Analysis
-
max time kernel
149s -
max time network
105s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
22-05-2024 21:05
Behavioral task
behavioral1
Sample
3b740935520147afea5b306d569097b0_NeikiAnalytics.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
3b740935520147afea5b306d569097b0_NeikiAnalytics.exe
Resource
win10v2004-20240426-en
General
-
Target
3b740935520147afea5b306d569097b0_NeikiAnalytics.exe
-
Size
34KB
-
MD5
3b740935520147afea5b306d569097b0
-
SHA1
342a270999b4bd8424a2841edf8d6d7b53f862a8
-
SHA256
933b5acb7c2ccb1ebdb4612e907a2627757844178d1077b7a0c404eac1051ae2
-
SHA512
49e052880c28539e8357f10bc188e43fd818a9a5c24114e872696a53a7186785f1629201c1778ddd1324846844011db5a117c5af1f9d83ddbab05624c57bb0af
-
SSDEEP
768:UEzNbLcQ9qQuVriDMuyuruTD0qB77777J77c77c77c7nOTysMljy:l3h9qQA6hZunrB77777J77c77c77c7O7
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 3 IoCs
Processes:
3b740935520147afea5b306d569097b0_NeikiAnalytics.exe÷ùù§øÕùùø„•.exeüþþ¬ýÚþþý.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "Explorer.exe \"C:\\Users\\Admin\\Templates\\adtools.{D20EA4E1-3957-11d2-A40B-0C5020524153}.\\üþþ¬ýÚþþý.exe\"" 3b740935520147afea5b306d569097b0_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "Explorer.exe \"C:\\Users\\Admin\\Templates\\adtools.{D20EA4E1-3957-11d2-A40B-0C5020524153}.\\üþþ¬ýÚþþý.exe\"" ÷ùù§øÕùùø„•.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "Explorer.exe \"C:\\Users\\Admin\\Templates\\adtools.{D20EA4E1-3957-11d2-A40B-0C5020524153}.\\üþþ¬ýÚþþý.exe\"" üþþ¬ýÚþþý.exe -
Disables RegEdit via registry modification 2 IoCs
Processes:
÷ùù§øÕùùø„•.exeüþþ¬ýÚþþý.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" ÷ùù§øÕùùø„•.exe Set value (int) \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" üþþ¬ýÚþþý.exe -
Disables Task Manager via registry modification
-
Modifies Installed Components in the registry 2 TTPs 4 IoCs
Processes:
3b740935520147afea5b306d569097b0_NeikiAnalytics.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Active Setup\Installed Components\{CC9B26D0-1993-5D1C-265D-26D0265D1993}\last-check = "üþþ¬ýÚþþý.exe" 3b740935520147afea5b306d569097b0_NeikiAnalytics.exe Set value (str) \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Active Setup\Installed Components\{CC9B26D0-1993-5D1C-265D-26D0265D1993}\last-check7 = "÷ùù§øÕùùø\u0090„•\u0090.exe" 3b740935520147afea5b306d569097b0_NeikiAnalytics.exe Key created \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Software\Microsoft\Active Setup\Installed Components\{CC9B26D0-1993-5D1C-265D-26D0265D1993} 3b740935520147afea5b306d569097b0_NeikiAnalytics.exe Set value (str) \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Active Setup\Installed Components\{CC9B26D0-1993-5D1C-265D-26D0265D1993}\Direktori = "d[}v”†“”}b…ŽŠ\u008f}u†Ž‘\u008d‚•†”}‚…•\u0090\u0090\u008d”OœeSQfbUfRNTZVXNRR…SNbUQcNQdVQSQVSURVTž" 3b740935520147afea5b306d569097b0_NeikiAnalytics.exe -
Executes dropped EXE 2 IoCs
Processes:
÷ùù§øÕùùø„•.exeüþþ¬ýÚþþý.exepid process 4724 ÷ùù§øÕùùø„•.exe 3980 üþþ¬ýÚþþý.exe -
Modifies system executable filetype association 2 TTPs 2 IoCs
Processes:
÷ùù§øÕùùø„•.exeüþþ¬ýÚþþý.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\ = "Microscope World Document" ÷ùù§øÕùùø„•.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\ = "Microscope World Document" üþþ¬ýÚþþý.exe -
