Analysis

  • max time kernel
    150s
  • max time network
    100s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-05-2024 00:09

General

  • Target

    5ee6196c1d9e6bea18a5565e339fede0_NeikiAnalytics.exe

  • Size

    274KB

  • MD5

    5ee6196c1d9e6bea18a5565e339fede0

  • SHA1

    c9042da06d12e86f085ee41e2e76483e5700bd9f

  • SHA256

    5f0814965934168490dfb468b86a16b2bc0c0c167434b2b7a08e625cc96b36d6

  • SHA512

    58927da743426a4469c7af32c522a43931a090b6862d48752e968e79bab8c1d9b824b933bccac703d8f99912b7e93a1ab59188f3ee9a9cedba4f64fdb675d164

  • SSDEEP

    6144:OvEN2U+T6i5LirrllHy4HUcMQY66bThVcHL:QENN+T5xYrllrU7QY68Thq

Score
10/10

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 2 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Modifies Installed Components in the registry 2 TTPs 8 IoCs
  • Executes dropped EXE 4 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Drops file in Windows directory 6 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 2 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5ee6196c1d9e6bea18a5565e339fede0_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\5ee6196c1d9e6bea18a5565e339fede0_NeikiAnalytics.exe"
    1⤵
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:704
    • \??\c:\windows\system\explorer.exe
      c:\windows\system\explorer.exe
      2⤵
      • Modifies WinLogon for persistence
      • Modifies visiblity of hidden/system files in Explorer
      • Modifies Installed Components in the registry
      • Executes dropped EXE
      • Adds Run key to start application
      • Drops file in Windows directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:400
      • \??\c:\windows\system\spoolsv.exe
        c:\windows\system\spoolsv.exe SE
        3⤵
        • Executes dropped EXE
        • Drops file in Windows directory
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:5000
        • \??\c:\windows\system\svchost.exe
          c:\windows\system\svchost.exe
          4⤵
          • Modifies WinLogon for persistence
          • Modifies visiblity of hidden/system files in Explorer
          • Modifies Installed Components in the registry
          • Executes dropped EXE
          • Adds Run key to start application
          • Drops file in Windows directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: GetForegroundWindowSpam
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:2768
          • \??\c:\windows\system\spoolsv.exe
            c:\windows\system\spoolsv.exe PR
            5⤵
            • Executes dropped EXE
            • Suspicious use of SetWindowsHookEx
            PID:2560
          • C:\Windows\SysWOW64\at.exe
            at 00:11 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe
            5⤵
              PID:4120
            • C:\Windows\SysWOW64\at.exe
              at 00:12 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe
              5⤵
                PID:4956
              • C:\Windows\SysWOW64\at.exe
                at 00:13 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe
                5⤵
                  PID:4440

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Roaming\mrsys.exe

          Filesize

          274KB

          MD5

          e6592a646e0c11e5cd0d691071ab73c1

          SHA1

          8ec431fd86fe01d6cd6d161054e7f6150c4142de

          SHA256

          c4d6bd323d3e206f031a08413b987a168783f2ea9f4ab4a02cc4243d6d5c43c4

          SHA512

          7f8304bb61bab6fa7c1f4b459582b1a29d44aa6e406d26de86b4feaebb9af74c9b5409b4529e27fd25240e94b4a7dbc1b007227d3617dd8977b2ba0134f9e2bc

        • C:\Windows\System\explorer.exe

          Filesize

          274KB

          MD5

          5fd2d08f4e5e3cefb6196e4155196288

          SHA1

          5322a83e9f3c2fcbe04f7af94fa05cb3f18230ef

          SHA256

          96ff89f8ca339a07131318311beae1f12ccbc3f01f1c820a06c46f8859fb76bd

          SHA512

          47f2f8a34b7d23837510e48e11453cd2281e62807576fdf7261758b5c8e35acf351853d38f57090c73ca49eb63de153b034ff8e0b84754621f6f22dc88390f42

        • C:\Windows\System\spoolsv.exe

          Filesize

          274KB

          MD5

          62454075a41416abee90a3a7736dbff3

          SHA1

          5241ca7bbb022331982356cdd2355588128d19ea

          SHA256

          81f5cf58c0b4a7c0789377d06b4a01834a9f9584f5985940f1b8455092bea6d7

          SHA512

          dc8430a64c33532a32d31d3a736bc20a25aee5a09cc2a6bb582ea8ff28e90dc9689079ca7d22829243c4df995b0a4ccf3dd862c8ca01b037729d32554b10ef89

        • C:\Windows\System\svchost.exe

          Filesize

          274KB

          MD5

          318e15aba16ace511a9244fecb5c03f8

          SHA1

          ca48d51b53e94331226b1a3a148b3f2d59de925f

          SHA256

          67e12daa08386832bb813347a0817b7e967031379804bdbb4ccb33cf909eef4a

          SHA512

          9bcf54a78866091025f0413759b57d665272a7aaa93b980d34dcb077f997142041997b0f4147d6fc23019beda56a3dbe9ae46ffe8c3b38e2d6293bbc105bcaa2

        • memory/400-9-0x0000000000400000-0x000000000044F000-memory.dmp

          Filesize

          316KB

        • memory/704-0-0x0000000000400000-0x000000000044F000-memory.dmp

          Filesize

          316KB

        • memory/704-36-0x0000000000400000-0x000000000044F000-memory.dmp

          Filesize

          316KB

        • memory/2560-35-0x0000000000400000-0x000000000044F000-memory.dmp

          Filesize

          316KB

        • memory/5000-38-0x0000000000400000-0x000000000044F000-memory.dmp

          Filesize

          316KB