Analysis

  • max time kernel
    150s
  • max time network
    107s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22-05-2024 23:43

General

  • Target

    5a461478355d0222aecd672945f071c0_NeikiAnalytics.exe

  • Size

    206KB

  • MD5

    5a461478355d0222aecd672945f071c0

  • SHA1

    814d798d0852f16438480008fbdcfb130cc63824

  • SHA256

    b02c658ce93141e260567a42948aa91acf1071ebcbc971852c566593a1cec4d0

  • SHA512

    09a81860d9bd6da4c92b430e3b650c289f58fb13bb43dd2243c4957c842a32f55faa50f3bf056d2c8d48434ebc1ca1a9068c1760585af5dd2bf7d8e7351d9c4e

  • SSDEEP

    3072:zvEfVUzSLhIVbV6i5LirrlZrHyrUHUckoMQ2RN6un6:zvEN2U+T6i5LirrllHy4HUcMQY69

Score
10/10

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 2 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Modifies Installed Components in the registry 2 TTPs 8 IoCs
  • Executes dropped EXE 4 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Drops file in Windows directory 6 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 2 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5a461478355d0222aecd672945f071c0_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\5a461478355d0222aecd672945f071c0_NeikiAnalytics.exe"
    1⤵
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:952
    • \??\c:\windows\system\explorer.exe
      c:\windows\system\explorer.exe
      2⤵
      • Modifies WinLogon for persistence
      • Modifies visiblity of hidden/system files in Explorer
      • Modifies Installed Components in the registry
      • Executes dropped EXE
      • Adds Run key to start application
      • Drops file in Windows directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1440
      • \??\c:\windows\system\spoolsv.exe
        c:\windows\system\spoolsv.exe SE
        3⤵
        • Executes dropped EXE
        • Drops file in Windows directory
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1204
        • \??\c:\windows\system\svchost.exe
          c:\windows\system\svchost.exe
          4⤵
          • Modifies WinLogon for persistence
          • Modifies visiblity of hidden/system files in Explorer
          • Modifies Installed Components in the registry
          • Executes dropped EXE
          • Adds Run key to start application
          • Drops file in Windows directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: GetForegroundWindowSpam
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:2488
          • \??\c:\windows\system\spoolsv.exe
            c:\windows\system\spoolsv.exe PR
            5⤵
            • Executes dropped EXE
            • Suspicious use of SetWindowsHookEx
            PID:3952
          • C:\Windows\SysWOW64\at.exe
            at 23:45 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe
            5⤵
              PID:3188
            • C:\Windows\SysWOW64\at.exe
              at 23:46 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe
              5⤵
                PID:3108
              • C:\Windows\SysWOW64\at.exe
                at 23:47 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe
                5⤵
                  PID:3528

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Roaming\mrsys.exe

          Filesize

          206KB

          MD5

          657f6874209294019980d85fa783d2b8

          SHA1

          5be28bf5f576e0d84452d063bdde75eef8366945

          SHA256

          8e573e736c0b3cfd48cdf8e33add0bdbeeb0c14d304dcaee93257efa6b90c179

          SHA512

          8a6665b7cb37539bc2cbd7fa652317e8b73a23de9298bebf1e9f0c160b8719462040c207ce9a03a77f17332f5e4a61ba1c9165c20cfa0f231288f937a7a98014

        • C:\Windows\System\explorer.exe

          Filesize

          206KB

          MD5

          dbf32185168849a80d518fbdf12aa22d

          SHA1

          c8b8a283ca6647c70b552241c213bb60d5bb7b5b

          SHA256

          e5364736ee7fd7c5ed154565aaddf26abab021bdc34d289142b23a47f2952b55

          SHA512

          6afaa39cd7cc97c133a430c06d79ee49592b55d874f7617b96e440651792bb7a75ee3037ed31e25058fb5dc9c4db9e3ececea78ec6b3d0b7e556607d5327716d

        • C:\Windows\System\spoolsv.exe

          Filesize

          206KB

          MD5

          617bd6b5c9b5d8f179487cc4f2ba9e6b

          SHA1

          96b75d7638d4e14546d720137537a30bd345b057

          SHA256

          e399a3b27b7bf0efd52d2140a23196a134ff00f95bf7877c4dc41b766cea7932

          SHA512

          9918b4bf077603b1356a48d56d5c2605b3fdcac4e23e7effa7acaa92ff81ea06653f9496b7e10778cb201b94d51ebeec441484e98708cf111437f8e47eecd9f7

        • C:\Windows\System\svchost.exe

          Filesize

          207KB

          MD5

          c43a7eeefc1da59f11e998b83dc4d448

          SHA1

          96e6162e90efdc2517859330e5978eae223f6467

          SHA256

          1dc263e5b3ef29ff5cbefb875aae881952b5f889698505624ba528023a8841cb

          SHA512

          ab7340506930089fd6564af4ca6d6755b0d6f8c56abd121031a56c4dc7eb3348468d5428d2052046f672b5fabda008bb26146788cfe0e520a77c99d103befa29