Processes:
resource yara_rule behavioral2/memory/4664-0-0x0000000000400000-0x0000000000422000-memory.dmp upx C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\adtools.{D20EA4E1-3957-11d2-A40B-0C5020524153}\÷ùù§øÕùùø„•.exe upx C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\adtools.{D20EA4E1-3957-11d2-A40B-0C5020524153}\üþþ¬ýÚþþý.exe upx behavioral2/memory/3980-16-0x0000000000400000-0x0000000000422000-memory.dmp upx behavioral2/memory/4664-21-0x0000000000400000-0x0000000000422000-memory.dmp upx behavioral2/memory/4724-22-0x0000000000400000-0x0000000000422000-memory.dmp upx behavioral2/memory/3980-23-0x0000000000400000-0x0000000000422000-memory.dmp upx behavioral2/memory/4724-24-0x0000000000400000-0x0000000000422000-memory.dmp upx behavioral2/memory/3980-25-0x0000000000400000-0x0000000000422000-memory.dmp upx behavioral2/memory/4724-26-0x0000000000400000-0x0000000000422000-memory.dmp upx behavioral2/memory/4724-27-0x0000000000400000-0x0000000000422000-memory.dmp upx behavioral2/memory/3980-28-0x0000000000400000-0x0000000000422000-memory.dmp upx behavioral2/memory/4724-29-0x0000000000400000-0x0000000000422000-memory.dmp upx behavioral2/memory/3980-30-0x0000000000400000-0x0000000000422000-memory.dmp upx behavioral2/memory/3980-32-0x0000000000400000-0x0000000000422000-memory.dmp upx behavioral2/memory/4724-31-0x0000000000400000-0x0000000000422000-memory.dmp upx behavioral2/memory/4724-33-0x0000000000400000-0x0000000000422000-memory.dmp upx behavioral2/memory/3980-34-0x0000000000400000-0x0000000000422000-memory.dmp upx behavioral2/memory/4724-35-0x0000000000400000-0x0000000000422000-memory.dmp upx behavioral2/memory/3980-36-0x0000000000400000-0x0000000000422000-memory.dmp upx behavioral2/memory/4724-37-0x0000000000400000-0x0000000000422000-memory.dmp upx behavioral2/memory/3980-38-0x0000000000400000-0x0000000000422000-memory.dmp upx behavioral2/memory/4724-39-0x0000000000400000-0x0000000000422000-memory.dmp upx behavioral2/memory/3980-40-0x0000000000400000-0x0000000000422000-memory.dmp upx behavioral2/memory/4724-41-0x0000000000400000-0x0000000000422000-memory.dmp upx behavioral2/memory/3980-42-0x0000000000400000-0x0000000000422000-memory.dmp upx behavioral2/memory/4724-43-0x0000000000400000-0x0000000000422000-memory.dmp upx behavioral2/memory/3980-44-0x0000000000400000-0x0000000000422000-memory.dmp upx behavioral2/memory/4724-45-0x0000000000400000-0x0000000000422000-memory.dmp upx behavioral2/memory/3980-46-0x0000000000400000-0x0000000000422000-memory.dmp upx behavioral2/memory/4724-47-0x0000000000400000-0x0000000000422000-memory.dmp upx behavioral2/memory/3980-48-0x0000000000400000-0x0000000000422000-memory.dmp upx behavioral2/memory/4724-49-0x0000000000400000-0x0000000000422000-memory.dmp upx behavioral2/memory/3980-50-0x0000000000400000-0x0000000000422000-memory.dmp upx -
Adds Run key to start application 2 TTPs 3 IoCs
Processes:
3b740935520147afea5b306d569097b0_NeikiAnalytics.exe÷ùù§øÕùùø„•.exeüþþ¬ýÚþþý.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\÷ùù§øÕùùø„•.exe = "C:\\Users\\Admin\\Templates\\adtools.{D20EA4E1-3957-11d2-A40B-0C5020524153}.\\÷ùù§øÕùùø\u0090„•\u0090.exe" 3b740935520147afea5b306d569097b0_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\÷ùù§øÕùùø„•.exe = "C:\\Users\\Admin\\Templates\\adtools.{D20EA4E1-3957-11d2-A40B-0C5020524153}.\\÷ùù§øÕùùø\u0090„•\u0090.exe" ÷ùù§øÕùùø„•.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\÷ùù§øÕùùø„•.exe = "C:\\Users\\Admin\\Templates\\adtools.{D20EA4E1-3957-11d2-A40B-0C5020524153}.\\÷ùù§øÕùùø\u0090„•\u0090.exe" üþþ¬ýÚþþý.exe -
