Analysis
-
max time kernel
150s -
max time network
103s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
23-05-2024 01:31
Static task
static1
Behavioral task
behavioral1
Sample
6df919060f9b953451c8ba6f17c1f080_NeikiAnalytics.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
6df919060f9b953451c8ba6f17c1f080_NeikiAnalytics.exe
Resource
win10v2004-20240426-en
General
-
Target
6df919060f9b953451c8ba6f17c1f080_NeikiAnalytics.exe
-
Size
135KB
-
MD5
6df919060f9b953451c8ba6f17c1f080
-
SHA1
e3cbed7d5b1e637975893877285e2154f2bd4027
-
SHA256
a2841305b0bf7b5c45ca94adc641730925b7a7cb629aeaa583b984bfbe41e1cf
-
SHA512
8d938c0b0ae8f3588e8a2a726c87d27b28160372a3fe167a32378bb4a7e27ff9499c2df9ee9b8871e883ea4aa9fefcc7a0eae82047e2b2acee2e3e87ce416f83
-
SSDEEP
1536:UfsEqouTRcG/Mzvgf7xEuvnXNTRdUzwTekUOisZ1yDDajtXbVvUG:UVqoCl/YgjxEufVU0TbTyDDal1UG
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
Processes:
svchost.exeexplorer.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe -
Executes dropped EXE 4 IoCs
Processes:
explorer.exespoolsv.exesvchost.exespoolsv.exepid process 2036 explorer.exe 888 spoolsv.exe 3964 svchost.exe 4964 spoolsv.exe -
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
explorer.exesvchost.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\resources\\themes\\explorer.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\resources\\svchost.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\resources\\themes\\explorer.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\resources\\svchost.exe RO" svchost.exe -
Drops file in System32 directory 2 IoCs
Processes:
explorer.exesvchost.exedescription ioc process File opened for modification C:\Windows\SysWOW64\explorer.exe explorer.exe File opened for modification C:\Windows\SysWOW64\explorer.exe svchost.exe -
Drops file in Windows directory 4 IoCs
Processes:
spoolsv.exeexplorer.exe6df919060f9b953451c8ba6f17c1f080_NeikiAnalytics.exedescription ioc process File opened for modification \??\c:\windows\resources\svchost.exe spoolsv.exe File opened for modification C:\Windows\Resources\tjud.exe explorer.exe File opened for modification \??\c:\windows\resources\themes\explorer.exe 6df919060f9b953451c8ba6f17c1f080_NeikiAnalytics.exe File opened for modification \??\c:\windows\resources\spoolsv.exe explorer.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
6df919060f9b953451c8ba6f17c1f080_NeikiAnalytics.exeexplorer.exepid process 4488 6df919060f9b953451c8ba6f17c1f080_NeikiAnalytics.exe 4488 6df919060f9b953451c8ba6f17c1f080_NeikiAnalytics.exe 4488 6df919060f9b953451c8ba6f17c1f080_NeikiAnalytics.exe 4488 6df919060f9b953451c8ba6f17c1f080_NeikiAnalytics.exe 4488 6df919060f9b953451c8ba6f17c1f080_NeikiAnalytics.exe 4488 6df919060f9b953451c8ba6f17c1f080_NeikiAnalytics.exe 4488 6df919060f9b953451c8ba6f17c1f080_NeikiAnalytics.exe 4488 6df919060f9b953451c8ba6f17c1f080_NeikiAnalytics.exe 4488 6df919060f9b953451c8ba6f17c1f080_NeikiAnalytics.exe 4488 6df919060f9b953451c8ba6f17c1f080_NeikiAnalytics.exe 4488 6df919060f9b953451c8ba6f17c1f080_NeikiAnalytics.exe 4488 6df919060f9b953451c8ba6f17c1f080_NeikiAnalytics.exe 4488 6df919060f9b953451c8ba6f17c1f080_NeikiAnalytics.exe 4488 6df919060f9b953451c8ba6f17c1f080_NeikiAnalytics.exe 4488 6df919060f9b953451c8ba6f17c1f080_NeikiAnalytics.exe 4488 6df919060f9b953451c8ba6f17c1f080_NeikiAnalytics.exe 4488 6df919060f9b953451c8ba6f17c1f080_NeikiAnalytics.exe 4488 6df919060f9b953451c8ba6f17c1f080_NeikiAnalytics.exe 4488 6df919060f9b953451c8ba6f17c1f080_NeikiAnalytics.exe 4488 6df919060f9b953451c8ba6f17c1f080_NeikiAnalytics.exe 4488 6df919060f9b953451c8ba6f17c1f080_NeikiAnalytics.exe 4488 6df919060f9b953451c8ba6f17c1f080_NeikiAnalytics.exe 4488 6df919060f9b953451c8ba6f17c1f080_NeikiAnalytics.exe 4488 6df919060f9b953451c8ba6f17c1f080_NeikiAnalytics.exe 4488 6df919060f9b953451c8ba6f17c1f080_NeikiAnalytics.exe 4488 6df919060f9b953451c8ba6f17c1f080_NeikiAnalytics.exe 4488 6df919060f9b953451c8ba6f17c1f080_NeikiAnalytics.exe 4488 6df919060f9b953451c8ba6f17c1f080_NeikiAnalytics.exe 4488 6df919060f9b953451c8ba6f17c1f080_NeikiAnalytics.exe 4488 6df919060f9b953451c8ba6f17c1f080_NeikiAnalytics.exe 4488 6df919060f9b953451c8ba6f17c1f080_NeikiAnalytics.exe 4488 6df919060f9b953451c8ba6f17c1f080_NeikiAnalytics.exe 4488 6df919060f9b953451c8ba6f17c1f080_NeikiAnalytics.exe 4488 6df919060f9b953451c8ba6f17c1f080_NeikiAnalytics.exe 2036 explorer.exe 2036 explorer.exe 2036 explorer.exe 2036 explorer.exe 2036 explorer.exe 2036 explorer.exe 2036 explorer.exe 2036 explorer.exe 2036 explorer.exe 2036 explorer.exe 2036 explorer.exe 2036 explorer.exe 2036 explorer.exe 2036 explorer.exe 2036 explorer.exe 2036 explorer.exe 2036 explorer.exe 2036 explorer.exe 2036 explorer.exe 2036 explorer.exe 2036 explorer.exe 2036 explorer.exe 2036 explorer.exe 2036 explorer.exe 2036 explorer.exe 2036 explorer.exe 2036 explorer.exe 2036 explorer.exe 2036 explorer.exe 2036 explorer.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
Processes:
explorer.exesvchost.exepid process 2036 explorer.exe 3964 svchost.exe -
Suspicious use of SetWindowsHookEx 10 IoCs
Processes:
6df919060f9b953451c8ba6f17c1f080_NeikiAnalytics.exeexplorer.exespoolsv.exesvchost.exespoolsv.exepid process 4488 6df919060f9b953451c8ba6f17c1f080_NeikiAnalytics.exe 4488 6df919060f9b953451c8ba6f17c1f080_NeikiAnalytics.exe 2036 explorer.exe 2036 explorer.exe 888 spoolsv.exe 888 spoolsv.exe 3964 svchost.exe 3964 svchost.exe 4964 spoolsv.exe 4964 spoolsv.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
6df919060f9b953451c8ba6f17c1f080_NeikiAnalytics.exeexplorer.exespoolsv.exesvchost.exedescription pid process target process PID 4488 wrote to memory of 2036 4488 6df919060f9b953451c8ba6f17c1f080_NeikiAnalytics.exe explorer.exe PID 4488 wrote to memory of 2036 4488 6df919060f9b953451c8ba6f17c1f080_NeikiAnalytics.exe explorer.exe PID 4488 wrote to memory of 2036 4488 6df919060f9b953451c8ba6f17c1f080_NeikiAnalytics.exe explorer.exe PID 2036 wrote to memory of 888 2036 explorer.exe spoolsv.exe PID 2036 wrote to memory of 888 2036 explorer.exe spoolsv.exe PID 2036 wrote to memory of 888 2036 explorer.exe spoolsv.exe PID 888 wrote to memory of 3964 888 spoolsv.exe svchost.exe PID 888 wrote to memory of 3964 888 spoolsv.exe svchost.exe PID 888 wrote to memory of 3964 888 spoolsv.exe svchost.exe PID 3964 wrote to memory of 4964 3964 svchost.exe spoolsv.exe PID 3964 wrote to memory of 4964 3964 svchost.exe spoolsv.exe PID 3964 wrote to memory of 4964 3964 svchost.exe spoolsv.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\6df919060f9b953451c8ba6f17c1f080_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\6df919060f9b953451c8ba6f17c1f080_NeikiAnalytics.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4488 -
\??\c:\windows\resources\themes\explorer.exec:\windows\resources\themes\explorer.exe2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2036 -
\??\c:\windows\resources\spoolsv.exec:\windows\resources\spoolsv.exe SE3⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:888 -
\??\c:\windows\resources\svchost.exec:\windows\resources\svchost.exe4⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3964 -
\??\c:\windows\resources\spoolsv.exec:\windows\resources\spoolsv.exe PR5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4964
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
135KB
MD5394e0cd1c811c9ad3f42cbbf1458613b
SHA1e77563e0e8ab00e03e2421f5e5792f06615da346
SHA25649acd8ec0e29ff12aa5d4e6e5f21b906221f9fa182d0b05f53727d7aca87fce9
SHA512216a1277f8682a2f22ca9a697170a6d84a2b04657afef39f9d3393f262c5f553b00e4c95851aed578d7c5e2b92f0318b090938a68322cdaa7d9c0f10276ac74c
-
Filesize
135KB
MD5900eff2a7cdb1718b2f8e3cf89218b61
SHA1582c35a40059e563b296ed939e30ba3aa8c69212
SHA256b98e966c19a6a009ae2a06d8c52fd8288d8b6a52c4f261c4dc06e1e79e5df1e9
SHA512cc6855ba84be6a0bd4a3451591f1802f68295f9db4937a2a7903100082aaabbad68b00bb68f0718885ee555517e90b8c3323d676fc2ed13d5cd62dca852d826a
-
Filesize
135KB
MD5de179d89e0c901517b87328a0d85760f
SHA13adc0e5b4eb1d7dae06a7390f9c10f29d5c5a962
SHA2564f3055964ba96f4af84c3d3967d349d83952373b1bd842732917f31385115616
SHA5128d598b89128d8aa8b3a9901361631c190d8a9bf85cb45d7053c9720e6c044accbaaf70229420e617b608024a46502d30c3d8c97ac5f555189c5ae2d905c79b0e