Analysis

  • max time kernel
    134s
  • max time network
    142s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22-05-2024 23:41

General

  • Target

    5a108210269af0b88ca4eef1dc0fa910_NeikiAnalytics.exe

  • Size

    91KB

  • MD5

    5a108210269af0b88ca4eef1dc0fa910

  • SHA1

    92de8c2d188a41254f5fac7be61e9e08339d10f6

  • SHA256

    31ddfe29a74d876dce7fd5827b8ffa35df4bc24888cb1ec8972e282587481cf0

  • SHA512

    1ef5bd036251fc2ca91343f95552f88baf5cf9c10fa0a5075c71b35b8bc75dcc645025c72e29af7692fcbe037ffef668551e896dc9eb10dd9b9a9387019869ad

  • SSDEEP

    1536:QRsjdIZfaif4YrxCjjKnouy8VzTRsjdIZfaif4YrxCjjKnouy8VzK:QOyZy9wCjOouttTOyZy9wCjOouttK

Score
10/10

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 2 IoCs
  • Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Disables RegEdit via registry modification 2 IoCs
  • Disables use of System Restore points 1 TTPs
  • Executes dropped EXE 7 IoCs
  • Modifies system executable filetype association 2 TTPs 13 IoCs
  • UPX packed file 19 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 5 IoCs
  • Drops file in System32 directory 6 IoCs
  • Drops file in Windows directory 2 IoCs
  • Modifies Control Panel 4 IoCs
  • Modifies registry class 15 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs
  • System policy modification 1 TTPs 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5a108210269af0b88ca4eef1dc0fa910_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\5a108210269af0b88ca4eef1dc0fa910_NeikiAnalytics.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Modifies visibility of file extensions in Explorer
    • Modifies visiblity of hidden/system files in Explorer
    • Disables RegEdit via registry modification
    • Modifies system executable filetype association
    • Adds Run key to start application
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies Control Panel
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    • System policy modification
    PID:3316
    • C:\Windows\xk.exe
      C:\Windows\xk.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:2576
    • C:\Windows\SysWOW64\IExplorer.exe
      C:\Windows\system32\IExplorer.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:4092
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:2192
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:2352
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:3416
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:2432
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:4800

Network

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

2
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Winlogon Helper DLL

1
T1547.004

Event Triggered Execution

1
T1546

Change Default File Association

1
T1546.001

Privilege Escalation

Boot or Logon Autostart Execution

2
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Winlogon Helper DLL

1
T1547.004

Event Triggered Execution

1
T1546

Change Default File Association

1
T1546.001

Defense Evasion

Modify Registry

6
T1112

Hide Artifacts

2
T1564

Hidden Files and Directories

2
T1564.001

Impact

Inhibit System Recovery

1
T1490

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\WINDOWS\CSRSS.EXE
    Filesize

    91KB

    MD5

    768be6660d00e480dbf74b2ee42d0205

    SHA1

    b284d8cff7333e038b108ee8141585b3ef096f81

    SHA256

    7030dee2ee6f7363ed3174abb2dfa1931f8923c8b1670c675fce71b8a86ee438

    SHA512

    f396d2f1bcee7b61ebab2f477e54e97b70cdbf962222d70eef0df79898fef8d2436fe58209a384000a9a8ea56f0dbb05eb8041287140361e96ab7f697f947336

  • C:\Users\Admin\AppData\Local\WINDOWS\LSASS.EXE
    Filesize

    91KB

    MD5

    47779725dc9c2b0f42348b777e3f23da

    SHA1

    64536a535deccfa287ec3f64337b3aecd279f83a

    SHA256

    e965ac00c75ed30bf594c804f4d901295ccbabbf52b954d8dcb9d6f2fff8b737

    SHA512

    72e8bfe834ad01507e403ff8a63600734de46833d5adad4061fa98c2ff3c4f96debaa4b3f3bbbcd9ac6ff68a434fb9a285348d6c4e4fdf4d39c6f72426005c74

  • C:\Users\Admin\AppData\Local\WINDOWS\SERVICES.EXE
    Filesize

    91KB

    MD5

    2c6d4b2b8a65577412956cf569d72eec

    SHA1

    ccedb5a66784bab11a1938c4db1161d00e3bad81

    SHA256

    0e646e126b7928e2490ea96bf422bd7a251571e0626bad7e6e05a5a3c9c392e0

    SHA512

    bbf2a2263ac86f89ea681c497da3cfae3860df82629056ab25bf5ebed62c1d742f87f3b3e9cef518723ac3a8610ee8430b7af6949654c400c7d548951a23b143