Drops file in System32 directory 12 IoCs
Processes:
÷ùù§øÕùùø„•.exeüþþ¬ýÚþþý.exedescription ioc process File opened for modification C:\Windows\SysWOW64\KesenjanganSosial.exe ÷ùù§øÕùùø„•.exe File opened for modification C:\Windows\SysWOW64\RakyatKelaparan.exe ÷ùù§øÕùùø„•.exe File opened for modification C:\Windows\SysWOW64\IDTemplate.exe ÷ùù§øÕùùø„•.exe File opened for modification C:\Windows\SysWOW64\cmd-brontok.exe ÷ùù§øÕùùø„•.exe File opened for modification C:\Windows\SysWOW64\RakyatKelaparan.exe üþþ¬ýÚþþý.exe File opened for modification C:\Windows\SysWOW64\IDTemplate.exe üþþ¬ýÚþþý.exe File opened for modification C:\Windows\SysWOW64\Admin's Setting.scr ÷ùù§øÕùùø„•.exe File opened for modification C:\Windows\SysWOW64\Admin's Setting.scr üþþ¬ýÚþþý.exe File opened for modification C:\Windows\SysWOW64\KesenjanganSosial.exe üþþ¬ýÚþþý.exe File opened for modification C:\Windows\SysWOW64\3D Animation.scr üþþ¬ýÚþþý.exe File opened for modification C:\Windows\SysWOW64\cmd-brontok.exe üþþ¬ýÚþþý.exe File opened for modification C:\Windows\SysWOW64\3D Animation.scr ÷ùù§øÕùùø„•.exe -
Drops file in Windows directory 20 IoCs
Processes:
üþþ¬ýÚþþý.exe÷ùù§øÕùùø„•.exedescription ioc process File opened for modification C:\Windows\KesenjanganSosial.exe üþþ¬ýÚþþý.exe File opened for modification C:\Windows\ShellNew\IDTemplate.exe üþþ¬ýÚþþý.exe File opened for modification C:\Windows\ShellNew\cmd-brontok.exe üþþ¬ýÚþþý.exe File opened for modification C:\Windows\cmd-brontok.exe ÷ùù§øÕùùø„•.exe File opened for modification C:\Windows\ShellNew\IDTemplate.exe ÷ùù§øÕùùø„•.exe File opened for modification C:\Windows\IDTemplate.exe üþþ¬ýÚþþý.exe File opened for modification C:\Windows\RakyatKelaparan.exe ÷ùù§øÕùùø„•.exe File opened for modification C:\Windows\3D Animation.scr ÷ùù§øÕùùø„•.exe File opened for modification C:\Windows\ShellNew\3D Animation.scr üþþ¬ýÚþþý.exe File opened for modification C:\Windows\ShellNew\cmd-brontok.exe ÷ùù§øÕùùø„•.exe File opened for modification C:\Windows\ShellNew\KesenjanganSosial.exe ÷ùù§øÕùùø„•.exe File opened for modification C:\Windows\cmd-brontok.exe üþþ¬ýÚþþý.exe File opened for modification C:\Windows\ShellNew\RakyatKelaparan.exe üþþ¬ýÚþþý.exe File opened for modification C:\Windows\ShellNew\KesenjanganSosial.exe üþþ¬ýÚþþý.exe File opened for modification C:\Windows\IDTemplate.exe ÷ùù§øÕùùø„•.exe File opened for modification C:\Windows\ShellNew\RakyatKelaparan.exe ÷ùù§øÕùùø„•.exe File opened for modification C:\Windows\ShellNew\3D Animation.scr ÷ùù§øÕùùø„•.exe File opened for modification C:\Windows\KesenjanganSosial.exe ÷ùù§øÕùùø„•.exe File opened for modification C:\Windows\RakyatKelaparan.exe üþþ¬ýÚþþý.exe File opened for modification C:\Windows\3D Animation.scr üþþ¬ýÚþþý.exe -
Modifies registry class 4 IoCs
Processes:
÷ùù§øÕùùø„•.exeüþþ¬ýÚþþý.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile ÷ùù§øÕùùø„•.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\ = "Microscope World Document" ÷ùù§øÕùùø„•.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile üþþ¬ýÚþþý.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\ = "Microscope World Document" üþþ¬ýÚþþý.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
Processes:
3b740935520147afea5b306d569097b0_NeikiAnalytics.exe÷ùù§øÕùùø„•.exeüþþ¬ýÚþþý.exepid process 4664 3b740935520147afea5b306d569097b0_NeikiAnalytics.exe 4724 ÷ùù§øÕùùø„•.exe 3980 üþþ¬ýÚþþý.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
3b740935520147afea5b306d569097b0_NeikiAnalytics.exedescription pid process target process PID 4664 wrote to memory of 4724 4664 3b740935520147afea5b306d569097b0_NeikiAnalytics.exe ÷ùù§øÕùùø„•.exe PID 4664 wrote to memory of 4724 4664 3b740935520147afea5b306d569097b0_NeikiAnalytics.exe ÷ùù§øÕùùø„•.exe PID 4664 wrote to memory of 4724 4664 3b740935520147afea5b306d569097b0_NeikiAnalytics.exe ÷ùù§øÕùùø„•.exe PID 4664 wrote to memory of 3980 4664 3b740935520147afea5b306d569097b0_NeikiAnalytics.exe üþþ¬ýÚþþý.exe PID 4664 wrote to memory of 3980 4664 3b740935520147afea5b306d569097b0_NeikiAnalytics.exe üþþ¬ýÚþþý.exe PID 4664 wrote to memory of 3980 4664 3b740935520147afea5b306d569097b0_NeikiAnalytics.exe üþþ¬ýÚþþý.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\3b740935520147afea5b306d569097b0_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\3b740935520147afea5b306d569097b0_NeikiAnalytics.exe"1⤵
- Modifies WinLogon for persistence
- Modifies Installed Components in the registry
- Adds Run key to start application
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4664 -
C:\Users\Admin\Templates\adtools.{D20EA4E1-3957-11d2-A40B-0C5020524153}\÷ùù§øÕùùø„•.exeC:\Users\Admin\Templates\adtools.{D20EA4E1-3957-11d2-A40B-0C5020524153}\÷ùù§øÕùùø„•.exe2⤵
- Modifies WinLogon for persistence
- Disables RegEdit via registry modification
- Executes dropped EXE
- Modifies system executable filetype association
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:4724
-
-
C:\Users\Admin\Templates\adtools.{D20EA4E1-3957-11d2-A40B-0C5020524153}\üþþ¬ýÚþþý.exeC:\Users\Admin\Templates\adtools.{D20EA4E1-3957-11d2-A40B-0C5020524153}\üþþ¬ýÚþþý.exe2⤵
- Modifies WinLogon for persistence
- Disables RegEdit via registry modification
- Executes dropped EXE
- Modifies system executable filetype association
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:3980
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Event Triggered Execution
1Change Default File Association
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\adtools.{D20EA4E1-3957-11d2-A40B-0C5020524153}\÷ùù§øÕùùø„•.exe
Filesize44KB
MD562d90fad015832eed4bf19d1b28e28d9
SHA1e47a78cdc8ee374563e033c0c21af9c4c0be385e
SHA2566968793399f62703e502a6d2a0dc57b85bac4280ca21ed59dfe932e140072be0
SHA512d4a01852f6d2ce3083af467a5659a34246fef1c3a9d0c43c7f419e6dc7dd815331c0b545a63ad6ea51225e98c6975f31bafed5eecc2ff1f54641889f6a3bda27
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\adtools.{D20EA4E1-3957-11d2-A40B-0C5020524153}\üþþ¬ýÚþþý.exe
Filesize33KB
MD538ce6ef96a69e07109075e19d5f18376
SHA14a13167ea57ebbaa72d432b450b0889e04d36c66
SHA25648deeba6e9464df02d9c3e992d9a6d38bec25194083eca67f10f4cd5aeef197f
SHA5128f305205d7d5e94ab3fbe828c9993c1bbefe1f4d3d2daa33132eecdff420b456811821b6c59e0103c921e2fd9836d40360bf1240d14e5d576b00f8cca9d05f93