Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
23-05-2024 01:00
Behavioral task
behavioral1
Sample
67ef27eaa7699822a686f8e37c63a1a0_NeikiAnalytics.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
67ef27eaa7699822a686f8e37c63a1a0_NeikiAnalytics.exe
Resource
win10v2004-20240426-en
General
-
Target
67ef27eaa7699822a686f8e37c63a1a0_NeikiAnalytics.exe
-
Size
71KB
-
MD5
67ef27eaa7699822a686f8e37c63a1a0
-
SHA1
de66db9a4f3cf5b11d6dcbd81a8852404f80c81d
-
SHA256
dc04c2065da561945a3b2986f24f0bc26ec4c750fd44fc9b4c4ffe561435f2d0
-
SHA512
0c6307e74dad06684edcfb71c81c5a2db1b260919dcf6bba745ff416f92756b39b437d2a107ffd081f38799af86b728030ea3a0d49f71137f0d5fd80ae2068d3
-
SSDEEP
1536:EFrmh0HgB3LKrL9AcnQFMc9zwR6i+BXvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvx:ec0HgB3LCqZMYXBZ
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
Processes:
explorer.exesvchost.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" svchost.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
Processes:
explorer.exesvchost.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" svchost.exe -
Modifies Installed Components in the registry 2 TTPs 8 IoCs
Processes:
svchost.exeexplorer.exedescription ioc process Key deleted \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} svchost.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" svchost.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\WOW6432NODE\MICROSOFT\ACTIVE SETUP\INSTALLED COMPONENTS\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999} svchost.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" explorer.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999} svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" svchost.exe -
Executes dropped EXE 4 IoCs
Processes:
explorer.exespoolsv.exesvchost.exespoolsv.exepid process 3696 explorer.exe 4832 spoolsv.exe 4612 svchost.exe 532 spoolsv.exe -
Processes:
resource yara_rule behavioral2/memory/1176-0-0x0000000000400000-0x0000000000435000-memory.dmp upx C:\Windows\System\explorer.exe upx behavioral2/memory/3696-9-0x0000000000400000-0x0000000000435000-memory.dmp upx C:\Windows\System\spoolsv.exe upx C:\Windows\System\svchost.exe upx behavioral2/memory/532-34-0x0000000000400000-0x0000000000435000-memory.dmp upx behavioral2/memory/1176-39-0x0000000000400000-0x0000000000435000-memory.dmp upx behavioral2/memory/4832-37-0x0000000000400000-0x0000000000435000-memory.dmp upx C:\Users\Admin\AppData\Roaming\mrsys.exe upx behavioral2/memory/3696-41-0x0000000000400000-0x0000000000435000-memory.dmp upx behavioral2/memory/4612-42-0x0000000000400000-0x0000000000435000-memory.dmp upx behavioral2/memory/3696-51-0x0000000000400000-0x0000000000435000-memory.dmp upx -
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
svchost.exeexplorer.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" explorer.exe -
Drops file in Windows directory 6 IoCs
Processes:
explorer.exe67ef27eaa7699822a686f8e37c63a1a0_NeikiAnalytics.exespoolsv.exesvchost.exedescription ioc process File opened for modification C:\Windows\system\udsys.exe explorer.exe File opened for modification \??\c:\windows\system\explorer.exe 67ef27eaa7699822a686f8e37c63a1a0_NeikiAnalytics.exe File opened for modification \??\c:\windows\system\spoolsv.exe explorer.exe File opened for modification \??\c:\windows\system\svchost.exe spoolsv.exe File opened for modification \??\c:\windows\system\explorer.exe explorer.exe File opened for modification \??\c:\windows\system\svchost.exe svchost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
67ef27eaa7699822a686f8e37c63a1a0_NeikiAnalytics.exeexplorer.exesvchost.exepid process 1176 67ef27eaa7699822a686f8e37c63a1a0_NeikiAnalytics.exe 1176 67ef27eaa7699822a686f8e37c63a1a0_NeikiAnalytics.exe 3696 explorer.exe 3696 explorer.exe 3696 explorer.exe 3696 explorer.exe 3696 explorer.exe 3696 explorer.exe 3696 explorer.exe 4612 svchost.exe 3696 explorer.exe 4612 svchost.exe 4612 svchost.exe 4612 svchost.exe 3696 explorer.exe 4612 svchost.exe 3696 explorer.exe 4612 svchost.exe 3696 explorer.exe 4612 svchost.exe 3696 explorer.exe 4612 svchost.exe 4612 svchost.exe 3696 explorer.exe 4612 svchost.exe 3696 explorer.exe 3696 explorer.exe 4612 svchost.exe 3696 explorer.exe 4612 svchost.exe 4612 svchost.exe 3696 explorer.exe 4612 svchost.exe 3696 explorer.exe 4612 svchost.exe 3696 explorer.exe 4612 svchost.exe 3696 explorer.exe 3696 explorer.exe 4612 svchost.exe 3696 explorer.exe 4612 svchost.exe 4612 svchost.exe 3696 explorer.exe 4612 svchost.exe 3696 explorer.exe 3696 explorer.exe 4612 svchost.exe 3696 explorer.exe 4612 svchost.exe 4612 svchost.exe 3696 explorer.exe 4612 svchost.exe 3696 explorer.exe 3696 explorer.exe 4612 svchost.exe 3696 explorer.exe 4612 svchost.exe 4612 svchost.exe 3696 explorer.exe 3696 explorer.exe 4612 svchost.exe 4612 svchost.exe 4612 svchost.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
Processes:
explorer.exesvchost.exepid process 3696 explorer.exe 4612 svchost.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
Processes:
67ef27eaa7699822a686f8e37c63a1a0_NeikiAnalytics.exeexplorer.exespoolsv.exesvchost.exespoolsv.exepid process 1176 67ef27eaa7699822a686f8e37c63a1a0_NeikiAnalytics.exe 1176 67ef27eaa7699822a686f8e37c63a1a0_NeikiAnalytics.exe 3696 explorer.exe 3696 explorer.exe 4832 spoolsv.exe 4832 spoolsv.exe 4612 svchost.exe 4612 svchost.exe 532 spoolsv.exe 532 spoolsv.exe 3696 explorer.exe 3696 explorer.exe -
Suspicious use of WriteProcessMemory 21 IoCs
Processes:
67ef27eaa7699822a686f8e37c63a1a0_NeikiAnalytics.exeexplorer.exespoolsv.exesvchost.exedescription pid process target process PID 1176 wrote to memory of 3696 1176 67ef27eaa7699822a686f8e37c63a1a0_NeikiAnalytics.exe explorer.exe PID 1176 wrote to memory of 3696 1176 67ef27eaa7699822a686f8e37c63a1a0_NeikiAnalytics.exe explorer.exe PID 1176 wrote to memory of 3696 1176 67ef27eaa7699822a686f8e37c63a1a0_NeikiAnalytics.exe explorer.exe PID 3696 wrote to memory of 4832 3696 explorer.exe spoolsv.exe PID 3696 wrote to memory of 4832 3696 explorer.exe spoolsv.exe PID 3696 wrote to memory of 4832 3696 explorer.exe spoolsv.exe PID 4832 wrote to memory of 4612 4832 spoolsv.exe svchost.exe PID 4832 wrote to memory of 4612 4832 spoolsv.exe svchost.exe PID 4832 wrote to memory of 4612 4832 spoolsv.exe svchost.exe PID 4612 wrote to memory of 532 4612 svchost.exe spoolsv.exe PID 4612 wrote to memory of 532 4612 svchost.exe spoolsv.exe PID 4612 wrote to memory of 532 4612 svchost.exe spoolsv.exe PID 4612 wrote to memory of 4524 4612 svchost.exe at.exe PID 4612 wrote to memory of 4524 4612 svchost.exe at.exe PID 4612 wrote to memory of 4524 4612 svchost.exe at.exe PID 4612 wrote to memory of 4904 4612 svchost.exe at.exe PID 4612 wrote to memory of 4904 4612 svchost.exe at.exe PID 4612 wrote to memory of 4904 4612 svchost.exe at.exe PID 4612 wrote to memory of 1608 4612 svchost.exe at.exe PID 4612 wrote to memory of 1608 4612 svchost.exe at.exe PID 4612 wrote to memory of 1608 4612 svchost.exe at.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\67ef27eaa7699822a686f8e37c63a1a0_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\67ef27eaa7699822a686f8e37c63a1a0_NeikiAnalytics.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1176 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe2⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Modifies Installed Components in the registry
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3696 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE3⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4832 -
\??\c:\windows\system\svchost.exec:\windows\system\svchost.exe4⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Modifies Installed Components in the registry
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4612 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe PR5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:532 -
C:\Windows\SysWOW64\at.exeat 01:02 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe5⤵PID:4524
-
C:\Windows\SysWOW64\at.exeat 01:03 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe5⤵PID:4904
-
C:\Windows\SysWOW64\at.exeat 01:04 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe5⤵PID:1608
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
71KB
MD592a1ebcddf638e8583049f5cceb7b7c8
SHA1392eda08227c66af9eecdc96ae5a0b81eac3dbbd
SHA256039d8264596bd28942cb7e0e2e68d3b489597d63bb5f87b8271cca8e754bbc61
SHA512da2c6c42cb293e3d46a88796e97a7f00e71e34997384e9dc10b24b304ae27ed1871ea96254a5246ea788567d4a39e9ab5ce6f9dbae08382ece5530d6bfbd81d3
-
Filesize
71KB
MD51366dee0d9ffc190a188fd8bf1a1d41e
SHA14239a0caa45b517ef17d00602db53f7239a7de44
SHA25620c85c0da69c78f1495ab53449fe871761e452bf65feb93c92f888918c2e7e08
SHA512f5b0e563fb1b20bf7aa2f9c1333450a1bc3d00fa2941e5bb68a04db176ecb2537095ba4f747804e2f2438fe10dcf86adb39f9811c94ee86fadee01a1387d0d19
-
Filesize
71KB
MD5ab6e602075fe460a47808c91f208c1ed
SHA1a5ec0ddc9dce178b9f53b91fa8b04ecb9ae7f831
SHA25696cc0898c7c1f5ffe465f567df26d06fa83c07bc11cae3e2ffd3fb05e9766d6e
SHA5124a6e61f76880c862355c497e839851a052fb4606097c64b1351ef3700f7ed6d7cbc863be84365a250ccc74b4ec5ca34237855512c77576fdb4a60567d59d540c
-
Filesize
71KB
MD52991d64cfd60f98a960feb706c378db1
SHA1838027e70e2bb018d1ac66a149bca90a290b80bf
SHA25609cb68b725cd934bddf9bdf4ad620c70c58d3da850f44e87433b5f7847cd5e53
SHA5129c04f03d54d2fd38c08ef9242aecbbeb1f63a7734a70edee34b6880cd40bb19c22cd29f02cd7457ada2e54f4b036072bc473e7d80086ef60b71f890c06bdf30e