  • C:\Users\Admin\AppData\Local\WINDOWS\SMSS.EXE
    Filesize

    91KB

    MD5

    006459f59e33572b916e8eb12639e965

    SHA1

    313dc506f54b0eccc7b5440b1c27b8710c5b0bab

    SHA256

    c1cfee5268ebd3cfbfe809fa6eb1be49d19cccb1447c5ea8564dc008ebc71ab0

    SHA512

    ddaf7739e2ff41b0c5acd434780261da0ef133ef4285c154376d3b4800f5d40855131c1f5caaac7b787e98074edf1dc8ac38fdfbb678cf273c347c2eb2366d47

  • C:\Users\Admin\AppData\Local\WINDOWS\WINLOGON.EXE
    Filesize

    91KB

    MD5

    81b76194b84685e37c2b2ec825aecf69

    SHA1

    326da74582e9072f45105e2b5bf2f92b82e4056a

    SHA256

    05a2cf0494b54f9fc3646f847dc3108ac3c6ebcc749f87c3ab33a522ee58e34f

    SHA512

    01c84d9f25c03788c92c7f5b69bebcb643ec8855f724a9ace7438d116e9f6f1504fa3c1d67703d5d7a898136f2c4f16028dba69d657e14b83a75ae2e83c4c8b7

  • C:\Users\Admin\AppData\Local\winlogon.exe
    Filesize

    91KB

    MD5

    5a108210269af0b88ca4eef1dc0fa910

    SHA1

    92de8c2d188a41254f5fac7be61e9e08339d10f6

    SHA256

    31ddfe29a74d876dce7fd5827b8ffa35df4bc24888cb1ec8972e282587481cf0

    SHA512

    1ef5bd036251fc2ca91343f95552f88baf5cf9c10fa0a5075c71b35b8bc75dcc645025c72e29af7692fcbe037ffef668551e896dc9eb10dd9b9a9387019869ad

  • C:\Windows\SysWOW64\IExplorer.exe
    Filesize

    91KB

    MD5

    8988f3549a285de43533e3620f446223

    SHA1

    430d2c801201307e5ad4543fd019f39bfa61205f

    SHA256

    2c35f36528e1ee01330057ac93f49f7469a0b60d5f16ec043927f5da328d6f47

    SHA512

    69e9f9eefe21d0071ad3a50dd4f328ebb38a4faaa1730f26082fb305edc4b8415f627ab3d629bf033efe2edcc35ef672d08ecb5584ce6e07e04bf714cbfe8283

  • C:\Windows\xk.exe
    Filesize

    91KB

    MD5

    65ff50ed63f0dde44f8f7f321c7bdd99

    SHA1

    4d4d10fd5fbd7c0465db96cbebc91ae927f1cf5d

    SHA256

    54bb838f9dbae8f38e849790a6dde891da43c1f5a33f2123cfc60c062d7c9c48

    SHA512

    54ec1bd676f676195fa22bb7e6a44c2d8fdd1257c7eb53b89364e87b44691a26c2130563406a9cfabc22fd1303b77765533cf4885cdbda8adf64e76880519510

  • memory/2192-125-0x0000000000400000-0x000000000042F000-memory.dmp
    Filesize

    188KB

  • memory/2352-131-0x0000000000400000-0x000000000042F000-memory.dmp
    Filesize

    188KB

  • memory/2432-147-0x0000000000400000-0x000000000042F000-memory.dmp
    Filesize

    188KB

  • memory/2576-113-0x0000000000400000-0x000000000042F000-memory.dmp
    Filesize

    188KB

  • memory/3316-0-0x0000000000400000-0x000000000042F000-memory.dmp
    Filesize

    188KB

  • memory/3316-154-0x0000000000400000-0x000000000042F000-memory.dmp
    Filesize

    188KB

  • memory/3416-135-0x0000000000400000-0x000000000042F000-memory.dmp
    Filesize

    188KB

  • memory/3416-139-0x0000000000400000-0x000000000042F000-memory.dmp
    Filesize

    188KB

  • memory/4092-118-0x0000000000400000-0x000000000042F000-memory.dmp
    Filesize

    188KB

  • memory/4092-115-0x0000000000400000-0x000000000042F000-memory.dmp
    Filesize

    188KB

  • memory/4800-152-0x0000000000400000-0x000000000042F000-memory.dmp
    Filesize

    188KB