Analysis

  • max time kernel
    117s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240215-en
  • resource tags

    arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system
  • submitted
    23-05-2024 01:41

General

  • Target

    6fb16f7e16f7b7cbbda908fb4f7eb4f0_NeikiAnalytics.exe

  • Size

    91KB

  • MD5

    6fb16f7e16f7b7cbbda908fb4f7eb4f0

  • SHA1

    27c0f978201c994c7e19d7ea33d8c7ca867d0c66

  • SHA256

    d21386b9e80499cc3edc46a20063059a228cc6764e370b8887a61cd21e8bc694

  • SHA512

    cd7dfcd6bd0add6d01ad87560ed8dd48d8be64181203bc0cf87122933e717df977b09da73e6a1c80e0db81ae325a1e58a9aba5a5c9100dcd954679d21dcacb04

  • SSDEEP

    1536:XJRtlEnBHHIgabuYotV/JbJCX5SBijJRtlEnBHHIgabuYotV/JbJCX5SBiE:XvtYxOuYotvYQIjvtYxOuYotvYQIE

Score
10/10

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 2 IoCs
  • Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Disables RegEdit via registry modification 2 IoCs
  • Disables use of System Restore points 1 TTPs
  • Executes dropped EXE 7 IoCs
  • Loads dropped DLL 12 IoCs
  • Modifies system executable filetype association 2 TTPs 13 IoCs
  • UPX packed file 25 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 5 IoCs
  • Drops file in System32 directory 6 IoCs
  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Control Panel 4 IoCs
  • Modifies registry class 15 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs
  • System policy modification 1 TTPs 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6fb16f7e16f7b7cbbda908fb4f7eb4f0_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\6fb16f7e16f7b7cbbda908fb4f7eb4f0_NeikiAnalytics.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Modifies visibility of file extensions in Explorer
    • Modifies visiblity of hidden/system files in Explorer
    • Disables RegEdit via registry modification
    • Loads dropped DLL
    • Modifies system executable filetype association
    • Adds Run key to start application
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies Control Panel
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    • System policy modification
    PID:3028
    • C:\Windows\xk.exe
      C:\Windows\xk.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:1408
    • C:\Windows\SysWOW64\IExplorer.exe
      C:\Windows\system32\IExplorer.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:2820
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:2744
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:1592
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:1668
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:2740
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:620

Network

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

2
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Winlogon Helper DLL

1
T1547.004

Event Triggered Execution

1
T1546

Change Default File Association

1
T1546.001

Privilege Escalation

Boot or Logon Autostart Execution

2
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Winlogon Helper DLL

1
T1547.004

Event Triggered Execution

1
T1546

Change Default File Association

1
T1546.001

Defense Evasion

Modify Registry

6
T1112

Hide Artifacts

2
T1564

Hidden Files and Directories

2
T1564.001

Discovery

System Information Discovery

1
T1082

Impact

Inhibit System Recovery

1
T1490

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\WINDOWS\LSASS.EXE
    Filesize

    91KB

    MD5

    d14b509af926b593d1f10244293cbc40

    SHA1

    6fc161e0cf465ee35b86c781bc6df55d1cc14f45

    SHA256

    c50c9adb53e3d6bfa584c0fd4b25b5064879dcd7a16c9bb4532e9e8b52f75de4

    SHA512

    d499364a6330ff42d1f8b0a0d88e9c1d607cf5811805b14cc8577fd4b48d4f5999c4535486ac81732026dbb1b8d4a6dd27f7b473962985db5ddfa5fbeffcdf60

  • C:\Users\Admin\AppData\Local\winlogon.exe
    Filesize

    91KB

    MD5

    6fb16f7e16f7b7cbbda908fb4f7eb4f0

    SHA1

    27c0f978201c994c7e19d7ea33d8c7ca867d0c66

    SHA256

    d21386b9e80499cc3edc46a20063059a228cc6764e370b8887a61cd21e8bc694

    SHA512

    cd7dfcd6bd0add6d01ad87560ed8dd48d8be64181203bc0cf87122933e717df977b09da73e6a1c80e0db81ae325a1e58a9aba5a5c9100dcd954679d21dcacb04

  • C:\Windows\xk.exe
    Filesize

    91KB

    MD5

    cc8a641adc2c57967d4bc06f2e1f176e

    SHA1

    44b26de4cc7afa8106c6b1067672d00ac452848f

    SHA256

    6be495d3d7d9b4061110bcb3d7eda0c6a48f8d49c75df73975f6a8a6c7d66b91

    SHA512

    f2a0d9c335ccd8be61de9537427ce13e022782982632257d807aea45976c29b163333c6fd269d514cb0cd49cdc6f34676391d9d9599d6ef5285bf13df1456881

  • \Users\Admin\AppData\Local\WINDOWS\CSRSS.EXE
    Filesize

    91KB

    MD5

    241fe7eafa9a26a278f0d39e2861f36b

    SHA1

    62e72f9c780cc2176f09a7a728f61187b44d954d

    SHA256

    65659189909e8b324c850c7fa19af70f9c663a15d1ea7e051009fdd7cc6aed24

    SHA512

    e26ad774dfcb1c8c116a268a47e78175a5014906c43f640561d2a80db859d2154c03adde8a37bbb4f969d3a6af9a85c2126c2a1d8f8eb9a3e957cc2ed854a74e

  • \Users\Admin\AppData\Local\WINDOWS\SERVICES.EXE
    Filesize

    91KB

    MD5

    0ed35b0f90f96c21f915b1cc391f97b2

    SHA1

    e66f857d3d26704aaee3f024adc44f4eb5bbff96

    SHA256

    d88766c590c63e8390a30bbfebf34da05044edd9af05c4187216289f4b8574f1

    SHA512

    205404e1c829d21901417ca6e1f970aa39239191142eaa72e9654cb831e887be9647c004811d6c9321adca67e9d8f966bf90a636516b22aa6649940d13becc65

  • \Users\Admin\AppData\Local\WINDOWS\SMSS.EXE
    Filesize

    91KB

    MD5

    07872b78219286246ad79c216aeeccbb

    SHA1

    171a8ff7aa2f1adcf276c7adc27307a5da799b2c

    SHA256

    a2c8b9b33abec99eca99e2086aff12fb49fa5caef892c820b51c95117b1960f0

    SHA512

    fc291811742088d97f5a8f6e210de26f286c7952fb0bee8c42fb92ac264c5730f7d36ad8e6d052ca529be499f2fc82ea64be1c3cf135a48968990b95cd53a2b5

  • \Users\Admin\AppData\Local\WINDOWS\WINLOGON.EXE
    Filesize

    91KB

    MD5

    ea89619e83a025639692a8eac486d905

    SHA1

    30a1955bf2003f55d1de275678702710b8c34330

    SHA256

    90e5c7ab50bcc0c91737b805ff49a279961e645134d0ad24761f91e5a6008b83

    SHA512

    cf7cebaeb218fa3563fa8f68ab8f3763e0cd7c8ace7d913a4d5fa6f41ff37cef28ae3bb46506f272a6cdec1abe3f50201d7c43153e9ca58c226b210672ac981d

  • \Windows\SysWOW64\IExplorer.exe
    Filesize

    91KB

    MD5

    0dfc2b044b4ce6c56bd12212f695831e

    SHA1

    b4fc8592f6a6668ce8d61ed1b78e582df954d7b0

    SHA256

    9d360bb3550859f35a883e9f49f07aa305ce86fd61bc07d51bbf1fa3fb080e37

    SHA512

    01bca81ab99748bca2dc3b0f620d096c270b9d1d7372a698e502593064a892762add40550079edc3544d5bd3c60fee4cabf8edbef31ab5e9a01e0751c782b84e

  • memory/620-186-0x0000000000400000-0x000000000042F000-memory.dmp
    Filesize

    188KB

  • memory/620-183-0x0000000000400000-0x000000000042F000-memory.dmp
    Filesize

    188KB

  • memory/1408-114-0x0000000000400000-0x000000000042F000-memory.dmp
    Filesize

    188KB

  • memory/1408-111-0x0000000000400000-0x000000000042F000-memory.dmp
    Filesize

    188KB

  • memory/1592-150-0x0000000000400000-0x000000000042F000-memory.dmp
    Filesize

    188KB

  • memory/1592-149-0x0000000000400000-0x000000000042F000-memory.dmp
    Filesize

    188KB

  • memory/1668-158-0x0000000000400000-0x000000000042F000-memory.dmp
    Filesize

    188KB

  • memory/1668-161-0x0000000000400000-0x000000000042F000-memory.dmp
    Filesize

    188KB

  • memory/2740-173-0x0000000000400000-0x000000000042F000-memory.dmp
    Filesize

    188KB

  • memory/2744-138-0x0000000000400000-0x000000000042F000-memory.dmp
    Filesize

    188KB

  • memory/2820-126-0x0000000000400000-0x000000000042F000-memory.dmp
    Filesize

    188KB

  • memory/2820-124-0x0000000000400000-0x000000000042F000-memory.dmp
    Filesize

    188KB

  • memory/3028-134-0x0000000002850000-0x000000000287F000-memory.dmp
    Filesize

    188KB

  • memory/3028-164-0x0000000000400000-0x000000000042F000-memory.dmp
    Filesize

    188KB

  • memory/3028-148-0x0000000002850000-0x000000000287F000-memory.dmp
    Filesize

    188KB

  • memory/3028-0-0x0000000000400000-0x000000000042F000-memory.dmp
    Filesize

    188KB

  • memory/3028-135-0x0000000002850000-0x000000000287F000-memory.dmp
    Filesize

    188KB

  • memory/3028-187-0x0000000000400000-0x000000000042F000-memory.dmp
    Filesize

    188KB

  • memory/3028-106-0x0000000002850000-0x000000000287F000-memory.dmp
    Filesize

    188KB