Analysis

  • max time kernel
    141s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    22-05-2024 23:41

General

  • Target

    5a108210269af0b88ca4eef1dc0fa910_NeikiAnalytics.exe

  • Size

    91KB

  • MD5

    5a108210269af0b88ca4eef1dc0fa910

  • SHA1

    92de8c2d188a41254f5fac7be61e9e08339d10f6

  • SHA256

    31ddfe29a74d876dce7fd5827b8ffa35df4bc24888cb1ec8972e282587481cf0

  • SHA512

    1ef5bd036251fc2ca91343f95552f88baf5cf9c10fa0a5075c71b35b8bc75dcc645025c72e29af7692fcbe037ffef668551e896dc9eb10dd9b9a9387019869ad

  • SSDEEP

    1536:QRsjdIZfaif4YrxCjjKnouy8VzTRsjdIZfaif4YrxCjjKnouy8VzK:QOyZy9wCjOouttTOyZy9wCjOouttK

Score
10/10

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 2 IoCs
  • Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Disables RegEdit via registry modification 2 IoCs
  • Disables use of System Restore points 1 TTPs
  • Executes dropped EXE 13 IoCs
  • Loads dropped DLL 22 IoCs
  • Modifies system executable filetype association 2 TTPs 13 IoCs
  • UPX packed file 34 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 5 IoCs
  • Drops desktop.ini file(s) 4 IoCs
  • Enumerates connected drives 3 TTPs 22 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in System32 directory 20 IoCs
  • Drops file in Windows directory 5 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Control Panel 4 IoCs
  • Modifies Internet Explorer settings 1 TTPs 9 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SendNotifyMessage 2 IoCs
  • Suspicious use of SetWindowsHookEx 15 IoCs
  • Suspicious use of WriteProcessMemory 52 IoCs
  • System policy modification 1 TTPs 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5a108210269af0b88ca4eef1dc0fa910_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\5a108210269af0b88ca4eef1dc0fa910_NeikiAnalytics.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Modifies visibility of file extensions in Explorer
    • Modifies visiblity of hidden/system files in Explorer
    • Disables RegEdit via registry modification
    • Loads dropped DLL
    • Modifies system executable filetype association
    • Adds Run key to start application
    • Drops desktop.ini file(s)
    • Enumerates connected drives
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies Control Panel
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    • System policy modification
    PID:2868
    • C:\Windows\xk.exe
      C:\Windows\xk.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:2392
    • C:\Windows\SysWOW64\IExplorer.exe
      C:\Windows\system32\IExplorer.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:1296
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:464
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:2008
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:1032
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:2000
    • C:\Windows\xk.exe
      C:\Windows\xk.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:3044
    • C:\Windows\SysWOW64\IExplorer.exe
      C:\Windows\system32\IExplorer.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:2988
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:2052
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:2092
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:768
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:1144
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:2228
  • C:\Program Files (x86)\Microsoft Office\Office14\OUTLOOK.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\OUTLOOK.EXE" -Embedding
    1⤵
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of SetWindowsHookEx
    PID:2116

Network

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

2
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Winlogon Helper DLL

1
T1547.004

Event Triggered Execution

1
T1546

Change Default File Association

1
T1546.001

Privilege Escalation

Boot or Logon Autostart Execution

2
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Winlogon Helper DLL

1
T1547.004

Event Triggered Execution

1
T1546

Change Default File Association

1
T1546.001

Defense Evasion

Modify Registry

7
T1112

Hide Artifacts

2
T1564

Hidden Files and Directories

2
T1564.001

Discovery

Query Registry

1
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

2
T1082

Impact

Inhibit System Recovery

1
T1490

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\WINDOWS\CSRSS.EXE
    Filesize

    91KB

    MD5

    307772b9c12844054c6101ac3c2ad3bf

    SHA1

    da9dc4e1a4825e8a9dfeb4c1a9f76155ce2a29ed

    SHA256

    cacec679698917f96a46f1841f61dcfcc3268a6e41158ba128ffa43cb9ef1f04

    SHA512

    80b2276b12435781e7ceaf54d5e61a1a8ba758f665a9385925b4bd6c69a77769e7a2f199ec1d8e4d45339c2be7174333325740353762be2b973d6dda22433f4d

  • C:\Users\Admin\AppData\Local\WINDOWS\WINLOGON.EXE
    Filesize

    91KB

    MD5

    eeae5e99edf489c7e5d69c51323f11a1

    SHA1

    f11f485868054f0456b7a2f028e4f6bd14dda3b0

    SHA256

    5804327c9061ba9bbc80ddeea64d47a117b4c5ea199597dbf37c5d42dbd39dce

    SHA512

    18f181b592fb23a2a7ffefad64fd3d085da6a5080acee2ca69b85acecdad0f08fd9dd0c6095dc7ffea352ff0de06c7b151531c41db7ef7778deee794cbde5e47

  • C:\Users\Admin\AppData\Local\winlogon.exe
    Filesize

    91KB

    MD5

    5a108210269af0b88ca4eef1dc0fa910

    SHA1

    92de8c2d188a41254f5fac7be61e9e08339d10f6

    SHA256

    31ddfe29a74d876dce7fd5827b8ffa35df4bc24888cb1ec8972e282587481cf0

    SHA512

    1ef5bd036251fc2ca91343f95552f88baf5cf9c10fa0a5075c71b35b8bc75dcc645025c72e29af7692fcbe037ffef668551e896dc9eb10dd9b9a9387019869ad

  • C:\Windows\xk.exe
    Filesize

    91KB

    MD5

    b1a94bc82791b50e1c20179f618b30cd

    SHA1

    0447138682305c533aa4f0c1a49cca9301a4228e

    SHA256

    e68b1414f5f13143d105f51d26faabf5dac24dd320179679f767639d118e74ef

    SHA512

    22792a89197009edcbca68168d22e0f3ac60231907fd0efbb7c03e9db09a159fa8df75bb5a14fbedae708de1d58848820ae921daae9076858ab61e5df819dfce

  • C:\Windows\xk.exe
    Filesize

    91KB

    MD5

    4129077edb84220020bf7f5c2e81761b

    SHA1

    74ff5979228095481b320700d4cb3e285e7de0b3

    SHA256

    9b63369155235759267ca05d2fbcf317fdd89b7cba01366c31317a0fa4a58150

    SHA512

    4ff7fe80f6ecf19e596dc138253c0b8c024334b06e46d514a39bfd119bf28fd873006deb17783705c96b4a62ae4fce531731a138f410f9ce8011adab50e415cf

  • \Users\Admin\AppData\Local\WINDOWS\CSRSS.EXE
    Filesize

    91KB

    MD5

    6f0c0f97d5cc78fa6ddd6b2ed9265db0

    SHA1

    cabaa6de357c1fbdc02d683ba97940de3504f819

    SHA256

    69fbac70a285d6a43f10326bcb9ce53f0a68b8f91e11a6daa23645ec7824b94a

    SHA512

    ee2aaa06298ae14d7135054e5cfb92a83a0ceae6db1295195e538409d8b9963a2668e0742b0ca351340ce18fcacf1793fa149f3eec9ecc307a0c78ff2b574e09

  • \Users\Admin\AppData\Local\WINDOWS\LSASS.EXE
    Filesize

    91KB

    MD5

    f7507a1662c35cbfa588f5bf7ad8ad75

    SHA1

    717d990092d900dd8fd17b9cf26fda10ac6f71a3

    SHA256

    145481de639d6dae2497a73ede03999702413a000a041c529845f1b9b4b6b788

    SHA512

    03a785fd46243f9ebd6d1d7837c7c2eb0020e23a0fcce54ccbfc137422dba2c74ab21f6d7417f4b5684df7c7850d0ca72e317b00bb0f318f95b619381f817c91

