Analysis
-
max time kernel
150s -
max time network
100s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
23-05-2024 00:09
Static task
static1
Behavioral task
behavioral1
Sample
5ee6196c1d9e6bea18a5565e339fede0_NeikiAnalytics.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
5ee6196c1d9e6bea18a5565e339fede0_NeikiAnalytics.exe
Resource
win10v2004-20240426-en
General
-
Target
5ee6196c1d9e6bea18a5565e339fede0_NeikiAnalytics.exe
-
Size
274KB
-
MD5
5ee6196c1d9e6bea18a5565e339fede0
-
SHA1
c9042da06d12e86f085ee41e2e76483e5700bd9f
-
SHA256
5f0814965934168490dfb468b86a16b2bc0c0c167434b2b7a08e625cc96b36d6
-
SHA512
58927da743426a4469c7af32c522a43931a090b6862d48752e968e79bab8c1d9b824b933bccac703d8f99912b7e93a1ab59188f3ee9a9cedba4f64fdb675d164
-
SSDEEP
6144:OvEN2U+T6i5LirrllHy4HUcMQY66bThVcHL:QENN+T5xYrllrU7QY68Thq
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
Processes:
explorer.exesvchost.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" svchost.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
Processes:
explorer.exesvchost.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" svchost.exe -
Modifies Installed Components in the registry 2 TTPs 8 IoCs
Processes:
svchost.exeexplorer.exedescription ioc process Key deleted \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} svchost.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" svchost.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\WOW6432NODE\MICROSOFT\ACTIVE SETUP\INSTALLED COMPONENTS\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999} svchost.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" explorer.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999} svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" svchost.exe -
Executes dropped EXE 4 IoCs
Processes:
explorer.exespoolsv.exesvchost.exespoolsv.exepid process 400 explorer.exe 5000 spoolsv.exe 2768 svchost.exe 2560 spoolsv.exe -
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
svchost.exeexplorer.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" svchost.exe -
Drops file in Windows directory 6 IoCs
Processes:
explorer.exespoolsv.exesvchost.exe5ee6196c1d9e6bea18a5565e339fede0_NeikiAnalytics.exedescription ioc process File opened for modification \??\c:\windows\system\spoolsv.exe explorer.exe File opened for modification \??\c:\windows\system\svchost.exe spoolsv.exe File opened for modification \??\c:\windows\system\explorer.exe explorer.exe File opened for modification \??\c:\windows\system\svchost.exe svchost.exe File opened for modification C:\Windows\system\udsys.exe explorer.exe File opened for modification \??\c:\windows\system\explorer.exe 5ee6196c1d9e6bea18a5565e339fede0_NeikiAnalytics.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
5ee6196c1d9e6bea18a5565e339fede0_NeikiAnalytics.exeexplorer.exesvchost.exepid process 704 5ee6196c1d9e6bea18a5565e339fede0_NeikiAnalytics.exe 704 5ee6196c1d9e6bea18a5565e339fede0_NeikiAnalytics.exe 400 explorer.exe 400 explorer.exe 400 explorer.exe 400 explorer.exe 400 explorer.exe 400 explorer.exe 2768 svchost.exe 2768 svchost.exe 2768 svchost.exe 2768 svchost.exe 400 explorer.exe 400 explorer.exe 2768 svchost.exe 2768 svchost.exe 400 explorer.exe 400 explorer.exe 2768 svchost.exe 2768 svchost.exe 400 explorer.exe 400 explorer.exe 2768 svchost.exe 2768 svchost.exe 400 explorer.exe 400 explorer.exe 2768 svchost.exe 2768 svchost.exe 400 explorer.exe 400 explorer.exe 2768 svchost.exe 2768 svchost.exe 400 explorer.exe 400 explorer.exe 2768 svchost.exe 2768 svchost.exe 400 explorer.exe 400 explorer.exe 2768 svchost.exe 2768 svchost.exe 400 explorer.exe 400 explorer.exe 2768 svchost.exe 2768 svchost.exe 400 explorer.exe 400 explorer.exe 2768 svchost.exe 2768 svchost.exe 400 explorer.exe 400 explorer.exe 2768 svchost.exe 2768 svchost.exe 400 explorer.exe 400 explorer.exe 2768 svchost.exe 2768 svchost.exe 400 explorer.exe 400 explorer.exe 2768 svchost.exe 2768 svchost.exe 400 explorer.exe 400 explorer.exe 2768 svchost.exe 2768 svchost.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
Processes:
explorer.exesvchost.exepid process 400 explorer.exe 2768 svchost.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
Processes:
