Analysis
-
max time kernel
150s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
23-05-2024 00:04
Behavioral task
behavioral1
Sample
5e3039f9dce50e58bd98fc0282edb410_NeikiAnalytics.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
5e3039f9dce50e58bd98fc0282edb410_NeikiAnalytics.exe
Resource
win10v2004-20240226-en
General
-
Target
5e3039f9dce50e58bd98fc0282edb410_NeikiAnalytics.exe
-
Size
90KB
-
MD5
5e3039f9dce50e58bd98fc0282edb410
-
SHA1
ab994179e5e8dc49cf0aee94989ab91e0032ec81
-
SHA256
85f06a091c622b548e69003065e4d922d3c2ad5e07b31df28d634272b68afb1c
-
SHA512
20da6c1dd9fa64ee5d91b05162747e57ae5548a72b9ca302b3516389ecd2d31bc70d7221a86fd58cb54b484d23d8d8eca8703d588a0d4a109d4af6a7431a5ff4
-
SSDEEP
1536:UiYwjQt6QJvzZsgDIWzm/xsXfv+hYhyQQyV5uv4JBrB7w5VRGulTG1ZCL8nj1oDf:0wjZQJvzZsgsW6/Afv+hYfQIm4/rdE3Y
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
ModiLoader Second Stage 2 IoCs
Processes:
resource yara_rule behavioral1/memory/1028-250-0x0000000000400000-0x0000000000414000-memory.dmp modiloader_stage2 behavioral1/memory/1028-262-0x0000000000400000-0x0000000000414000-memory.dmp modiloader_stage2 -
Executes dropped EXE 3 IoCs
Processes:
csrsll.execsrsll.execsrsll.exepid process 944 csrsll.exe 868 csrsll.exe 1028 csrsll.exe -
Loads dropped DLL 5 IoCs
Processes:
5e3039f9dce50e58bd98fc0282edb410_NeikiAnalytics.exepid process 2620 5e3039f9dce50e58bd98fc0282edb410_NeikiAnalytics.exe 2620 5e3039f9dce50e58bd98fc0282edb410_NeikiAnalytics.exe 2620 5e3039f9dce50e58bd98fc0282edb410_NeikiAnalytics.exe 2620 5e3039f9dce50e58bd98fc0282edb410_NeikiAnalytics.exe 2620 5e3039f9dce50e58bd98fc0282edb410_NeikiAnalytics.exe -
Processes:
resource yara_rule behavioral1/memory/2292-0-0x0000000000400000-0x0000000000453000-memory.dmp upx behavioral1/memory/2292-25-0x0000000000400000-0x0000000000453000-memory.dmp upx behavioral1/memory/2292-79-0x0000000000400000-0x0000000000453000-memory.dmp upx behavioral1/memory/2292-82-0x0000000000400000-0x0000000000453000-memory.dmp upx behavioral1/memory/2292-91-0x0000000000400000-0x0000000000453000-memory.dmp upx behavioral1/memory/2620-97-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/2620-101-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/2620-106-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/2620-108-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/2620-107-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/2292-103-0x0000000000400000-0x0000000000453000-memory.dmp upx behavioral1/memory/2620-95-0x0000000000400000-0x000000000040B000-memory.dmp upx \Users\Admin\AppData\Roaming\Microsoft\csrsll.exe upx behavioral1/memory/944-150-0x0000000000400000-0x0000000000453000-memory.dmp upx behavioral1/memory/2620-153-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/944-212-0x0000000000400000-0x0000000000453000-memory.dmp upx behavioral1/memory/944-175-0x0000000000400000-0x0000000000453000-memory.dmp upx behavioral1/memory/1028-250-0x0000000000400000-0x0000000000414000-memory.dmp upx behavioral1/memory/944-253-0x0000000000400000-0x0000000000453000-memory.dmp upx behavioral1/memory/2620-256-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/868-261-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/1028-262-0x0000000000400000-0x0000000000414000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
reg.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\Win Pdf = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\csrsll.exe" reg.exe -
Suspicious use of SetThreadContext 3 IoCs
Processes:
5e3039f9dce50e58bd98fc0282edb410_NeikiAnalytics.execsrsll.exedescription pid process target process PID 2292 set thread context of 2620 2292 5e3039f9dce50e58bd98fc0282edb410_NeikiAnalytics.exe 5e3039f9dce50e58bd98fc0282edb410_NeikiAnalytics.exe PID 944 set thread context of 868 944 csrsll.exe csrsll.exe PID 944 set thread context of 1028 944 csrsll.exe csrsll.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
csrsll.exedescription pid process Token: SeDebugPrivilege 868 csrsll.exe Token: SeDebugPrivilege 868 csrsll.exe Token: SeDebugPrivilege 868 csrsll.exe Token: SeDebugPrivilege 868 csrsll.exe Token: SeDebugPrivilege 868 csrsll.exe Token: SeDebugPrivilege 868 csrsll.exe Token: SeDebugPrivilege 868 csrsll.exe Token: SeDebugPrivilege 868 csrsll.exe Token: SeDebugPrivilege 868 csrsll.exe Token: SeDebugPrivilege 868 csrsll.exe Token: SeDebugPrivilege 868 csrsll.exe Token: SeDebugPrivilege 868 csrsll.exe Token: SeDebugPrivilege 868 csrsll.exe Token: SeDebugPrivilege 868 csrsll.exe Token: SeDebugPrivilege 868 csrsll.exe Token: SeDebugPrivilege 868 csrsll.exe Token: SeDebugPrivilege 868 csrsll.exe Token: SeDebugPrivilege 868 csrsll.exe Token: SeDebugPrivilege 868 csrsll.exe Token: SeDebugPrivilege 868 csrsll.exe Token: SeDebugPrivilege 868 csrsll.exe Token: SeDebugPrivilege 868 csrsll.exe Token: SeDebugPrivilege 868 csrsll.exe Token: SeDebugPrivilege 868 csrsll.exe Token: SeDebugPrivilege 868 csrsll.exe Token: SeDebugPrivilege 868 csrsll.exe Token: SeDebugPrivilege 868 csrsll.exe Token: SeDebugPrivilege 868 csrsll.exe Token: SeDebugPrivilege 868 csrsll.exe Token: SeDebugPrivilege 868 csrsll.exe Token: SeDebugPrivilege 868 csrsll.exe Token: SeDebugPrivilege 868 csrsll.exe Token: SeDebugPrivilege 868 csrsll.exe Token: SeDebugPrivilege 868 csrsll.exe Token: SeDebugPrivilege 868 csrsll.exe Token: SeDebugPrivilege 868 csrsll.exe Token: SeDebugPrivilege 868 csrsll.exe Token: SeDebugPrivilege 868 csrsll.exe Token: SeDebugPrivilege 868 csrsll.exe Token: SeDebugPrivilege 868 csrsll.exe Token: SeDebugPrivilege 868 csrsll.exe Token: SeDebugPrivilege 868 csrsll.exe Token: SeDebugPrivilege 868 csrsll.exe Token: SeDebugPrivilege 868 csrsll.exe Token: SeDebugPrivilege 868 csrsll.exe Token: SeDebugPrivilege 868 csrsll.exe Token: SeDebugPrivilege 868 csrsll.exe Token: SeDebugPrivilege 868 csrsll.exe Token: SeDebugPrivilege 868 csrsll.exe Token: SeDebugPrivilege 868 csrsll.exe Token: SeDebugPrivilege 868 csrsll.exe Token: SeDebugPrivilege 868 csrsll.exe Token: SeDebugPrivilege 868 csrsll.exe Token: SeDebugPrivilege 868 csrsll.exe Token: SeDebugPrivilege 868 csrsll.exe Token: SeDebugPrivilege 868 csrsll.exe Token: SeDebugPrivilege 868 csrsll.exe Token: SeDebugPrivilege 868 csrsll.exe Token: SeDebugPrivilege 868 csrsll.exe Token: SeDebugPrivilege 868 csrsll.exe Token: SeDebugPrivilege 868 csrsll.exe Token: SeDebugPrivilege 868 csrsll.exe Token: SeDebugPrivilege 868 csrsll.exe Token: SeDebugPrivilege 868 csrsll.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
Processes:
5e3039f9dce50e58bd98fc0282edb410_NeikiAnalytics.exe5e3039f9dce50e58bd98fc0282edb410_NeikiAnalytics.execsrsll.execsrsll.exepid process 2292 5e3039f9dce50e58bd98fc0282edb410_NeikiAnalytics.exe 2620 5e3039f9dce50e58bd98fc0282edb410_NeikiAnalytics.exe 944 csrsll.exe 868 csrsll.exe -
Suspicious use of WriteProcessMemory 36 IoCs
Processes:
5e3039f9dce50e58bd98fc0282edb410_NeikiAnalytics.exe5e3039f9dce50e58bd98fc0282edb410_NeikiAnalytics.execmd.execsrsll.exedescription pid process target process PID 2292 wrote to memory of 2620 2292 5e3039f9dce50e58bd98fc0282edb410_NeikiAnalytics.exe 5e3039f9dce50e58bd98fc0282edb410_NeikiAnalytics.exe PID 2292 wrote to memory of 2620 2292 5e3039f9dce50e58bd98fc0282edb410_NeikiAnalytics.exe 5e3039f9dce50e58bd98fc0282edb410_NeikiAnalytics.exe PID 2292 wrote to memory of 2620 2292 5e3039f9dce50e58bd98fc0282edb410_NeikiAnalytics.exe 5e3039f9dce50e58bd98fc0282edb410_NeikiAnalytics.exe PID 2292 wrote to memory of 2620 2292 5e3039f9dce50e58bd98fc0282edb410_NeikiAnalytics.exe 5e3039f9dce50e58bd98fc0282edb410_NeikiAnalytics.exe PID 2292 wrote to memory of 2620 2292 5e3039f9dce50e58bd98fc0282edb410_NeikiAnalytics.exe 5e3039f9dce50e58bd98fc0282edb410_NeikiAnalytics.exe PID 2292 wrote to memory of 2620 2292 5e3039f9dce50e58bd98fc0282edb410_NeikiAnalytics.exe 5e3039f9dce50e58bd98fc0282edb410_NeikiAnalytics.exe PID 2292 wrote to memory of 2620 2292 5e3039f9dce50e58bd98fc0282edb410_NeikiAnalytics.exe 5e3039f9dce50e58bd98fc0282edb410_NeikiAnalytics.exe PID 2292 wrote to memory of 2620 2292 5e3039f9dce50e58bd98fc0282edb410_NeikiAnalytics.exe 5e3039f9dce50e58bd98fc0282edb410_NeikiAnalytics.exe PID 2620 wrote to memory of 2840 2620 5e3039f9dce50e58bd98fc0282edb410_NeikiAnalytics.exe cmd.exe PID 2620 wrote to memory of 2840 2620 5e3039f9dce50e58bd98fc0282edb410_NeikiAnalytics.exe cmd.exe PID 2620 wrote to memory of 2840 2620 5e3039f9dce50e58bd98fc0282edb410_NeikiAnalytics.exe cmd.exe PID 2620 wrote to memory of 2840 2620 5e3039f9dce50e58bd98fc0282edb410_NeikiAnalytics.exe cmd.exe PID 2840 wrote to memory of 1944 2840 cmd.exe reg.exe PID 2840 wrote to memory of 1944 2840 cmd.exe reg.exe PID 2840 wrote to memory of 1944 2840 cmd.exe reg.exe PID 2840 wrote to memory of 1944 2840 cmd.exe reg.exe PID 2620 wrote to memory of 944 2620 5e3039f9dce50e58bd98fc0282edb410_NeikiAnalytics.exe csrsll.exe PID 2620 wrote to memory of 944 2620 5e3039f9dce50e58bd98fc0282edb410_NeikiAnalytics.exe csrsll.exe PID 2620 wrote to memory of 944 2620 5e3039f9dce50e58bd98fc0282edb410_NeikiAnalytics.exe csrsll.exe PID 2620 wrote to memory of 944 2620 5e3039f9dce50e58bd98fc0282edb410_NeikiAnalytics.exe csrsll.exe PID 944 wrote to memory of 868 944 csrsll.exe csrsll.exe PID 944 wrote to memory of 868 944 csrsll.exe csrsll.exe PID 944 wrote to memory of 868 944 csrsll.exe csrsll.exe PID 944 wrote to memory of 868 944 csrsll.exe csrsll.exe PID 944 wrote to memory of 868 944 csrsll.exe csrsll.exe PID 944 wrote to memory of 868 944 csrsll.exe csrsll.exe PID 944 wrote to memory of 868 944 csrsll.exe csrsll.exe PID 944 wrote to memory of 868 944 csrsll.exe csrsll.exe PID 944 wrote to memory of 1028 944 csrsll.exe csrsll.exe PID 944 wrote to memory of 1028 944 csrsll.exe csrsll.exe PID 944 wrote to memory of 1028 944 csrsll.exe csrsll.exe PID 944 wrote to memory of 1028 944 csrsll.exe csrsll.exe PID 944 wrote to memory of 1028 944 csrsll.exe csrsll.exe PID 944 wrote to memory of 1028 944 csrsll.exe csrsll.exe PID 944 wrote to memory of 1028 944 csrsll.exe csrsll.exe PID 944 wrote to memory of 1028 944 csrsll.exe csrsll.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\5e3039f9dce50e58bd98fc0282edb410_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\5e3039f9dce50e58bd98fc0282edb410_NeikiAnalytics.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2292 -
C:\Users\Admin\AppData\Local\Temp\5e3039f9dce50e58bd98fc0282edb410_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\5e3039f9dce50e58bd98fc0282edb410_NeikiAnalytics.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2620 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\PGFQN.bat" "3⤵
- Suspicious use of WriteProcessMemory
PID:2840 -
C:\Windows\SysWOW64\reg.exeREG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "Win Pdf" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe" /f4⤵
- Adds Run key to start application
PID:1944
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe"C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:944 -
C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe"C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe"4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:868
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe"C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe"4⤵
- Executes dropped EXE
PID:1028
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
145B
MD54eb61ec7816c34ec8c125acadc57ec1b
SHA1b0015cc865c0bb1a027be663027d3829401a31cc
SHA25608375cdb2e9819391f67f71e9718c15b48d3eaa452c54bd8fdd1f6a42e899aff
SHA512f289f01d996dd643560370be8cdf8894e9a676ca3813f706c01ef5d705b9b18246c6cadf10d96edd433a616637b8a78fbd23c5738e76f1c4e671977b6d0cb6c1
-
Filesize
90KB
MD5f981f0f8ab3fb3c6c5a6fbceeec63a65
SHA18c1d8bdc4426044f02b212aa1dcff64cd40bc610
SHA256c560df44a20c380803a11b0349be59b6aeedad478df31feebaa6e7d97b64264b
SHA5121293028e11a084abf7675eddb87a6d354dfbb1f918647a4b10b2c834fc09dd30127b19824acfd2e50edec25dbf45bdeb912002ba874c994c8c3d62b6a118d4a0