  • \Users\Admin\AppData\Local\WINDOWS\LSASS.EXE
    Filesize

    91KB

    MD5

    71c4c71e2f2905bfcc9eac2bc62cdf18

    SHA1

    25cd4175bdbdcd457a9cb0d2d9fa9d30178f0ada

    SHA256

    f81536ee2ba6db3e31cae07788eb2c9f00edf477c922791ad93e95423b6d77fd

    SHA512

    fef9ca90ee2ef3c8c5788bb1653c6236d7bfc546ea0a26fa5406a20b0545385a6bdc978517102c5ba0c8b4bf32c09dfc8fe32ee07a28511a93d6ba1617af9c1a

  • \Users\Admin\AppData\Local\WINDOWS\SERVICES.EXE
    Filesize

    91KB

    MD5

    4a707ddfedaede1b4a781ccac502a284

    SHA1

    37ec31d5eb1baebfa55cc73db66ed711de27c56d

    SHA256

    29d542cdadfc9d360f87d6789dacbb5faa26fffe351dc840f06342c0eb8d19d2

    SHA512

    c2d6abb4708f5852d78da89992ee0d2e00b28e330671893786666f5775b092e316f81f0acaeb8f79e4d32fdcb497a3f7cca54f9ee8b9e6118a455cea2d1abd11

  • \Users\Admin\AppData\Local\WINDOWS\SERVICES.EXE
    Filesize

    91KB

    MD5

    1a6fb603c3d9d93cda1e4492ea30a7cd

    SHA1

    70538a358bf4fa0ce76bf09c7ec54664135bd27c

    SHA256

    bdc72d5dae1162859d5163f3b7227518c7610c55ffdf2bc9d51ac1c69c86dba3

    SHA512

    0ba0ad8a7a744707db22ab11884168872dde5997cb4c8bf17a0be274c2400f4ccb13fd19db5aa3455ace4812b2f895c8a89a67aaa5b1581bee87a94dadc63791

  • \Users\Admin\AppData\Local\WINDOWS\SMSS.EXE
    Filesize

    91KB

    MD5

    72373122fc8dad132e04278357127855

    SHA1

    3e950759a1e56a41ce0e2af97f2e6798df2158ab

    SHA256

    2219b2ce0ea546e1b9a1b5c3d31a5a76e1e1ba44f7a72f5e92b1ad1bd6892543

    SHA512

    b303060316f17f9aadb648715718c855634c530e5cfbeb90322804313dbb9454dd62e1f60200b517556189620b25abf4e4bd79e16cbe53c906859634abbcc3f8

  • \Users\Admin\AppData\Local\WINDOWS\WINLOGON.EXE
    Filesize

    91KB

    MD5

    d6c263e31a1f64522527675ed5e0b112

    SHA1

    080eea87b17178082f5f81411ae120e0474aa193

    SHA256

    71269e2b0c797e8bbf6e28b93532c4057f2747472a2d7e13218cd4e91d88da24

    SHA512

    60eb8c2bc5ca4272e45a6a28de1c3d146c417772509673911b1ab2221a8fa8d40a245a4d2310b8defdca1987b3f95f8783693a4ed8ac9de03358f03e620d0338

  • \Windows\SysWOW64\IExplorer.exe
    Filesize

    91KB

    MD5

    c5411e0bff11edc954b03af16a44849e

    SHA1

    e69bef81823408daf1f79e3fd7a9a7aa30bdaef1

    SHA256

    40d38294c27b7bede7e0963e575b4b7949eaeb7ded2c321c382c1deeeab17984

    SHA512

    e0ce634c2f50603aa4cbaacb7f6ae408ce0b3bf823c337e21d8f9f9aff9f7117dbefc8ad2bc5241f8755b7bf5cf8a4ba1a7b49fdb6f92c973cd8edd12451b4b5

  • \Windows\SysWOW64\IExplorer.exe
    Filesize

    91KB

    MD5

    97e1a255c928b9b7eb7226ed2004ac11

    SHA1

    6a3bc28faaf7463f22587fc6e8b70663faf61b34

    SHA256

    be38f965a10f724f3e5fd8e85ded34eaa9cbcd1ad0516a6f6733907084cc8caa

    SHA512

    2e9bc8ac80084961d09a38e811fa422f0f082a846da586be17c4a5526410fe2842419146a329bd730c484fc6af51d1a63c31a671efefcbe366a83fed7764c1f7

  • memory/464-137-0x0000000000400000-0x000000000042F000-memory.dmp
    Filesize

    188KB

  • memory/464-141-0x0000000000400000-0x000000000042F000-memory.dmp
    Filesize

    188KB

  • memory/768-284-0x0000000000400000-0x000000000042F000-memory.dmp
    Filesize

    188KB

  • memory/1032-162-0x0000000000400000-0x000000000042F000-memory.dmp
    Filesize

    188KB

  • memory/1144-292-0x0000000000400000-0x000000000042F000-memory.dmp
    Filesize

    188KB

  • memory/1296-127-0x0000000000400000-0x000000000042F000-memory.dmp
    Filesize

    188KB

  • memory/2000-185-0x0000000000400000-0x000000000042F000-memory.dmp
    Filesize

    188KB

  • memory/2008-151-0x0000000000400000-0x000000000042F000-memory.dmp
    Filesize

    188KB

  • memory/2052-256-0x0000000000400000-0x000000000042F000-memory.dmp
    Filesize

    188KB

  • memory/2052-262-0x0000000000400000-0x000000000042F000-memory.dmp
    Filesize

    188KB

  • memory/2092-273-0x0000000000400000-0x000000000042F000-memory.dmp
    Filesize

    188KB

  • memory/2116-329-0x000000005FFF0000-0x0000000060000000-memory.dmp
    Filesize

    64KB

  • memory/2228-304-0x0000000000400000-0x000000000042F000-memory.dmp
    Filesize

    188KB

  • memory/2392-116-0x0000000000400000-0x000000000042F000-memory.dmp
    Filesize

    188KB

  • memory/2868-255-0x00000000004A0000-0x00000000004CF000-memory.dmp
    Filesize

    188KB

  • memory/2868-0-0x0000000000400000-0x000000000042F000-memory.dmp
    Filesize

    188KB

  • memory/2868-117-0x00000000004A0000-0x00000000004CF000-memory.dmp
    Filesize

    188KB

  • memory/2868-130-0x00000000004A0000-0x00000000004CF000-memory.dmp
    Filesize

    188KB

  • memory/2868-456-0x00000000004A0000-0x00000000004CF000-memory.dmp
    Filesize

    188KB

  • memory/2868-231-0x00000000004A0000-0x00000000004CF000-memory.dmp
    Filesize

    188KB

  • memory/2868-454-0x0000000000400000-0x000000000042F000-memory.dmp
    Filesize

    188KB

  • memory/2868-110-0x00000000004A0000-0x00000000004CF000-memory.dmp
    Filesize

    188KB

  • memory/2868-111-0x00000000004A0000-0x00000000004CF000-memory.dmp
    Filesize

    188KB

  • memory/2868-300-0x00000000004A0000-0x00000000004CF000-memory.dmp
    Filesize

    188KB

  • memory/2868-159-0x00000000004A0000-0x00000000004CF000-memory.dmp
    Filesize

    188KB

  • memory/2868-170-0x0000000000400000-0x000000000042F000-memory.dmp
    Filesize

    188KB

  • memory/2868-136-0x00000000004A0000-0x00000000004CF000-memory.dmp
    Filesize

    188KB

  • memory/2988-249-0x0000000000400000-0x000000000042F000-memory.dmp
    Filesize

    188KB

  • memory/3044-238-0x0000000000400000-0x000000000042F000-memory.dmp
    Filesize

    188KB

  • memory/3044-232-0x0000000000400000-0x000000000042F000-memory.dmp
    Filesize

    188KB