Analysis
-
max time kernel
150s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
23-05-2024 07:08
Static task
static1
Behavioral task
behavioral1
Sample
53380073aa98e7bbbc09ef97cad9f6c0_NeikiAnalytics.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
53380073aa98e7bbbc09ef97cad9f6c0_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
53380073aa98e7bbbc09ef97cad9f6c0_NeikiAnalytics.exe
-
Size
3.6MB
-
MD5
53380073aa98e7bbbc09ef97cad9f6c0
-
SHA1
a7471cd91ba5f0a35c583c3a37d9537ab4b93d00
-
SHA256
1972669fc9b3fb869e568876786b6ca53727ca66a8e847945025927c1ec8a21e
-
SHA512
d22f4ebf79153c9ed0a55b9f58d7ae929abe6bdf6b5b933b734151e79db2c0aa7966e6de1f7ba06a3c25f3315f311c10519c35b8c8a196a3d93cb5dbd7c6e093
-
SSDEEP
49152:dsgY1bXNn4iM1mo7JFAU9YfLxd4cY1DJmXTHX1bLu1LriJzf64iVDJEh:+gwrNn4Yo7Lefb4cY1DY5bL4Lrc7NaJS
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
Processes:
explorer.exesvchost.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" svchost.exe -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 5 IoCs
Processes:
53380073aa98e7bbbc09ef97cad9f6c0_NeikiAnalytics.exeexplorer.exespoolsv.exesvchost.exespoolsv.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 53380073aa98e7bbbc09ef97cad9f6c0_NeikiAnalytics.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explorer.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ spoolsv.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ svchost.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ spoolsv.exe -
Checks BIOS information in registry 2 TTPs 15 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
explorer.exesvchost.exe53380073aa98e7bbbc09ef97cad9f6c0_NeikiAnalytics.exespoolsv.exespoolsv.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explorer.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 53380073aa98e7bbbc09ef97cad9f6c0_NeikiAnalytics.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion spoolsv.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion spoolsv.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate spoolsv.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 53380073aa98e7bbbc09ef97cad9f6c0_NeikiAnalytics.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate 53380073aa98e7bbbc09ef97cad9f6c0_NeikiAnalytics.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion spoolsv.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate spoolsv.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explorer.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate explorer.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion spoolsv.exe -
Executes dropped EXE 4 IoCs
Processes:
explorer.exespoolsv.exesvchost.exespoolsv.exepid process 1400 explorer.exe 2216 spoolsv.exe 3028 svchost.exe 2108 spoolsv.exe -
Loads dropped DLL 4 IoCs
Processes:
53380073aa98e7bbbc09ef97cad9f6c0_NeikiAnalytics.exeexplorer.exespoolsv.exesvchost.exepid process 2244 53380073aa98e7bbbc09ef97cad9f6c0_NeikiAnalytics.exe 1400 explorer.exe 2216 spoolsv.exe 3028 svchost.exe -
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
svchost.exeexplorer.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\resources\\themes\\explorer.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\resources\\svchost.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\resources\\themes\\explorer.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\resources\\svchost.exe RO" explorer.exe -
Processes:
53380073aa98e7bbbc09ef97cad9f6c0_NeikiAnalytics.exeexplorer.exespoolsv.exesvchost.exespoolsv.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 53380073aa98e7bbbc09ef97cad9f6c0_NeikiAnalytics.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA explorer.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA spoolsv.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA svchost.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA spoolsv.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 5 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
Processes:
spoolsv.exesvchost.exespoolsv.exe53380073aa98e7bbbc09ef97cad9f6c0_NeikiAnalytics.exeexplorer.exedescription ioc process File opened for modification \??\PhysicalDrive0 spoolsv.exe File opened for modification \??\PhysicalDrive0 svchost.exe File opened for modification \??\PhysicalDrive0 spoolsv.exe File opened for modification \??\PhysicalDrive0 53380073aa98e7bbbc09ef97cad9f6c0_NeikiAnalytics.exe File opened for modification \??\PhysicalDrive0 explorer.exe -
Drops file in System32 directory 2 IoCs
Processes:
svchost.exeexplorer.exedescription ioc process File opened for modification C:\Windows\SysWOW64\explorer.exe svchost.exe File opened for modification C:\Windows\SysWOW64\explorer.exe explorer.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 5 IoCs
Processes:
53380073aa98e7bbbc09ef97cad9f6c0_NeikiAnalytics.exeexplorer.exespoolsv.exesvchost.exespoolsv.exepid process 2244 53380073aa98e7bbbc09ef97cad9f6c0_NeikiAnalytics.exe 1400 explorer.exe 2216 spoolsv.exe 3028 svchost.exe 2108 spoolsv.exe -
Drops file in Windows directory 4 IoCs
Processes:
explorer.exespoolsv.exe53380073aa98e7bbbc09ef97cad9f6c0_NeikiAnalytics.exedescription ioc process File opened for modification \??\c:\windows\resources\spoolsv.exe explorer.exe File opened for modification \??\c:\windows\resources\svchost.exe spoolsv.exe File opened for modification C:\Windows\Resources\tjud.exe explorer.exe File opened for modification \??\c:\windows\resources\themes\explorer.exe 53380073aa98e7bbbc09ef97cad9f6c0_NeikiAnalytics.exe -
Creates scheduled task(s) 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exeschtasks.exepid process 2672 schtasks.exe 1716 schtasks.exe 920 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
53380073aa98e7bbbc09ef97cad9f6c0_NeikiAnalytics.exeexplorer.exespoolsv.exesvchost.exespoolsv.exepid process 2244 53380073aa98e7bbbc09ef97cad9f6c0_NeikiAnalytics.exe 2244 53380073aa98e7bbbc09ef97cad9f6c0_NeikiAnalytics.exe 2244 53380073aa98e7bbbc09ef97cad9f6c0_NeikiAnalytics.exe 2244 53380073aa98e7bbbc09ef97cad9f6c0_NeikiAnalytics.exe 2244 53380073aa98e7bbbc09ef97cad9f6c0_NeikiAnalytics.exe 2244 53380073aa98e7bbbc09ef97cad9f6c0_NeikiAnalytics.exe 2244 53380073aa98e7bbbc09ef97cad9f6c0_NeikiAnalytics.exe 2244 53380073aa98e7bbbc09ef97cad9f6c0_NeikiAnalytics.exe 2244 53380073aa98e7bbbc09ef97cad9f6c0_NeikiAnalytics.exe 2244 53380073aa98e7bbbc09ef97cad9f6c0_NeikiAnalytics.exe 2244 53380073aa98e7bbbc09ef97cad9f6c0_NeikiAnalytics.exe 2244 53380073aa98e7bbbc09ef97cad9f6c0_NeikiAnalytics.exe 2244 53380073aa98e7bbbc09ef97cad9f6c0_NeikiAnalytics.exe 2244 53380073aa98e7bbbc09ef97cad9f6c0_NeikiAnalytics.exe 2244 53380073aa98e7bbbc09ef97cad9f6c0_NeikiAnalytics.exe 2244 53380073aa98e7bbbc09ef97cad9f6c0_NeikiAnalytics.exe 2244 53380073aa98e7bbbc09ef97cad9f6c0_NeikiAnalytics.exe 2244 53380073aa98e7bbbc09ef97cad9f6c0_NeikiAnalytics.exe 1400 explorer.exe 1400 explorer.exe 1400 explorer.exe 1400 explorer.exe 1400 explorer.exe 1400 explorer.exe 1400 explorer.exe 1400 explorer.exe 1400 explorer.exe 1400 explorer.exe 1400 explorer.exe 1400 explorer.exe 1400 explorer.exe 1400 explorer.exe 1400 explorer.exe 1400 explorer.exe 1400 explorer.exe 2216 spoolsv.exe 3028 svchost.exe 3028 svchost.exe 3028 svchost.exe 3028 svchost.exe 3028 svchost.exe 3028 svchost.exe 3028 svchost.exe 3028 svchost.exe 3028 svchost.exe 3028 svchost.exe 3028 svchost.exe 3028 svchost.exe 3028 svchost.exe 3028 svchost.exe 3028 svchost.exe 3028 svchost.exe 3028 svchost.exe 2108 spoolsv.exe 1400 explorer.exe 3028 svchost.exe 3028 svchost.exe 3028 svchost.exe 1400 explorer.exe 1400 explorer.exe 3028 svchost.exe 1400 explorer.exe 1400 explorer.exe 3028 svchost.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
Processes:
svchost.exeexplorer.exepid process 3028 svchost.exe 1400 explorer.exe -
Suspicious use of SetWindowsHookEx 10 IoCs
Processes:
53380073aa98e7bbbc09ef97cad9f6c0_NeikiAnalytics.exeexplorer.exespoolsv.exesvchost.exespoolsv.exepid process 2244 53380073aa98e7bbbc09ef97cad9f6c0_NeikiAnalytics.exe 2244 53380073aa98e7bbbc09ef97cad9f6c0_NeikiAnalytics.exe 1400 explorer.exe 1400 explorer.exe 2216 spoolsv.exe 2216 spoolsv.exe 3028 svchost.exe 3028 svchost.exe 2108 spoolsv.exe 2108 spoolsv.exe -
Suspicious use of WriteProcessMemory 32 IoCs
Processes:
53380073aa98e7bbbc09ef97cad9f6c0_NeikiAnalytics.exeexplorer.exespoolsv.exesvchost.exedescription pid process target process PID 2244 wrote to memory of 1400 2244 53380073aa98e7bbbc09ef97cad9f6c0_NeikiAnalytics.exe explorer.exe PID 2244 wrote to memory of 1400 2244 53380073aa98e7bbbc09ef97cad9f6c0_NeikiAnalytics.exe explorer.exe PID 2244 wrote to memory of 1400 2244 53380073aa98e7bbbc09ef97cad9f6c0_NeikiAnalytics.exe explorer.exe PID 2244 wrote to memory of 1400 2244 53380073aa98e7bbbc09ef97cad9f6c0_NeikiAnalytics.exe explorer.exe PID 1400 wrote to memory of 2216 1400 explorer.exe spoolsv.exe PID 1400 wrote to memory of 2216 1400 explorer.exe spoolsv.exe PID 1400 wrote to memory of 2216 1400 explorer.exe spoolsv.exe PID 1400 wrote to memory of 2216 1400 explorer.exe spoolsv.exe PID 2216 wrote to memory of 3028 2216 spoolsv.exe svchost.exe PID 2216 wrote to memory of 3028 2216 spoolsv.exe svchost.exe PID 2216 wrote to memory of 3028 2216 spoolsv.exe svchost.exe PID 2216 wrote to memory of 3028 2216 spoolsv.exe svchost.exe PID 3028 wrote to memory of 2108 3028 svchost.exe spoolsv.exe PID 3028 wrote to memory of 2108 3028 svchost.exe spoolsv.exe PID 3028 wrote to memory of 2108 3028 svchost.exe spoolsv.exe PID 3028 wrote to memory of 2108 3028 svchost.exe spoolsv.exe PID 3028 wrote to memory of 2672 3028 svchost.exe schtasks.exe PID 3028 wrote to memory of 2672 3028 svchost.exe schtasks.exe PID 3028 wrote to memory of 2672 3028 svchost.exe schtasks.exe PID 3028 wrote to memory of 2672 3028 svchost.exe schtasks.exe PID 1400 wrote to memory of 3048 1400 explorer.exe Explorer.exe PID 1400 wrote to memory of 3048 1400 explorer.exe Explorer.exe PID 1400 wrote to memory of 3048 1400 explorer.exe Explorer.exe PID 1400 wrote to memory of 3048 1400 explorer.exe Explorer.exe PID 3028 wrote to memory of 1716 3028 svchost.exe schtasks.exe PID 3028 wrote to memory of 1716 3028 svchost.exe schtasks.exe PID 3028 wrote to memory of 1716 3028 svchost.exe schtasks.exe PID 3028 wrote to memory of 1716 3028 svchost.exe schtasks.exe PID 3028 wrote to memory of 920 3028 svchost.exe schtasks.exe PID 3028 wrote to memory of 920 3028 svchost.exe schtasks.exe PID 3028 wrote to memory of 920 3028 svchost.exe schtasks.exe PID 3028 wrote to memory of 920 3028 svchost.exe schtasks.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\53380073aa98e7bbbc09ef97cad9f6c0_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\53380073aa98e7bbbc09ef97cad9f6c0_NeikiAnalytics.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Loads dropped DLL
- Checks whether UAC is enabled
- Writes to the Master Boot Record (MBR)
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2244 -
\??\c:\windows\resources\themes\explorer.exec:\windows\resources\themes\explorer.exe2⤵
- Modifies visiblity of hidden/system files in Explorer
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Checks whether UAC is enabled
- Writes to the Master Boot Record (MBR)
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1400 -
\??\c:\windows\resources\spoolsv.exec:\windows\resources\spoolsv.exe SE3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
- Writes to the Master Boot Record (MBR)
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2216 -
\??\c:\windows\resources\svchost.exec:\windows\resources\svchost.exe4⤵
- Modifies visiblity of hidden/system files in Explorer
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Checks whether UAC is enabled
- Writes to the Master Boot Record (MBR)
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3028 -
\??\c:\windows\resources\spoolsv.exec:\windows\resources\spoolsv.exe PR5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
- Writes to the Master Boot Record (MBR)
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2108 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn "svchost" /tr "c:\windows\resources\svchost.exe" /sc daily /st 07:10 /f5⤵
- Creates scheduled task(s)
PID:2672 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn "svchost" /tr "c:\windows\resources\svchost.exe" /sc daily /st 07:11 /f5⤵
- Creates scheduled task(s)
PID:1716 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn "svchost" /tr "c:\windows\resources\svchost.exe" /sc daily /st 07:12 /f5⤵
- Creates scheduled task(s)
PID:920 -
C:\Windows\Explorer.exeC:\Windows\Explorer.exe3⤵PID:3048
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Pre-OS Boot
1Bootkit
1Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
2Pre-OS Boot
1Bootkit
1Virtualization/Sandbox Evasion
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
16B
MD554fd8ae71831d9afc54c3b3a9cad01e8
SHA1c8cd04c1fd27990aaaf98c16d28d9fddaa61beb5
SHA256143ac77670384287b780c744a95ce45e95b28747cdc93a75069be8ffb8da2962
SHA512de6fb3af41c9b3831625935c29998f106bd9361edb13a1b9ce02f5295298b17771e9bf01dec7ca749ff00b517de9e6ea77935185c1081a1795cbf0e69af17f40
-
Filesize
3.6MB
MD54aa6ac66962dcea5da7329818ff338aa
SHA17b95592bc2210f332968c3be8be01f5188bd3167
SHA2563485adc57e84ef336b333960afbf494be48cd17be0fdaf5f9945445e16e6a930
SHA51249e410100778c930d6ccc0ba9adf7c50c76a079831d78ce51840b4b7977024ac1a54569b28b19d9738ccb44624c75ab745bb74cf2451e2a728306172600f922c
-
Filesize
3.6MB
MD5895ac32348369aee98cc275c3f74157f
SHA13b207f9c2153683294f11cd89b5bff652e72bae3
SHA2565345af46200a154e7015169cf34fe7b9c144e2544b6e1c0d5fcf94b4153a4e45
SHA51259a314967e0dfd8d692cd4496f239e1b71894781cc3aaddbb3b3e50be9cd2a290382086d6339db3d58ada02274fb6f1ae169bf69ac15e048f6b7a14f62a8fc27
-
Filesize
3.6MB
MD5d4471d458a9079f57b329d67997d2c0c
SHA18488c4510aaa5f6f1d0976b5057f9edbf0c698dd
SHA2569255198fe0626b8eaf63b678831c05231a57b89110ec3866a99c01a4606aa394
SHA5127bab042c40179d92107e5af570d72fc0e5af02736ea8bb5af56b9b08debfeb3dbd30acb61c7be607eb0b321c81546a5399efaffc53c9df299c839ed06dd1819f