Analysis

  • max time kernel
    150s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    23-05-2024 00:09

General

  • Target

    5ecc1c01366849de489bfe3c7a649df0_NeikiAnalytics.exe

  • Size

    89KB

  • MD5

    5ecc1c01366849de489bfe3c7a649df0

  • SHA1

    f585b60bbe78b7cad4e43f4a2a7b008011a836ab

  • SHA256

    ea6d561bd7a5a90d2392a3d524aa8d8716e98a8a1ad9564aa6d332eebfefaa27

  • SHA512

    6910cb4da4a616faaae1131d4fdf96f251a1118c27941ff4edd5a47ecf4a3fab24dd9a0538422dd46ec0cc3a4d0e67820837ace5a8acc07bdcc3c472d7fe87dd

  • SSDEEP

    1536:71sMveb4lR0daHy9v7Zc86y9U4AFRfBWAEnj:BDeb4T0daHy9DZc86yGUtnj

Score
10/10

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 4 IoCs
  • Modifies visibility of file extensions in Explorer 2 TTPs 4 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 4 IoCs
  • Executes dropped EXE 12 IoCs
  • Loads dropped DLL 16 IoCs
  • Drops desktop.ini file(s) 2 IoCs
  • Enumerates connected drives 3 TTPs 64 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 15 IoCs
  • Suspicious use of WriteProcessMemory 60 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5ecc1c01366849de489bfe3c7a649df0_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\5ecc1c01366849de489bfe3c7a649df0_NeikiAnalytics.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Modifies visibility of file extensions in Explorer
    • Modifies visiblity of hidden/system files in Explorer
    • Loads dropped DLL
    • Drops desktop.ini file(s)
    • Enumerates connected drives
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3012
    • C:\recycled\SVCHOST.EXE
      C:\recycled\SVCHOST.EXE :agent
      2⤵
      • Modifies WinLogon for persistence
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Loads dropped DLL
      • Enumerates connected drives
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2564
      • C:\recycled\SVCHOST.EXE
        C:\recycled\SVCHOST.EXE :agent
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        PID:2412
      • F:\recycled\SVCHOST.EXE
        F:\recycled\SVCHOST.EXE :agent
        3⤵
        • Modifies WinLogon for persistence
        • Modifies visibility of file extensions in Explorer
        • Modifies visiblity of hidden/system files in Explorer
        • Executes dropped EXE
        • Loads dropped DLL
        • Enumerates connected drives
        • Modifies registry class
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2568
        • C:\recycled\SVCHOST.EXE
          C:\recycled\SVCHOST.EXE :agent
          4⤵
          • Executes dropped EXE
          • Suspicious use of SetWindowsHookEx
          PID:2520
        • F:\recycled\SVCHOST.EXE
          F:\recycled\SVCHOST.EXE :agent
          4⤵
          • Executes dropped EXE
          • Suspicious use of SetWindowsHookEx
          PID:2420
        • C:\recycled\SPOOLSV.EXE
          C:\recycled\SPOOLSV.EXE :agent
          4⤵
          • Modifies WinLogon for persistence
          • Modifies visibility of file extensions in Explorer
          • Modifies visiblity of hidden/system files in Explorer
          • Executes dropped EXE
          • Loads dropped DLL
          • Enumerates connected drives
          • Modifies registry class
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:2480
          • C:\recycled\SVCHOST.EXE
            C:\recycled\SVCHOST.EXE :agent
            5⤵
            • Executes dropped EXE
            • Suspicious use of SetWindowsHookEx
            PID:1804
          • F:\recycled\SVCHOST.EXE
            F:\recycled\SVCHOST.EXE :agent
            5⤵
            • Executes dropped EXE
            • Suspicious use of SetWindowsHookEx
            PID:2164
          • C:\recycled\SPOOLSV.EXE
            C:\recycled\SPOOLSV.EXE :agent
            5⤵
            • Executes dropped EXE
            • Suspicious use of SetWindowsHookEx
            PID:592
      • C:\recycled\SPOOLSV.EXE
        C:\recycled\SPOOLSV.EXE :agent
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        PID:776
      • C:\Windows\SysWOW64\userinit.exe
        C:\Windows\system32\userinit.exe
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2508
        • C:\Windows\Explorer.EXE
          C:\Windows\Explorer.EXE
          4⤵
            PID:2500
      • F:\recycled\SVCHOST.EXE
        F:\recycled\SVCHOST.EXE :agent
        2⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        PID:1584
      • C:\recycled\SPOOLSV.EXE
        C:\recycled\SPOOLSV.EXE :agent
        2⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        PID:2840
      • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
        "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\5ecc1c01366849de489bfe3c7a649df0_NeikiAnalytics.doc"
        2⤵
        • Drops file in Windows directory
        • Modifies Internet Explorer settings
        • Modifies registry class
        • Suspicious behavior: AddClipboardFormatListener
        • Suspicious use of SetWindowsHookEx
        PID:1796

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\Flu Burung.txt

      Filesize

      1KB

      MD5

      0269b6347e473980c5378044ac67aa1f

      SHA1

      c3334de50e320ad8bce8398acff95c363d039245

      SHA256

      68f5bd85c17975419bb4eacf615286d749bcb951e487813361837580b39ffee2

      SHA512

      e5c525fe688ecd3926ae634a61dc48c4837d7e56aae00b22e4f7d824df804cb536f6df077d5f6c67f63f73832ba00249ed3a75ed40ec9db6e026041b28404d7b

    • C:\begolu.txt

      Filesize

      2B

      MD5

      2b9d4fa85c8e82132bde46b143040142

      SHA1

      a02431cf7c501a5b368c91e41283419d8fa9fb03

      SHA256

      4658d6abbbaf7748c172ed5a3e003cdb8997648f88724834e41f75e54520e142

      SHA512

      c37f27b442d578e94db6e5d879d026b0b3457f42b99ec56a9cb6fca3161540a32e207b942ef2ddb7be01fa9245ba4d8c859978a0f9a498c1ad8aa46d0890e6be

    • F:\Recycled\SVCHOST.EXE

      Filesize

      89KB

      MD5

      281b95414550ee1a95ce1c76a3f5b5dd

      SHA1

      51a304c7372a4d40edcbe8c5ce7afb3c3dee5a5e

      SHA256

      a2b674ae8996eeef6a08dab8d1b9f1ee84341109f7c8ddb665f20bf6624e06f9

      SHA512

      389d37b23ff77eb7df1a9813098724cbba22a3fe300017225020d5b82e9676cb50116eeede2b6b5bbd3122faa56083e39c22b49ba937c0cae52210600cf9c16f

    • \Recycled\SPOOLSV.EXE

      Filesize

      89KB

      MD5

      ed3fa0155cd443edda264a8ac39d06df

      SHA1

      5309ac8a766ef2d854c6b6b680524693f9e6b622

      SHA256

      ee14644b2770aa2060224fd5be2b0a9d5753b789cc52c330a0d3ff21b4c84735

      SHA512

      7a68000aa27256193d33c1ef75abad7074a4da710d585b2eee6a035671d06e134d3869ee8324144a36beac9e32548b2f04c3ce659038c5682f3b7cb1b79aa580

    • \Recycled\SVCHOST.EXE

      Filesize

      89KB

      MD5

      883338dbb8372df3fe4c3943435653bf

      SHA1

      30e0b07fcad710310e18f0e788dfa943cc85b48a

      SHA256

      a69141e841784498d2506d654020939db9220d0a4cabfd9cd41f34b91f10369a

      SHA512

      b97f86c09b8d81b7eb9993af2c51ad78fc2fa2bcb03b6b6de60497595a3a6fe36c1eb07d872aa111d987cb7299f397a022d492ea27b703d32f029aa6103542d6

    • memory/592-82-0x0000000000400000-0x000000000041A000-memory.dmp

      Filesize

      104KB

    • memory/776-89-0x0000000000400000-0x000000000041A000-memory.dmp

      Filesize

      104KB

    • memory/776-85-0x0000000000400000-0x000000000041A000-memory.dmp

      Filesize

      104KB

    • memory/1584-95-0x0000000000400000-0x000000000041A000-memory.dmp

      Filesize

      104KB

    • memory/1796-104-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/1804-67-0x0000000000400000-0x000000000041A000-memory.dmp

      Filesize

      104KB

    • memory/1804-74-0x0000000000400000-0x000000000041A000-memory.dmp

      Filesize

      104KB

    • memory/2164-77-0x0000000000400000-0x000000000041A000-memory.dmp

      Filesize

      104KB

    • memory/2164-75-0x0000000000400000-0x000000000041A000-memory.dmp

      Filesize

      104KB

    • memory/2412-35-0x0000000000400000-0x000000000041A000-memory.dmp

      Filesize

      104KB

    • memory/2420-56-0x0000000000400000-0x000000000041A000-memory.dmp

      Filesize

      104KB

    • memory/2480-66-0x0000000000380000-0x000000000039A000-memory.dmp

      Filesize

      104KB

    • memory/2520-51-0x0000000000400000-0x000000000041A000-memory.dmp

      Filesize

      104KB

    • memory/2564-41-0x00000000004A0000-0x00000000004BA000-memory.dmp

      Filesize

      104KB

    • memory/2564-37-0x00000000004A0000-0x00000000004BA000-memory.dmp

      Filesize

      104KB

    • memory/2564-135-0x0000000000400000-0x000000000041A000-memory.dmp

      Filesize

      104KB

    • memory/2564-32-0x00000000004A0000-0x00000000004BA000-memory.dmp

      Filesize

      104KB

    • memory/2564-24-0x0000000000400000-0x000000000041A000-memory.dmp

      Filesize

      104KB

    • memory/2568-57-0x0000000001D10000-0x0000000001D2A000-memory.dmp

      Filesize

      104KB

    • memory/2840-101-0x0000000000400000-0x000000000041A000-memory.dmp

      Filesize

      104KB

    • memory/3012-91-0x0000000002590000-0x00000000025AA000-memory.dmp

      Filesize

      104KB

    • memory/3012-98-0x0000000002590000-0x00000000025AA000-memory.dmp

      Filesize

      104KB

    • memory/3012-102-0x00000000041B0000-0x00000000041C0000-memory.dmp

      Filesize

      64KB

    • memory/3012-103-0x0000000000400000-0x000000000041A000-memory.dmp

      Filesize

      104KB

    • memory/3012-23-0x0000000002590000-0x00000000025AA000-memory.dmp

      Filesize

      104KB

    • memory/3012-22-0x0000000002590000-0x00000000025AA000-memory.dmp

      Filesize

      104KB

    • memory/3012-0-0x0000000000400000-0x000000000041A000-memory.dmp

      Filesize

      104KB