5ee6196c1d9e6bea18a5565e339fede0_NeikiAnalytics.exeexplorer.exespoolsv.exesvchost.exespoolsv.exepid process 704 5ee6196c1d9e6bea18a5565e339fede0_NeikiAnalytics.exe 704 5ee6196c1d9e6bea18a5565e339fede0_NeikiAnalytics.exe 400 explorer.exe 400 explorer.exe 5000 spoolsv.exe 5000 spoolsv.exe 2768 svchost.exe 2768 svchost.exe 2560 spoolsv.exe 2560 spoolsv.exe 400 explorer.exe 400 explorer.exe -
Suspicious use of WriteProcessMemory 21 IoCs
Processes:
5ee6196c1d9e6bea18a5565e339fede0_NeikiAnalytics.exeexplorer.exespoolsv.exesvchost.exedescription pid process target process PID 704 wrote to memory of 400 704 5ee6196c1d9e6bea18a5565e339fede0_NeikiAnalytics.exe explorer.exe PID 704 wrote to memory of 400 704 5ee6196c1d9e6bea18a5565e339fede0_NeikiAnalytics.exe explorer.exe PID 704 wrote to memory of 400 704 5ee6196c1d9e6bea18a5565e339fede0_NeikiAnalytics.exe explorer.exe PID 400 wrote to memory of 5000 400 explorer.exe spoolsv.exe PID 400 wrote to memory of 5000 400 explorer.exe spoolsv.exe PID 400 wrote to memory of 5000 400 explorer.exe spoolsv.exe PID 5000 wrote to memory of 2768 5000 spoolsv.exe svchost.exe PID 5000 wrote to memory of 2768 5000 spoolsv.exe svchost.exe PID 5000 wrote to memory of 2768 5000 spoolsv.exe svchost.exe PID 2768 wrote to memory of 2560 2768 svchost.exe spoolsv.exe PID 2768 wrote to memory of 2560 2768 svchost.exe spoolsv.exe PID 2768 wrote to memory of 2560 2768 svchost.exe spoolsv.exe PID 2768 wrote to memory of 4120 2768 svchost.exe at.exe PID 2768 wrote to memory of 4120 2768 svchost.exe at.exe PID 2768 wrote to memory of 4120 2768 svchost.exe at.exe PID 2768 wrote to memory of 4956 2768 svchost.exe at.exe PID 2768 wrote to memory of 4956 2768 svchost.exe at.exe PID 2768 wrote to memory of 4956 2768 svchost.exe at.exe PID 2768 wrote to memory of 4440 2768 svchost.exe at.exe PID 2768 wrote to memory of 4440 2768 svchost.exe at.exe PID 2768 wrote to memory of 4440 2768 svchost.exe at.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\5ee6196c1d9e6bea18a5565e339fede0_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\5ee6196c1d9e6bea18a5565e339fede0_NeikiAnalytics.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:704 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe2⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Modifies Installed Components in the registry
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:400 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE3⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5000 -
\??\c:\windows\system\svchost.exec:\windows\system\svchost.exe4⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Modifies Installed Components in the registry
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2768 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe PR5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2560 -
C:\Windows\SysWOW64\at.exeat 00:11 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe5⤵PID:4120
-
C:\Windows\SysWOW64\at.exeat 00:12 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe5⤵PID:4956
-
C:\Windows\SysWOW64\at.exeat 00:13 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe5⤵PID:4440
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
274KB
MD5e6592a646e0c11e5cd0d691071ab73c1
SHA18ec431fd86fe01d6cd6d161054e7f6150c4142de
SHA256c4d6bd323d3e206f031a08413b987a168783f2ea9f4ab4a02cc4243d6d5c43c4
SHA5127f8304bb61bab6fa7c1f4b459582b1a29d44aa6e406d26de86b4feaebb9af74c9b5409b4529e27fd25240e94b4a7dbc1b007227d3617dd8977b2ba0134f9e2bc
-
Filesize
274KB
MD55fd2d08f4e5e3cefb6196e4155196288
SHA15322a83e9f3c2fcbe04f7af94fa05cb3f18230ef
SHA25696ff89f8ca339a07131318311beae1f12ccbc3f01f1c820a06c46f8859fb76bd
SHA51247f2f8a34b7d23837510e48e11453cd2281e62807576fdf7261758b5c8e35acf351853d38f57090c73ca49eb63de153b034ff8e0b84754621f6f22dc88390f42
-
Filesize
274KB
MD562454075a41416abee90a3a7736dbff3
SHA15241ca7bbb022331982356cdd2355588128d19ea
SHA25681f5cf58c0b4a7c0789377d06b4a01834a9f9584f5985940f1b8455092bea6d7
SHA512dc8430a64c33532a32d31d3a736bc20a25aee5a09cc2a6bb582ea8ff28e90dc9689079ca7d22829243c4df995b0a4ccf3dd862c8ca01b037729d32554b10ef89
-
Filesize
274KB
MD5318e15aba16ace511a9244fecb5c03f8
SHA1ca48d51b53e94331226b1a3a148b3f2d59de925f
SHA25667e12daa08386832bb813347a0817b7e967031379804bdbb4ccb33cf909eef4a
SHA5129bcf54a78866091025f0413759b57d665272a7aaa93b980d34dcb077f997142041997b0f4147d6fc23019beda56a3dbe9ae46ffe8c3b38e2d6293bbc105bcaa2