fd572386f172236040d6cbfeea3728f0c3fd1bbcedcb3e3ee168b3f6e004a734

    SHA512

    413a7a9b5954d39ab9ff5718f89b711505b54137985f5ffd06e90bbd832a0f48b18c22599fb53ba0edb5befb43b78b650356bdd97bbff9df5b3fedcf682c5a5e

  • C:\Users\Admin\AppData\Local\WINDOWS\SMSS.EXE

    Filesize

    91KB

    MD5

    5df9c142f981f689f2ef86662420fee8

    SHA1

    0927dd9c5108374db3b67ef9b1eb42bea2fa9b2c

    SHA256

    0538662d60082bdfcceef45f6608b3127d2c93529b35291931ca1810e8e34a0a

    SHA512

    15b5b2b2dd0fa450a4056affeec794ad61141140e8578b2d04cd96c3ec7cefe18b7fc507dbe870c45354202069f1314e1eb3e42a830bb20673a5ff0a35151157

  • C:\Users\Admin\AppData\Local\WINDOWS\WINLOGON.EXE

    Filesize

    91KB

    MD5

    821d5adebaba058c21994e7a4b1239bd

    SHA1

    8f7fcd0cc2441d740c7f3f4c0b99ff930199cb18

    SHA256

    434669dd28a0c82c73a0bd0c614bf46b62b3db0224ab1495e283131564b46d50

    SHA512

    1ab013dbc67345388d89dac3567a2d3202076d324162378348fd69928ee34c620243d6b1f8faae78fc3bbeb3c35a43d64e70482463b54f61e3631bb49e095398

  • C:\Users\Admin\AppData\Local\winlogon.exe

    Filesize

    91KB

    MD5

    5962c117eb1df6cb926a2755e81e95b0

    SHA1

    9c0ac139ff6179b984a6a03587d805cec98f6fc0

    SHA256

    71af9668af296c05e01a3b76d12d92e0a2aded6f561acf43c7465b29b65fa7ee

    SHA512

    2382427a90eb55b0ccd4d62863079a80b83fd36f3c608f9afa06bcbc732b45be1ee34fc0daf7c0caf6eb29a2aa44fad7b0f0f0b1a6f3e655a7f8bef9eb991476

  • C:\Windows\SysWOW64\IExplorer.exe

    Filesize

    91KB

    MD5

    399de0fa0434ae16102014af2646e842

    SHA1

    72f28dbc3c9d95e4290b416bd9313ac6b2e44aba

    SHA256

    f0edbbb1085ec2db9feb00f242ed97da2f155bf7c8b56bd3b81a5165d0b5d953

    SHA512

    77fa59e40bb8297058ae1db4c5d416b0e2eae1768bff7f1ff80d9b6f023e1196366819899901b16461eab4aa988042f628470ef8e02a91edcdb9b509ca5376be

  • C:\Windows\xk.exe

    Filesize

    91KB

    MD5

    8c8945ecf9cf76cd5f3d90d9ff053e8b

    SHA1

    149d2e854023fc0183f582a05228835de8ab67bf

    SHA256

    347019540bb1251bcbfc7bcc268b7ac81fe15355db51234fcd7ce4a125d15e89

    SHA512

    59f91d5810a384288b1dc3d38944f6ae32337c79dc2cc38b896ffcbaa42d109cac97dd3933a3624e2f710e9abeb485482c7a99a92f559b1af099fbf579d37124

  • memory/2320-128-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/2896-146-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/3844-153-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/3948-0-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/3948-155-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/4248-130-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/4248-133-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/4388-119-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/4756-108-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/4756-112-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/5604-139-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB