Analysis
-
max time kernel
118s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
23-05-2024 01:59
Static task
static1
Behavioral task
behavioral1
Sample
73059a9993669e0526f4afdbb3797740_NeikiAnalytics.exe
Resource
win7-20240419-en
General
-
Target
73059a9993669e0526f4afdbb3797740_NeikiAnalytics.exe
-
Size
138KB
-
MD5
73059a9993669e0526f4afdbb3797740
-
SHA1
73d155af151519d93bcd4f66ca6a383ce8a7834f
-
SHA256
94ba66a0690ba7722a1d6d8c4fb14aea2a6c9e60fda2def4ce1cc18901b1d1a9
-
SHA512
a00a58693bcfad8ec552fce61e1abe6750963776a907bce9044f5699a0f34df270df2ca7fbf556dd0a5bb574cbdb1b24e0d84403ec03f8a165e9bcbc69962d04
-
SSDEEP
1536:rC2/fYuPfbESFYXRWhpKRycRd57JkIqFHhzm4hWru/BzihhMN45MF5FvHP132xP+:r7YubEwYXRWhpAJUHhzm4hUukS6Kmeco
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
smss.exepid process 2556 smss.exe -
Loads dropped DLL 2 IoCs
Processes:
73059a9993669e0526f4afdbb3797740_NeikiAnalytics.exepid process 1008 73059a9993669e0526f4afdbb3797740_NeikiAnalytics.exe 1008 73059a9993669e0526f4afdbb3797740_NeikiAnalytics.exe -
Drops file in System32 directory 3 IoCs
Processes:
73059a9993669e0526f4afdbb3797740_NeikiAnalytics.exesmss.exedescription ioc process File opened for modification C:\Windows\SysWOW64\1230\smss.exe 73059a9993669e0526f4afdbb3797740_NeikiAnalytics.exe File opened for modification C:\Windows\SysWOW64\1230\smss.exe smss.exe File opened for modification C:\Windows\SysWOW64\Service.exe smss.exe -
Launches sc.exe 4 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exesc.exesc.exesc.exepid process 2680 sc.exe 2760 sc.exe 1856 sc.exe 2644 sc.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
73059a9993669e0526f4afdbb3797740_NeikiAnalytics.exesmss.exepid process 1008 73059a9993669e0526f4afdbb3797740_NeikiAnalytics.exe 2556 smss.exe -
Suspicious use of WriteProcessMemory 20 IoCs
Processes:
73059a9993669e0526f4afdbb3797740_NeikiAnalytics.exesmss.exedescription pid process target process PID 1008 wrote to memory of 1856 1008 73059a9993669e0526f4afdbb3797740_NeikiAnalytics.exe sc.exe PID 1008 wrote to memory of 1856 1008 73059a9993669e0526f4afdbb3797740_NeikiAnalytics.exe sc.exe PID 1008 wrote to memory of 1856 1008 73059a9993669e0526f4afdbb3797740_NeikiAnalytics.exe sc.exe PID 1008 wrote to memory of 1856 1008 73059a9993669e0526f4afdbb3797740_NeikiAnalytics.exe sc.exe PID 1008 wrote to memory of 2644 1008 73059a9993669e0526f4afdbb3797740_NeikiAnalytics.exe sc.exe PID 1008 wrote to memory of 2644 1008 73059a9993669e0526f4afdbb3797740_NeikiAnalytics.exe sc.exe PID 1008 wrote to memory of 2644 1008 73059a9993669e0526f4afdbb3797740_NeikiAnalytics.exe sc.exe PID 1008 wrote to memory of 2644 1008 73059a9993669e0526f4afdbb3797740_NeikiAnalytics.exe sc.exe PID 1008 wrote to memory of 2556 1008 73059a9993669e0526f4afdbb3797740_NeikiAnalytics.exe smss.exe PID 1008 wrote to memory of 2556 1008 73059a9993669e0526f4afdbb3797740_NeikiAnalytics.exe smss.exe PID 1008 wrote to memory of 2556 1008 73059a9993669e0526f4afdbb3797740_NeikiAnalytics.exe smss.exe PID 1008 wrote to memory of 2556 1008 73059a9993669e0526f4afdbb3797740_NeikiAnalytics.exe smss.exe PID 2556 wrote to memory of 2680 2556 smss.exe sc.exe PID 2556 wrote to memory of 2680 2556 smss.exe sc.exe PID 2556 wrote to memory of 2680 2556 smss.exe sc.exe PID 2556 wrote to memory of 2680 2556 smss.exe sc.exe PID 2556 wrote to memory of 2760 2556 smss.exe sc.exe PID 2556 wrote to memory of 2760 2556 smss.exe sc.exe PID 2556 wrote to memory of 2760 2556 smss.exe sc.exe PID 2556 wrote to memory of 2760 2556 smss.exe sc.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\73059a9993669e0526f4afdbb3797740_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\73059a9993669e0526f4afdbb3797740_NeikiAnalytics.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1008 -
C:\Windows\SysWOW64\sc.exeC:\Windows\system32\sc.exe stop SharedAccess2⤵
- Launches sc.exe
PID:1856 -
C:\Windows\SysWOW64\sc.exeC:\Windows\system32\sc.exe stop wscsvc2⤵
- Launches sc.exe
PID:2644 -
C:\Windows\SysWOW64\1230\smss.exeC:\Windows\system32\1230\smss.exe -d2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2556 -
C:\Windows\SysWOW64\sc.exeC:\Windows\system32\sc.exe stop SharedAccess3⤵
- Launches sc.exe
PID:2680 -
C:\Windows\SysWOW64\sc.exeC:\Windows\system32\sc.exe stop wscsvc3⤵
- Launches sc.exe
PID:2760
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
138KB
MD5aa3527c14d0f7a449266ccad4588257e
SHA18c18b8b513982cc52978792c6aaf34cd5ccbd8ce
SHA256b34e40983b0ba3683087fbea2c05e326cf296792b1dafcfa68a814605883b7b5
SHA512e3e76115c26eb0131f2bf25e4cfd47cafadf93e3fa094bcc7811a7c242fc6344800ee724950bf37650fa614d5abc7c078a779049d9c17998ad4ee788141d38d6