Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
23-05-2024 01:41
Behavioral task
behavioral1
Sample
6fb16f7e16f7b7cbbda908fb4f7eb4f0_NeikiAnalytics.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
6fb16f7e16f7b7cbbda908fb4f7eb4f0_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
6fb16f7e16f7b7cbbda908fb4f7eb4f0_NeikiAnalytics.exe
-
Size
91KB
-
MD5
6fb16f7e16f7b7cbbda908fb4f7eb4f0
-
SHA1
27c0f978201c994c7e19d7ea33d8c7ca867d0c66
-
SHA256
d21386b9e80499cc3edc46a20063059a228cc6764e370b8887a61cd21e8bc694
-
SHA512
cd7dfcd6bd0add6d01ad87560ed8dd48d8be64181203bc0cf87122933e717df977b09da73e6a1c80e0db81ae325a1e58a9aba5a5c9100dcd954679d21dcacb04
-
SSDEEP
1536:XJRtlEnBHHIgabuYotV/JbJCX5SBijJRtlEnBHHIgabuYotV/JbJCX5SBiE:XvtYxOuYotvYQIjvtYxOuYotvYQIE
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
Processes:
6fb16f7e16f7b7cbbda908fb4f7eb4f0_NeikiAnalytics.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe \"C:\\Windows\\system32\\IExplorer.exe\"" 6fb16f7e16f7b7cbbda908fb4f7eb4f0_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\IExplorer.exe" 6fb16f7e16f7b7cbbda908fb4f7eb4f0_NeikiAnalytics.exe -
Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
Processes:
6fb16f7e16f7b7cbbda908fb4f7eb4f0_NeikiAnalytics.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" 6fb16f7e16f7b7cbbda908fb4f7eb4f0_NeikiAnalytics.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
Processes:
6fb16f7e16f7b7cbbda908fb4f7eb4f0_NeikiAnalytics.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 6fb16f7e16f7b7cbbda908fb4f7eb4f0_NeikiAnalytics.exe -
Disables RegEdit via registry modification 2 IoCs
Processes:
6fb16f7e16f7b7cbbda908fb4f7eb4f0_NeikiAnalytics.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" 6fb16f7e16f7b7cbbda908fb4f7eb4f0_NeikiAnalytics.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" 6fb16f7e16f7b7cbbda908fb4f7eb4f0_NeikiAnalytics.exe -
Disables use of System Restore points 1 TTPs
-
Executes dropped EXE 7 IoCs
Processes:
xk.exeIExplorer.exeWINLOGON.EXECSRSS.EXESERVICES.EXELSASS.EXESMSS.EXEpid process 1408 xk.exe 2820 IExplorer.exe 2744 WINLOGON.EXE 1592 CSRSS.EXE 1668 SERVICES.EXE 2740 LSASS.EXE 620 SMSS.EXE -
Loads dropped DLL 12 IoCs
Processes:
6fb16f7e16f7b7cbbda908fb4f7eb4f0_NeikiAnalytics.exepid process 3028 6fb16f7e16f7b7cbbda908fb4f7eb4f0_NeikiAnalytics.exe 3028 6fb16f7e16f7b7cbbda908fb4f7eb4f0_NeikiAnalytics.exe 3028 6fb16f7e16f7b7cbbda908fb4f7eb4f0_NeikiAnalytics.exe 3028 6fb16f7e16f7b7cbbda908fb4f7eb4f0_NeikiAnalytics.exe 3028 6fb16f7e16f7b7cbbda908fb4f7eb4f0_NeikiAnalytics.exe 3028 6fb16f7e16f7b7cbbda908fb4f7eb4f0_NeikiAnalytics.exe 3028 6fb16f7e16f7b7cbbda908fb4f7eb4f0_NeikiAnalytics.exe 3028 6fb16f7e16f7b7cbbda908fb4f7eb4f0_NeikiAnalytics.exe 3028 6fb16f7e16f7b7cbbda908fb4f7eb4f0_NeikiAnalytics.exe 3028 6fb16f7e16f7b7cbbda908fb4f7eb4f0_NeikiAnalytics.exe 3028 6fb16f7e16f7b7cbbda908fb4f7eb4f0_NeikiAnalytics.exe 3028 6fb16f7e16f7b7cbbda908fb4f7eb4f0_NeikiAnalytics.exe -
Modifies system executable filetype association 2 TTPs 13 IoCs
Processes:
6fb16f7e16f7b7cbbda908fb4f7eb4f0_NeikiAnalytics.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 6fb16f7e16f7b7cbbda908fb4f7eb4f0_NeikiAnalytics.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command 6fb16f7e16f7b7cbbda908fb4f7eb4f0_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 6fb16f7e16f7b7cbbda908fb4f7eb4f0_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\ = "File Folder" 6fb16f7e16f7b7cbbda908fb4f7eb4f0_NeikiAnalytics.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command 6fb16f7e16f7b7cbbda908fb4f7eb4f0_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 6fb16f7e16f7b7cbbda908fb4f7eb4f0_NeikiAnalytics.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command 6fb16f7e16f7b7cbbda908fb4f7eb4f0_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 6fb16f7e16f7b7cbbda908fb4f7eb4f0_NeikiAnalytics.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command 6fb16f7e16f7b7cbbda908fb4f7eb4f0_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 6fb16f7e16f7b7cbbda908fb4f7eb4f0_NeikiAnalytics.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell 6fb16f7e16f7b7cbbda908fb4f7eb4f0_NeikiAnalytics.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open 6fb16f7e16f7b7cbbda908fb4f7eb4f0_NeikiAnalytics.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command 6fb16f7e16f7b7cbbda908fb4f7eb4f0_NeikiAnalytics.exe -
Processes:
resource yara_rule behavioral1/memory/3028-0-0x0000000000400000-0x000000000042F000-memory.dmp upx C:\Users\Admin\AppData\Local\winlogon.exe upx behavioral1/memory/3028-106-0x0000000002850000-0x000000000287F000-memory.dmp upx C:\Windows\xk.exe upx behavioral1/memory/1408-111-0x0000000000400000-0x000000000042F000-memory.dmp upx \Windows\SysWOW64\IExplorer.exe upx behavioral1/memory/1408-114-0x0000000000400000-0x000000000042F000-memory.dmp upx behavioral1/memory/2820-124-0x0000000000400000-0x000000000042F000-memory.dmp upx behavioral1/memory/2820-126-0x0000000000400000-0x000000000042F000-memory.dmp upx \Users\Admin\AppData\Local\WINDOWS\WINLOGON.EXE upx behavioral1/memory/3028-134-0x0000000002850000-0x000000000287F000-memory.dmp upx behavioral1/memory/2744-138-0x0000000000400000-0x000000000042F000-memory.dmp upx \Users\Admin\AppData\Local\WINDOWS\CSRSS.EXE upx \Users\Admin\AppData\Local\WINDOWS\SERVICES.EXE upx behavioral1/memory/1592-150-0x0000000000400000-0x000000000042F000-memory.dmp upx behavioral1/memory/1592-149-0x0000000000400000-0x000000000042F000-memory.dmp upx C:\Users\Admin\AppData\Local\WINDOWS\LSASS.EXE upx behavioral1/memory/2740-173-0x0000000000400000-0x000000000042F000-memory.dmp upx behavioral1/memory/3028-164-0x0000000000400000-0x000000000042F000-memory.dmp upx behavioral1/memory/1668-161-0x0000000000400000-0x000000000042F000-memory.dmp upx \Users\Admin\AppData\Local\WINDOWS\SMSS.EXE upx behavioral1/memory/620-183-0x0000000000400000-0x000000000042F000-memory.dmp upx behavioral1/memory/3028-187-0x0000000000400000-0x000000000042F000-memory.dmp upx behavioral1/memory/620-186-0x0000000000400000-0x000000000042F000-memory.dmp upx behavioral1/memory/1668-158-0x0000000000400000-0x000000000042F000-memory.dmp upx -
Adds Run key to start application 2 TTPs 5 IoCs
Processes:
6fb16f7e16f7b7cbbda908fb4f7eb4f0_NeikiAnalytics.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Run\xk = "C:\\Windows\\xk.exe" 6fb16f7e16f7b7cbbda908fb4f7eb4f0_NeikiAnalytics.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Run\MSMSGS = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\WINLOGON.EXE" 6fb16f7e16f7b7cbbda908fb4f7eb4f0_NeikiAnalytics.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Run\ServiceAdmin = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\SERVICES.EXE" 6fb16f7e16f7b7cbbda908fb4f7eb4f0_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\LogonAdmin = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\CSRSS.EXE" 6fb16f7e16f7b7cbbda908fb4f7eb4f0_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\System Monitoring = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\LSASS.EXE" 6fb16f7e16f7b7cbbda908fb4f7eb4f0_NeikiAnalytics.exe -
Drops file in System32 directory 6 IoCs
Processes:
6fb16f7e16f7b7cbbda908fb4f7eb4f0_NeikiAnalytics.exedescription ioc process File created C:\Windows\SysWOW64\Mig2.scr 6fb16f7e16f7b7cbbda908fb4f7eb4f0_NeikiAnalytics.exe File created C:\Windows\SysWOW64\IExplorer.exe 6fb16f7e16f7b7cbbda908fb4f7eb4f0_NeikiAnalytics.exe File opened for modification C:\Windows\SysWOW64\IExplorer.exe 6fb16f7e16f7b7cbbda908fb4f7eb4f0_NeikiAnalytics.exe File opened for modification C:\Windows\SysWOW64\Mig2.scr 6fb16f7e16f7b7cbbda908fb4f7eb4f0_NeikiAnalytics.exe File opened for modification C:\Windows\SysWOW64\shell.exe 6fb16f7e16f7b7cbbda908fb4f7eb4f0_NeikiAnalytics.exe File created C:\Windows\SysWOW64\shell.exe 6fb16f7e16f7b7cbbda908fb4f7eb4f0_NeikiAnalytics.exe -
Drops file in Windows directory 2 IoCs
Processes:
6fb16f7e16f7b7cbbda908fb4f7eb4f0_NeikiAnalytics.exedescription ioc process File created C:\Windows\xk.exe 6fb16f7e16f7b7cbbda908fb4f7eb4f0_NeikiAnalytics.exe File opened for modification C:\Windows\xk.exe 6fb16f7e16f7b7cbbda908fb4f7eb4f0_NeikiAnalytics.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies Control Panel 4 IoCs
Processes:
6fb16f7e16f7b7cbbda908fb4f7eb4f0_NeikiAnalytics.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Control Panel\Desktop\ 6fb16f7e16f7b7cbbda908fb4f7eb4f0_NeikiAnalytics.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Control Panel\Desktop\SCRNSAVE.EXE = "C:\\Windows\\system32\\Mig~mig.SCR" 6fb16f7e16f7b7cbbda908fb4f7eb4f0_NeikiAnalytics.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Control Panel\Desktop\ScreenSaverIsSecure = "0" 6fb16f7e16f7b7cbbda908fb4f7eb4f0_NeikiAnalytics.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Control Panel\Desktop\ScreenSaveTimeOut = "600" 6fb16f7e16f7b7cbbda908fb4f7eb4f0_NeikiAnalytics.exe -
Modifies registry class 15 IoCs
Processes:
6fb16f7e16f7b7cbbda908fb4f7eb4f0_NeikiAnalytics.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile 6fb16f7e16f7b7cbbda908fb4f7eb4f0_NeikiAnalytics.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open 6fb16f7e16f7b7cbbda908fb4f7eb4f0_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 6fb16f7e16f7b7cbbda908fb4f7eb4f0_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 6fb16f7e16f7b7cbbda908fb4f7eb4f0_NeikiAnalytics.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command 6fb16f7e16f7b7cbbda908fb4f7eb4f0_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 6fb16f7e16f7b7cbbda908fb4f7eb4f0_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\ = "File Folder" 6fb16f7e16f7b7cbbda908fb4f7eb4f0_NeikiAnalytics.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command 6fb16f7e16f7b7cbbda908fb4f7eb4f0_NeikiAnalytics.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell 6fb16f7e16f7b7cbbda908fb4f7eb4f0_NeikiAnalytics.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command 6fb16f7e16f7b7cbbda908fb4f7eb4f0_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 6fb16f7e16f7b7cbbda908fb4f7eb4f0_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 6fb16f7e16f7b7cbbda908fb4f7eb4f0_NeikiAnalytics.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile 6fb16f7e16f7b7cbbda908fb4f7eb4f0_NeikiAnalytics.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command 6fb16f7e16f7b7cbbda908fb4f7eb4f0_NeikiAnalytics.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command 6fb16f7e16f7b7cbbda908fb4f7eb4f0_NeikiAnalytics.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
6fb16f7e16f7b7cbbda908fb4f7eb4f0_NeikiAnalytics.exepid process 3028 6fb16f7e16f7b7cbbda908fb4f7eb4f0_NeikiAnalytics.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
Processes:
6fb16f7e16f7b7cbbda908fb4f7eb4f0_NeikiAnalytics.exexk.exeIExplorer.exeWINLOGON.EXECSRSS.EXESERVICES.EXELSASS.EXESMSS.EXEpid process 3028 6fb16f7e16f7b7cbbda908fb4f7eb4f0_NeikiAnalytics.exe 1408 xk.exe 2820 IExplorer.exe 2744 WINLOGON.EXE 1592 CSRSS.EXE 1668 SERVICES.EXE 2740 LSASS.EXE 620 SMSS.EXE -
Suspicious use of WriteProcessMemory 28 IoCs
Processes:
6fb16f7e16f7b7cbbda908fb4f7eb4f0_NeikiAnalytics.exedescription pid process target process PID 3028 wrote to memory of 1408 3028 6fb16f7e16f7b7cbbda908fb4f7eb4f0_NeikiAnalytics.exe xk.exe PID 3028 wrote to memory of 1408 3028 6fb16f7e16f7b7cbbda908fb4f7eb4f0_NeikiAnalytics.exe xk.exe PID 3028 wrote to memory of 1408 3028 6fb16f7e16f7b7cbbda908fb4f7eb4f0_NeikiAnalytics.exe xk.exe PID 3028 wrote to memory of 1408 3028 6fb16f7e16f7b7cbbda908fb4f7eb4f0_NeikiAnalytics.exe xk.exe PID 3028 wrote to memory of 2820 3028 6fb16f7e16f7b7cbbda908fb4f7eb4f0_NeikiAnalytics.exe IExplorer.exe PID 3028 wrote to memory of 2820 3028 6fb16f7e16f7b7cbbda908fb4f7eb4f0_NeikiAnalytics.exe IExplorer.exe PID 3028 wrote to memory of 2820 3028 6fb16f7e16f7b7cbbda908fb4f7eb4f0_NeikiAnalytics.exe IExplorer.exe PID 3028 wrote to memory of 2820 3028 6fb16f7e16f7b7cbbda908fb4f7eb4f0_NeikiAnalytics.exe IExplorer.exe PID 3028 wrote to memory of 2744 3028 6fb16f7e16f7b7cbbda908fb4f7eb4f0_NeikiAnalytics.exe WINLOGON.EXE PID 3028 wrote to memory of 2744 3028 6fb16f7e16f7b7cbbda908fb4f7eb4f0_NeikiAnalytics.exe WINLOGON.EXE PID 3028 wrote to memory of 2744 3028 6fb16f7e16f7b7cbbda908fb4f7eb4f0_NeikiAnalytics.exe WINLOGON.EXE PID 3028 wrote to memory of 2744 3028 6fb16f7e16f7b7cbbda908fb4f7eb4f0_NeikiAnalytics.exe WINLOGON.EXE PID 3028 wrote to memory of 1592 3028 6fb16f7e16f7b7cbbda908fb4f7eb4f0_NeikiAnalytics.exe CSRSS.EXE PID 3028 wrote to memory of 1592 3028 6fb16f7e16f7b7cbbda908fb4f7eb4f0_NeikiAnalytics.exe CSRSS.EXE PID 3028 wrote to memory of 1592 3028 6fb16f7e16f7b7cbbda908fb4f7eb4f0_NeikiAnalytics.exe CSRSS.EXE PID 3028 wrote to memory of 1592 3028 6fb16f7e16f7b7cbbda908fb4f7eb4f0_NeikiAnalytics.exe CSRSS.EXE PID 3028 wrote to memory of 1668 3028 6fb16f7e16f7b7cbbda908fb4f7eb4f0_NeikiAnalytics.exe SERVICES.EXE PID 3028 wrote to memory of 1668 3028 6fb16f7e16f7b7cbbda908fb4f7eb4f0_NeikiAnalytics.exe SERVICES.EXE PID 3028 wrote to memory of 1668 3028 6fb16f7e16f7b7cbbda908fb4f7eb4f0_NeikiAnalytics.exe SERVICES.EXE PID 3028 wrote to memory of 1668 3028 6fb16f7e16f7b7cbbda908fb4f7eb4f0_NeikiAnalytics.exe SERVICES.EXE PID 3028 wrote to memory of 2740 3028 6fb16f7e16f7b7cbbda908fb4f7eb4f0_NeikiAnalytics.exe LSASS.EXE PID 3028 wrote to memory of 2740 3028 6fb16f7e16f7b7cbbda908fb4f7eb4f0_NeikiAnalytics.exe LSASS.EXE PID 3028 wrote to memory of 2740 3028 6fb16f7e16f7b7cbbda908fb4f7eb4f0_NeikiAnalytics.exe LSASS.EXE PID 3028 wrote to memory of 2740 3028 6fb16f7e16f7b7cbbda908fb4f7eb4f0_NeikiAnalytics.exe LSASS.EXE PID 3028 wrote to memory of 620 3028 6fb16f7e16f7b7cbbda908fb4f7eb4f0_NeikiAnalytics.exe SMSS.EXE PID 3028 wrote to memory of 620 3028 6fb16f7e16f7b7cbbda908fb4f7eb4f0_NeikiAnalytics.exe SMSS.EXE PID 3028 wrote to memory of 620 3028 6fb16f7e16f7b7cbbda908fb4f7eb4f0_NeikiAnalytics.exe SMSS.EXE PID 3028 wrote to memory of 620 3028 6fb16f7e16f7b7cbbda908fb4f7eb4f0_NeikiAnalytics.exe SMSS.EXE -
System policy modification 1 TTPs 4 IoCs
Processes:
6fb16f7e16f7b7cbbda908fb4f7eb4f0_NeikiAnalytics.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System 6fb16f7e16f7b7cbbda908fb4f7eb4f0_NeikiAnalytics.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" 6fb16f7e16f7b7cbbda908fb4f7eb4f0_NeikiAnalytics.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer 6fb16f7e16f7b7cbbda908fb4f7eb4f0_NeikiAnalytics.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" 6fb16f7e16f7b7cbbda908fb4f7eb4f0_NeikiAnalytics.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\6fb16f7e16f7b7cbbda908fb4f7eb4f0_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\6fb16f7e16f7b7cbbda908fb4f7eb4f0_NeikiAnalytics.exe"1⤵
- Modifies WinLogon for persistence
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Disables RegEdit via registry modification
- Loads dropped DLL
- Modifies system executable filetype association
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies Control Panel
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:3028 -
C:\Windows\xk.exeC:\Windows\xk.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1408 -
C:\Windows\SysWOW64\IExplorer.exeC:\Windows\system32\IExplorer.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2820 -
C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2744 -
C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1592 -
C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1668 -
C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2740 -
C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:620
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Event Triggered Execution
1Change Default File Association
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Event Triggered Execution
1Change Default File Association
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
91KB
MD5d14b509af926b593d1f10244293cbc40
SHA16fc161e0cf465ee35b86c781bc6df55d1cc14f45
SHA256c50c9adb53e3d6bfa584c0fd4b25b5064879dcd7a16c9bb4532e9e8b52f75de4
SHA512d499364a6330ff42d1f8b0a0d88e9c1d607cf5811805b14cc8577fd4b48d4f5999c4535486ac81732026dbb1b8d4a6dd27f7b473962985db5ddfa5fbeffcdf60
-
Filesize
91KB
MD56fb16f7e16f7b7cbbda908fb4f7eb4f0
SHA127c0f978201c994c7e19d7ea33d8c7ca867d0c66
SHA256d21386b9e80499cc3edc46a20063059a228cc6764e370b8887a61cd21e8bc694
SHA512cd7dfcd6bd0add6d01ad87560ed8dd48d8be64181203bc0cf87122933e717df977b09da73e6a1c80e0db81ae325a1e58a9aba5a5c9100dcd954679d21dcacb04
-
Filesize
91KB
MD5cc8a641adc2c57967d4bc06f2e1f176e
SHA144b26de4cc7afa8106c6b1067672d00ac452848f
SHA2566be495d3d7d9b4061110bcb3d7eda0c6a48f8d49c75df73975f6a8a6c7d66b91
SHA512f2a0d9c335ccd8be61de9537427ce13e022782982632257d807aea45976c29b163333c6fd269d514cb0cd49cdc6f34676391d9d9599d6ef5285bf13df1456881
-
Filesize
91KB
MD5241fe7eafa9a26a278f0d39e2861f36b
SHA162e72f9c780cc2176f09a7a728f61187b44d954d
SHA25665659189909e8b324c850c7fa19af70f9c663a15d1ea7e051009fdd7cc6aed24
SHA512e26ad774dfcb1c8c116a268a47e78175a5014906c43f640561d2a80db859d2154c03adde8a37bbb4f969d3a6af9a85c2126c2a1d8f8eb9a3e957cc2ed854a74e
-
Filesize
91KB
MD50ed35b0f90f96c21f915b1cc391f97b2
SHA1e66f857d3d26704aaee3f024adc44f4eb5bbff96
SHA256d88766c590c63e8390a30bbfebf34da05044edd9af05c4187216289f4b8574f1
SHA512205404e1c829d21901417ca6e1f970aa39239191142eaa72e9654cb831e887be9647c004811d6c9321adca67e9d8f966bf90a636516b22aa6649940d13becc65
-
Filesize
91KB
MD507872b78219286246ad79c216aeeccbb
SHA1171a8ff7aa2f1adcf276c7adc27307a5da799b2c
SHA256a2c8b9b33abec99eca99e2086aff12fb49fa5caef892c820b51c95117b1960f0
SHA512fc291811742088d97f5a8f6e210de26f286c7952fb0bee8c42fb92ac264c5730f7d36ad8e6d052ca529be499f2fc82ea64be1c3cf135a48968990b95cd53a2b5
-
Filesize
91KB
MD5ea89619e83a025639692a8eac486d905
SHA130a1955bf2003f55d1de275678702710b8c34330
SHA25690e5c7ab50bcc0c91737b805ff49a279961e645134d0ad24761f91e5a6008b83
SHA512cf7cebaeb218fa3563fa8f68ab8f3763e0cd7c8ace7d913a4d5fa6f41ff37cef28ae3bb46506f272a6cdec1abe3f50201d7c43153e9ca58c226b210672ac981d
-
Filesize
91KB
MD50dfc2b044b4ce6c56bd12212f695831e
SHA1b4fc8592f6a6668ce8d61ed1b78e582df954d7b0
SHA2569d360bb3550859f35a883e9f49f07aa305ce86fd61bc07d51bbf1fa3fb080e37
SHA51201bca81ab99748bca2dc3b0f620d096c270b9d1d7372a698e502593064a892762add40550079edc3544d5bd3c60fee4cabf8edbef31ab5e9a01e0751c782b84e