Analysis

  • max time kernel
    150s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    23/05/2024, 20:49

General

  • Target

    85a2f3e1bbba2dee5f48b736b9c58110_NeikiAnalytics.exe

  • Size

    71KB

  • MD5

    85a2f3e1bbba2dee5f48b736b9c58110

  • SHA1

    d3689b7dab0bf9973fa339308d8e17a3d9e15a42

  • SHA256

    dfb251be37c23f16b9a73eebc3eb338926993d0dcf70578fd31c79105836d377

  • SHA512

    5c201d6800e5c816b54a9e614910c90290970ab962454fda5a36af5b6e0d582f48aaf346704270ba9e2d4c96b1e6cccec3bfb11a2ca683062486d20e4822e2b7

  • SSDEEP

    768:EXKeT2Si83nLt8tkGX8uxOHgRrW5YLKG9Y/HrSNm0kmG7xMsVAnc3yy85SBiLFMR:EFrmh0HgB3LKrL9AcnQFMc9zwR6i+B+

Score
10/10

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 2 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Modifies Installed Components in the registry 2 TTPs 8 IoCs
  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 8 IoCs
  • UPX packed file 14 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 4 IoCs
  • Drops file in Windows directory 6 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 2 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\85a2f3e1bbba2dee5f48b736b9c58110_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\85a2f3e1bbba2dee5f48b736b9c58110_NeikiAnalytics.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3044
    • \??\c:\windows\system\explorer.exe
      c:\windows\system\explorer.exe
      2⤵
      • Modifies WinLogon for persistence
      • Modifies visiblity of hidden/system files in Explorer
      • Modifies Installed Components in the registry
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Drops file in Windows directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:3000
      • \??\c:\windows\system\spoolsv.exe
        c:\windows\system\spoolsv.exe SE
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in Windows directory
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2856
        • \??\c:\windows\system\svchost.exe
          c:\windows\system\svchost.exe
          4⤵
          • Modifies WinLogon for persistence
          • Modifies visiblity of hidden/system files in Explorer
          • Modifies Installed Components in the registry
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Drops file in Windows directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: GetForegroundWindowSpam
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:2740
          • \??\c:\windows\system\spoolsv.exe
            c:\windows\system\spoolsv.exe PR
            5⤵
            • Executes dropped EXE
            • Suspicious use of SetWindowsHookEx
            PID:2620
          • C:\Windows\SysWOW64\at.exe
            at 20:51 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe
            5⤵
              PID:2508
            • C:\Windows\SysWOW64\at.exe
              at 20:52 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe
              5⤵
                PID:2972
              • C:\Windows\SysWOW64\at.exe
                at 20:53 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe
                5⤵
                  PID:1652

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Roaming\mrsys.exe

          Filesize

          71KB

          MD5

          065ee5fc13aa8f95627eb57fc264f0d7

          SHA1

          39f8276188ce2c2164ca0baa71068ccc810fef63

          SHA256

          29323517eb194e34b662092e2a94bfe6636e104c46b093e64f298c8b206c8ffe

          SHA512

          8ae941e71d106260de63c64161c5458870aeb47199333e2e46976e1831127135fa86b22185e9f9dde5bcc6248d85fe1f5616be6626826b8f9d0a47755cc754e4

        • C:\Windows\system\spoolsv.exe

          Filesize

          71KB

          MD5

          66f476a7878d45a47696f9f421ea1150

          SHA1

          60e58e307b1263101061b3349461f50362764af3

          SHA256

          65f7b4026142a3a833c9c3b16f5fd5511db8b7e6762f3cdcd0c298c9b6b44de0

          SHA512

          76f22c1e561bccb2d5a13373dd03c4a9aab6d157b64f9894b72788fb8a8fc1bd13b03ce72d127bfa18cd249161e83086d51eb33d9a6280e3b8c6ec2d5b14ecae

        • C:\Windows\system\svchost.exe

          Filesize

          71KB

          MD5

          a84b65ad7ed5696a0823c0db6dc3f84b

          SHA1

          f4e17d167eb3fa489deddf84dbeb682fa902ae5f

          SHA256

          35d8d0e5acccfe83fe592c363b00e3e0ab64e71575af87b7fe2e59b4b5fa2dde

          SHA512

          16c5577ea1e33dfc391a92f65ca1821b7c3fbcb649dd9830e5d60f05ab6cd37d1552991bc9a3e012892ce9e65121da52c09fe684be5c4795f37e3adaf33254b9

        • \Windows\system\explorer.exe

          Filesize

          71KB

          MD5

          c18a1db52d462fce9e868e0cecf0f37d

          SHA1

          cdf2aedcdea9248c74642dfe9226392f95e4ee29

          SHA256

          8947da797684af5a5b2e33a7c7239c23b905b174688e0bc839ea44dfc4a0da2c

          SHA512

          011f1bd922e9aaeb77a2677a2d250cb2db64fa21a673528e4b8922c49755d73998254219585f105dbf68eddabc6f5ac1d15082b42e29a648f3753cee183451f2

        • memory/2620-54-0x0000000000400000-0x0000000000435000-memory.dmp

          Filesize

          212KB

        • memory/2740-63-0x0000000000400000-0x0000000000435000-memory.dmp

          Filesize

          212KB

        • memory/2856-56-0x0000000000400000-0x0000000000435000-memory.dmp

          Filesize

          212KB

        • memory/2856-36-0x0000000000400000-0x0000000000435000-memory.dmp

          Filesize

          212KB

        • memory/3000-24-0x0000000000560000-0x0000000000595000-memory.dmp

          Filesize

          212KB

        • memory/3000-15-0x0000000000400000-0x0000000000435000-memory.dmp

          Filesize

          212KB

        • memory/3000-61-0x0000000000400000-0x0000000000435000-memory.dmp

          Filesize

          212KB

        • memory/3000-72-0x0000000000400000-0x0000000000435000-memory.dmp

          Filesize

          212KB

        • memory/3044-59-0x0000000000400000-0x0000000000435000-memory.dmp

          Filesize

          212KB

        • memory/3044-12-0x00000000026D0000-0x0000000002705000-memory.dmp

          Filesize

          212KB

        • memory/3044-0-0x0000000000400000-0x0000000000435000-memory.dmp

          Filesize

          212KB

        • memory/3044-13-0x00000000026D0000-0x0000000002705000-memory.dmp

          Filesize

          212KB