Analysis

  • max time kernel
    119s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240215-en
  • resource tags

    arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system
  • submitted
    23-05-2024 01:02

General

  • Target

    6859dc21d5a1080edcd6827a70e22c20_NeikiAnalytics.exe

  • Size

    45KB

  • MD5

    6859dc21d5a1080edcd6827a70e22c20

  • SHA1

    916f841f25485242d9a60f9f030dbd9ee7d61668

  • SHA256

    9341cc1bd3785bbab93d9bccd5b64e3dee929db7dc7538df5cbbedd174b0d669

  • SHA512

    4ca2f4b8c484a379ee75c12d61a6cda8e2cf7b436dcc073c9cc0cefaa476e5b8c3820fec80166b4046f6c53c6276556b00898c8cb2b60d0dca6d093e1639c688

  • SSDEEP

    768:xmFQj8rM9whcqet8Wfxd9Mmnfa+TAOBJgZiPGyilSniJO14ktp7DFK+5nEk:zAwEmBZ04faWmtN4nic+6Gk

Score
10/10

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 2 IoCs
  • Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Disables RegEdit via registry modification 2 IoCs
  • Disables use of System Restore points 1 TTPs
  • Executes dropped EXE 7 IoCs
  • Loads dropped DLL 12 IoCs
  • Modifies system executable filetype association 2 TTPs 13 IoCs
  • Adds Run key to start application 2 TTPs 5 IoCs
  • Drops file in System32 directory 6 IoCs
  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Control Panel 4 IoCs
  • Modifies registry class 15 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs
  • System policy modification 1 TTPs 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6859dc21d5a1080edcd6827a70e22c20_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\6859dc21d5a1080edcd6827a70e22c20_NeikiAnalytics.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Modifies visibility of file extensions in Explorer
    • Modifies visiblity of hidden/system files in Explorer
    • Disables RegEdit via registry modification
    • Loads dropped DLL
    • Modifies system executable filetype association
    • Adds Run key to start application
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies Control Panel
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    • System policy modification
    PID:1656
    • C:\Windows\xk.exe
      C:\Windows\xk.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:2316
    • C:\Windows\SysWOW64\IExplorer.exe
      C:\Windows\system32\IExplorer.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:2412
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:1712
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:1576
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:1584
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:2276
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:2016

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\WINDOWS\WINLOGON.EXE

    Filesize

    45KB

    MD5

    cc41be693ec5990e244a3bd88aa1fcd0

    SHA1

    ba2983607ca094b8c820c71e09b5f15a9e29743c

    SHA256

    ec59a1b43f25998dfbdbed9f8ea59553c3500529733bc9a9aefa30ff35a0381f

    SHA512

    2c42ac98323bda06b51e75ecd301f1dda27744254674545af66562aa6117de935dab2ec6c3c841e76de8e6373bf1d19b66821d46080e5251179375f12c2355ca

  • C:\Users\Admin\AppData\Local\winlogon.exe

    Filesize

    45KB

    MD5

    6859dc21d5a1080edcd6827a70e22c20

    SHA1

    916f841f25485242d9a60f9f030dbd9ee7d61668

    SHA256

    9341cc1bd3785bbab93d9bccd5b64e3dee929db7dc7538df5cbbedd174b0d669

    SHA512

    4ca2f4b8c484a379ee75c12d61a6cda8e2cf7b436dcc073c9cc0cefaa476e5b8c3820fec80166b4046f6c53c6276556b00898c8cb2b60d0dca6d093e1639c688

  • C:\Windows\xk.exe

    Filesize

    45KB

    MD5

    980b61d7342e8e3f21d5d6742b762f0a

    SHA1

    9118766f2e7e7ba819c6af2103e8f724dd0b2b21

    SHA256

    bba7014718eabd4393b49b1006bf30e9f53ce4df4fbb2e6ff20700dd79b1d8c0

    SHA512

    5da19f1b3209687a395e64327d92b92b70a285fd77426974aecdac52c09a36627ce216693d846d2ada04a075ca34a43c5197061ce1ebca3eb725ca71b5597eeb

  • \Users\Admin\AppData\Local\WINDOWS\CSRSS.EXE

    Filesize

    45KB

    MD5

    5de41c72596dce50b64fe089ec537ab1

    SHA1

    d147b48ebff7b166ad7d579b6a51ff396ea2b830

    SHA256

    d8841b9240c303c77e2aa58711e09b4d3fc295b2d4de382d72a53e1ef5515c88

    SHA512

    86c2678af850beecb300d1026c8b06aa0a537b5d763c41a570ae455ed2c8e68b1190bebcfd20c59507582c14309dcf21bb7056b733b140c373ddb72281fed97f

  • \Users\Admin\AppData\Local\WINDOWS\LSASS.EXE

    Filesize

    45KB

    MD5

    d947a8d87081e59febf0efeff9a58953

    SHA1

    84dfaa90239a02708be5069da105e27f4228ea24

    SHA256

    93e30ed7a52a5ab86eb8f223048b444661e082cdc2fb7b34987afc8c2cf50e39

    SHA512

    3d21f8f0c2561f114ec3e1230ecd1a036d32f61acbae50ea6602854b68f1ca382ba4d2eb4b829f1ceb5db97240e2b07fe171359870a702480bcbaca94263de60

  • \Users\Admin\AppData\Local\WINDOWS\SERVICES.EXE

    Filesize

    45KB

    MD5

    6533e58c7d2e02413cc06b55bb3c1531

    SHA1

    c10d0f1d9edc3c7ca247d677de58501c42d9167e

    SHA256

    eb960d6694bf6d40d006ae207ab1f9e689738b07c107af0a133a1eaf2631b950

    SHA512

    afea407cbe75775f9c918ae976d3f3873d46a174ca1760fbe80755fd51b4a287ac7bfa6a460bd07a46e0b82d108d1da81ecd666b29949c3bc7d65b2a77a428bd

  • \Users\Admin\AppData\Local\WINDOWS\SMSS.EXE

    Filesize

    45KB

    MD5

    1f612cd14409936bb4c1085b96a8875a

    SHA1

    c7ef71966aecddaf9aca995ba4c5a568481afe52

    SHA256

    66c64e1210293570db87d4880fcc1787c8dba380623632286bf9a707ed69042a

    SHA512

    8403b09c6aa2c14b3c82899c3c7f20c4247d27bab9ce2af1046fed62bc272536d2862d8eb8b693081da66e787053a1a8c7a1578769c9f8686c943d74665c9f5e

  • \Windows\SysWOW64\IExplorer.exe

    Filesize

    45KB

    MD5

    4b984093797606ac22811cfd6e146d68

    SHA1

    a8130a97310270426d2556683663dca514f66dca

    SHA256

    3a560689cc8cf6208772dc0baa4f9bc7d3618aef3d901cda2b694fe9bd43db9d

    SHA512

    75f10c43b0e32aa7888617414a67b19ae8c36c20d041b2c625fef929eecd662467ffa94f830569aeb85451c5b3e9b904cc89abed432e192efa151bc85d22680e

  • memory/1576-151-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/1576-155-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/1584-166-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/1584-163-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/1656-118-0x00000000025D0000-0x00000000025FE000-memory.dmp

    Filesize

    184KB

  • memory/1656-149-0x00000000025D0000-0x00000000025FE000-memory.dmp

    Filesize

    184KB

  • memory/1656-136-0x00000000025D0000-0x00000000025FE000-memory.dmp

    Filesize

    184KB

  • memory/1656-137-0x00000000025D0000-0x00000000025FE000-memory.dmp

    Filesize

    184KB

  • memory/1656-110-0x00000000025D0000-0x00000000025FE000-memory.dmp

    Filesize

    184KB

  • memory/1656-126-0x00000000025D0000-0x00000000025FE000-memory.dmp

    Filesize

    184KB

  • memory/1656-150-0x00000000025D0000-0x00000000025FE000-memory.dmp

    Filesize

    184KB

  • memory/1656-0-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/1656-193-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/1656-187-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/1656-175-0x00000000025D0000-0x00000000025FE000-memory.dmp

    Filesize

    184KB

  • memory/1656-111-0x00000000025D0000-0x00000000025FE000-memory.dmp

    Filesize

    184KB

  • memory/1712-141-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/2016-192-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/2276-179-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/2276-177-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/2316-115-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/2316-112-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/2412-128-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/2412-127-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB