Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
23/05/2024, 20:44
Static task
static1
Behavioral task
behavioral1
Sample
84e26c2043049ad15f5c75ae56221b40_NeikiAnalytics.exe
Resource
win7-20231129-en
General
-
Target
84e26c2043049ad15f5c75ae56221b40_NeikiAnalytics.exe
-
Size
4.1MB
-
MD5
84e26c2043049ad15f5c75ae56221b40
-
SHA1
b410d83980e463db075f2acab3ae2eecdc438d70
-
SHA256
32822069ca4b04e0dfcfe09bb9c8ceca6041db4967795d522cbc60915a5589e9
-
SHA512
530830641ca74fcb5f35388067268b4334a623a0eb945af01a0a1a95faed19bbf3ce57802bcbaa503bd728ee61d8b3bed03e5a8ba0248620a530c9e984be2086
-
SSDEEP
98304:gvCQaDBnSWO/B+XxjapSyZlG1PnsYHdaWgIg92gsnC3bzMZh6P16:gvC3DFSWO/BjYGk1PnXHoWWZ1za6N6
Malware Config
Signatures
-
Glupteba payload 19 IoCs
resource yara_rule behavioral2/memory/3192-2-0x00000000043E0000-0x0000000004CCB000-memory.dmp family_glupteba behavioral2/memory/3192-3-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/3192-56-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/3192-57-0x00000000043E0000-0x0000000004CCB000-memory.dmp family_glupteba behavioral2/memory/3192-55-0x0000000000400000-0x0000000002365000-memory.dmp family_glupteba behavioral2/memory/4088-131-0x0000000000400000-0x0000000002365000-memory.dmp family_glupteba behavioral2/memory/4088-136-0x0000000000400000-0x0000000002365000-memory.dmp family_glupteba behavioral2/memory/3152-220-0x0000000000400000-0x0000000002365000-memory.dmp family_glupteba behavioral2/memory/3152-221-0x0000000000400000-0x0000000002365000-memory.dmp family_glupteba behavioral2/memory/3152-222-0x0000000000400000-0x0000000002365000-memory.dmp family_glupteba behavioral2/memory/3152-223-0x0000000000400000-0x0000000002365000-memory.dmp family_glupteba behavioral2/memory/3152-224-0x0000000000400000-0x0000000002365000-memory.dmp family_glupteba behavioral2/memory/3152-225-0x0000000000400000-0x0000000002365000-memory.dmp family_glupteba behavioral2/memory/3152-226-0x0000000000400000-0x0000000002365000-memory.dmp family_glupteba behavioral2/memory/3152-227-0x0000000000400000-0x0000000002365000-memory.dmp family_glupteba behavioral2/memory/3152-228-0x0000000000400000-0x0000000002365000-memory.dmp family_glupteba behavioral2/memory/3152-229-0x0000000000400000-0x0000000002365000-memory.dmp family_glupteba behavioral2/memory/3152-230-0x0000000000400000-0x0000000002365000-memory.dmp family_glupteba behavioral2/memory/3152-231-0x0000000000400000-0x0000000002365000-memory.dmp family_glupteba -
Modifies Windows Firewall 2 TTPs 1 IoCs
pid Process 5012 netsh.exe -
Executes dropped EXE 2 IoCs
pid Process 3152 csrss.exe 4180 injector.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" 84e26c2043049ad15f5c75ae56221b40_NeikiAnalytics.exe Set value (str) \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" csrss.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Manipulates WinMonFS driver. 1 IoCs
Roottkits write to WinMonFS to hide directories/files from being detected.
description ioc Process File opened for modification \??\WinMonFS csrss.exe -
Drops file in System32 directory 7 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe -
Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 1 IoCs
Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.
description ioc Process File opened (read-only) \??\VBoxMiniRdrDN 84e26c2043049ad15f5c75ae56221b40_NeikiAnalytics.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\rss 84e26c2043049ad15f5c75ae56221b40_NeikiAnalytics.exe File created C:\Windows\rss\csrss.exe 84e26c2043049ad15f5c75ae56221b40_NeikiAnalytics.exe -
pid Process 3216 powershell.exe 2540 powershell.exe 1944 powershell.exe 2932 powershell.exe 2060 powershell.exe 1616 powershell.exe 2228 powershell.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 764 3192 WerFault.exe 81 -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 5108 schtasks.exe 2568 schtasks.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-502 = "Nepal Standard Time" 84e26c2043049ad15f5c75ae56221b40_NeikiAnalytics.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-291 = "Central European Daylight Time" 84e26c2043049ad15f5c75ae56221b40_NeikiAnalytics.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-791 = "SA Western Daylight Time" 84e26c2043049ad15f5c75ae56221b40_NeikiAnalytics.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-512 = "Central Asia Standard Time" 84e26c2043049ad15f5c75ae56221b40_NeikiAnalytics.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2771 = "Omsk Daylight Time" 84e26c2043049ad15f5c75ae56221b40_NeikiAnalytics.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2891 = "Sudan Daylight Time" 84e26c2043049ad15f5c75ae56221b40_NeikiAnalytics.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2002 = "Cabo Verde Standard Time" 84e26c2043049ad15f5c75ae56221b40_NeikiAnalytics.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-631 = "Tokyo Daylight Time" 84e26c2043049ad15f5c75ae56221b40_NeikiAnalytics.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2451 = "Saint Pierre Daylight Time" 84e26c2043049ad15f5c75ae56221b40_NeikiAnalytics.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-362 = "GTB Standard Time" 84e26c2043049ad15f5c75ae56221b40_NeikiAnalytics.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-141 = "Canada Central Daylight Time" 84e26c2043049ad15f5c75ae56221b40_NeikiAnalytics.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-412 = "E. Africa Standard Time" 84e26c2043049ad15f5c75ae56221b40_NeikiAnalytics.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2941 = "Sao Tome Daylight Time" 84e26c2043049ad15f5c75ae56221b40_NeikiAnalytics.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2572 = "Turks and Caicos Standard Time" 84e26c2043049ad15f5c75ae56221b40_NeikiAnalytics.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2001 = "Cabo Verde Daylight Time" 84e26c2043049ad15f5c75ae56221b40_NeikiAnalytics.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-462 = "Afghanistan Standard Time" 84e26c2043049ad15f5c75ae56221b40_NeikiAnalytics.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1021 = "Bangladesh Daylight Time" 84e26c2043049ad15f5c75ae56221b40_NeikiAnalytics.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-392 = "Arab Standard Time" 84e26c2043049ad15f5c75ae56221b40_NeikiAnalytics.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-292 = "Central European Standard Time" 84e26c2043049ad15f5c75ae56221b40_NeikiAnalytics.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-261 = "GMT Daylight Time" 84e26c2043049ad15f5c75ae56221b40_NeikiAnalytics.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-591 = "Malay Peninsula Daylight Time" 84e26c2043049ad15f5c75ae56221b40_NeikiAnalytics.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2491 = "Aus Central W. Daylight Time" 84e26c2043049ad15f5c75ae56221b40_NeikiAnalytics.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-372 = "Jerusalem Standard Time" 84e26c2043049ad15f5c75ae56221b40_NeikiAnalytics.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2512 = "Lord Howe Standard Time" 84e26c2043049ad15f5c75ae56221b40_NeikiAnalytics.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2228 powershell.exe 2228 powershell.exe 3192 84e26c2043049ad15f5c75ae56221b40_NeikiAnalytics.exe 3192 84e26c2043049ad15f5c75ae56221b40_NeikiAnalytics.exe 3216 powershell.exe 3216 powershell.exe 4088 84e26c2043049ad15f5c75ae56221b40_NeikiAnalytics.exe 4088 84e26c2043049ad15f5c75ae56221b40_NeikiAnalytics.exe 4088 84e26c2043049ad15f5c75ae56221b40_NeikiAnalytics.exe 4088 84e26c2043049ad15f5c75ae56221b40_NeikiAnalytics.exe 4088 84e26c2043049ad15f5c75ae56221b40_NeikiAnalytics.exe 4088 84e26c2043049ad15f5c75ae56221b40_NeikiAnalytics.exe 4088 84e26c2043049ad15f5c75ae56221b40_NeikiAnalytics.exe 4088 84e26c2043049ad15f5c75ae56221b40_NeikiAnalytics.exe 4088 84e26c2043049ad15f5c75ae56221b40_NeikiAnalytics.exe 4088 84e26c2043049ad15f5c75ae56221b40_NeikiAnalytics.exe 2540 powershell.exe 2540 powershell.exe 1944 powershell.exe 1944 powershell.exe 2932 powershell.exe 2932 powershell.exe 2060 powershell.exe 2060 powershell.exe 1616 powershell.exe 1616 powershell.exe 4180 injector.exe 4180 injector.exe 4180 injector.exe 4180 injector.exe 4180 injector.exe 4180 injector.exe 3152 csrss.exe 3152 csrss.exe 4180 injector.exe 4180 injector.exe 4180 injector.exe 4180 injector.exe 4180 injector.exe 4180 injector.exe 3152 csrss.exe 3152 csrss.exe 4180 injector.exe 4180 injector.exe 4180 injector.exe 4180 injector.exe 4180 injector.exe 4180 injector.exe 4180 injector.exe 4180 injector.exe 4180 injector.exe 4180 injector.exe 4180 injector.exe 4180 injector.exe 4180 injector.exe 4180 injector.exe 4180 injector.exe 4180 injector.exe 4180 injector.exe 4180 injector.exe 4180 injector.exe 4180 injector.exe 4180 injector.exe 4180 injector.exe -
Suspicious use of AdjustPrivilegeToken 10 IoCs
description pid Process Token: SeDebugPrivilege 2228 powershell.exe Token: SeDebugPrivilege 3192 84e26c2043049ad15f5c75ae56221b40_NeikiAnalytics.exe Token: SeImpersonatePrivilege 3192 84e26c2043049ad15f5c75ae56221b40_NeikiAnalytics.exe Token: SeDebugPrivilege 3216 powershell.exe Token: SeDebugPrivilege 2540 powershell.exe Token: SeDebugPrivilege 1944 powershell.exe Token: SeDebugPrivilege 2932 powershell.exe Token: SeDebugPrivilege 2060 powershell.exe Token: SeDebugPrivilege 1616 powershell.exe Token: SeSystemEnvironmentPrivilege 3152 csrss.exe -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 3192 wrote to memory of 2228 3192 84e26c2043049ad15f5c75ae56221b40_NeikiAnalytics.exe 83 PID 3192 wrote to memory of 2228 3192 84e26c2043049ad15f5c75ae56221b40_NeikiAnalytics.exe 83 PID 3192 wrote to memory of 2228 3192 84e26c2043049ad15f5c75ae56221b40_NeikiAnalytics.exe 83 PID 4088 wrote to memory of 3216 4088 84e26c2043049ad15f5c75ae56221b40_NeikiAnalytics.exe 97 PID 4088 wrote to memory of 3216 4088 84e26c2043049ad15f5c75ae56221b40_NeikiAnalytics.exe 97 PID 4088 wrote to memory of 3216 4088 84e26c2043049ad15f5c75ae56221b40_NeikiAnalytics.exe 97 PID 4088 wrote to memory of 2964 4088 84e26c2043049ad15f5c75ae56221b40_NeikiAnalytics.exe 101 PID 4088 wrote to memory of 2964 4088 84e26c2043049ad15f5c75ae56221b40_NeikiAnalytics.exe 101 PID 2964 wrote to memory of 5012 2964 cmd.exe 103 PID 2964 wrote to memory of 5012 2964 cmd.exe 103 PID 4088 wrote to memory of 2540 4088 84e26c2043049ad15f5c75ae56221b40_NeikiAnalytics.exe 104 PID 4088 wrote to memory of 2540 4088 84e26c2043049ad15f5c75ae56221b40_NeikiAnalytics.exe 104 PID 4088 wrote to memory of 2540 4088 84e26c2043049ad15f5c75ae56221b40_NeikiAnalytics.exe 104 PID 4088 wrote to memory of 1944 4088 84e26c2043049ad15f5c75ae56221b40_NeikiAnalytics.exe 106 PID 4088 wrote to memory of 1944 4088 84e26c2043049ad15f5c75ae56221b40_NeikiAnalytics.exe 106 PID 4088 wrote to memory of 1944 4088 84e26c2043049ad15f5c75ae56221b40_NeikiAnalytics.exe 106 PID 4088 wrote to memory of 3152 4088 84e26c2043049ad15f5c75ae56221b40_NeikiAnalytics.exe 108 PID 4088 wrote to memory of 3152 4088 84e26c2043049ad15f5c75ae56221b40_NeikiAnalytics.exe 108 PID 4088 wrote to memory of 3152 4088 84e26c2043049ad15f5c75ae56221b40_NeikiAnalytics.exe 108 PID 3152 wrote to memory of 2932 3152 csrss.exe 109 PID 3152 wrote to memory of 2932 3152 csrss.exe 109 PID 3152 wrote to memory of 2932 3152 csrss.exe 109 PID 3152 wrote to memory of 2060 3152 csrss.exe 115 PID 3152 wrote to memory of 2060 3152 csrss.exe 115 PID 3152 wrote to memory of 2060 3152 csrss.exe 115 PID 3152 wrote to memory of 1616 3152 csrss.exe 117 PID 3152 wrote to memory of 1616 3152 csrss.exe 117 PID 3152 wrote to memory of 1616 3152 csrss.exe 117 PID 3152 wrote to memory of 4180 3152 csrss.exe 119 PID 3152 wrote to memory of 4180 3152 csrss.exe 119 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\84e26c2043049ad15f5c75ae56221b40_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\84e26c2043049ad15f5c75ae56221b40_NeikiAnalytics.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3192 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2228
-
-
C:\Users\Admin\AppData\Local\Temp\84e26c2043049ad15f5c75ae56221b40_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\84e26c2043049ad15f5c75ae56221b40_NeikiAnalytics.exe"2⤵
- Adds Run key to start application
- Checks for VirtualBox DLLs, possible anti-VM trick
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4088 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Drops file in System32 directory
- Command and Scripting Interpreter: PowerShell
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3216
-
-
C:\Windows\system32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"3⤵
- Suspicious use of WriteProcessMemory
PID:2964 -
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes4⤵
- Modifies Windows Firewall
PID:5012
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Drops file in System32 directory
- Command and Scripting Interpreter: PowerShell
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2540
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Drops file in System32 directory
- Command and Scripting Interpreter: PowerShell
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1944
-
-
C:\Windows\rss\csrss.exeC:\Windows\rss\csrss.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Manipulates WinMonFS driver.
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3152 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Command and Scripting Interpreter: PowerShell
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2932
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F4⤵
- Creates scheduled task(s)
PID:5108
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /delete /tn ScheduledUpdate /f4⤵PID:3328
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Command and Scripting Interpreter: PowerShell
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2060
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Command and Scripting Interpreter: PowerShell
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1616
-
-
C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exeC:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:4180
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F4⤵
- Creates scheduled task(s)
PID:2568
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3192 -s 6282⤵
- Program crash
PID:764
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 3192 -ip 31921⤵PID:4332
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
281KB
MD5d98e33b66343e7c96158444127a117f6
SHA1bb716c5509a2bf345c6c1152f6e3e1452d39d50d
SHA2565de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1
SHA512705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log
Filesize2KB
MD53d086a433708053f9bf9523e1d87a4e8
SHA1b3ab5d4f282a4c8fe8c3005b8a557ed5a0e37f28
SHA2566f8fd1b8d9788ad54eaeee329232187e24b7b43393a01aeba2d6e9675231fb69
SHA512931ae42b4c68a4507ff2342332b08eb407050d47cf4176137ea022d0f6e513c689e998445a04c6d18d4877391705c586bfce0234632b898d41aaed0957996dfd
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD584e74bc3a861a141319d59a25cec0762
SHA1003bdcc28ac84ea29726c6fa4b3b34e106a0d667
SHA2561985b3d5b93378f3bef9aadca8d712ac3fd999ffe90e034672442a3124c59510
SHA512b92173151e7399f47ea176ba72cea8ae7896246256da34f917c1f42caf07630b90a97455cb12778f661d36f19406857ca89a6d0174864348107f2df0610d6ea6
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5c5c0ec2cbf21ac6d204c3b8030c78b3f
SHA178114c0c50e7d9661ec458b2b7f19072e0466d65
SHA2568e7763f4da39e69b13ad73ce7adb41fa37522931474746219c40522d37ec32bc
SHA512e1b8a374ea5a4e997782dc5b4814ebcadfd2b27a681ca1eb89af93cc8d071304c6bdcca34f044a8ab6e99ba93f43552b541208fbc6148fb2256846b360c18a3b
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5e926a520008f9dd2e4385549d38c5f65
SHA1a6962b41659274765118ef6cd273bba17c6c75eb
SHA256e01cacdbaf10804322d7db87b63b56aa55a8eb9e4de59b04877d070ebca916b6
SHA512d38128c43df9777fd08403b2417ac5cfc06c0e1a13f1f97d19fa0c92cb71a86ca3605e11d50cfff5b39b5d4ecdb8af5897cda42f780a3add889272bab350dfbb
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD565c838ba42c39b721fd48dd164a057d4
SHA133181e4e297a6bbd0a6ff3ab8f30776e03ecab86
SHA2560e45e8d108196897521c954d893263d455c2d187799a78d8f4b741cd4e4346d1
SHA512b032dcf6075e32266a7437b2a545bca07513dc1d43fee8fda8fff2854a4f6e80ecbfd885e760308ca55502fef8b5f3a159bb6728687f9fab8ab4e7cbc394562e
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD583f2687a876db7338eb06d0d1537dfa6
SHA14a9f305940faf9e0ceb5d0ed502b11842d0373f5
SHA2561f3a09a91986f3f3c5b511a07b5f7b78b068f2b9eac2e45f4bce1451d7e15c7f
SHA512a6db5a7fefb71f530edc9bd07483d71713737900d87d5e854a5137ed1158a127a3b86807765460da2ace12a6a18f587a111276352ca77d8440e8bd98c10956db
-
Filesize
4.1MB
MD584e26c2043049ad15f5c75ae56221b40
SHA1b410d83980e463db075f2acab3ae2eecdc438d70
SHA25632822069ca4b04e0dfcfe09bb9c8ceca6041db4967795d522cbc60915a5589e9
SHA512530830641ca74fcb5f35388067268b4334a623a0eb945af01a0a1a95faed19bbf3ce57802bcbaa503bd728ee61d8b3bed03e5a8ba0248620a530c9e984be2086