Analysis
-
max time kernel
149s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
24-05-2024 16:35
Static task
static1
Behavioral task
behavioral1
Sample
ab877ed5f1043c36b0774e405ad59f80_NeikiAnalytics.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
ab877ed5f1043c36b0774e405ad59f80_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
ab877ed5f1043c36b0774e405ad59f80_NeikiAnalytics.exe
-
Size
62KB
-
MD5
ab877ed5f1043c36b0774e405ad59f80
-
SHA1
6a5fb16cd1d1413bfbcb2313d479896585480a0f
-
SHA256
8824733981d29f17e304e5f610f82c8e6574d50e63fd35cc4f962cee8ff15e92
-
SHA512
9ab8e7b09e3c486409211c697cd86855a767aca1b2e6893bc1dca9d7f5caec9e0341a1d6a095139ead9eb03c9d961729afc745ac02423cc54bf8e9f0bc36578f
-
SSDEEP
768:b5LdNcambmjeCGrrxLYcFso4jZKQqLboxsqjGi6CU16mH4qs9BYgNmVCsrbyaWXD:RdN/C6G3xTstEzGs9TCAqH5MV7G9LsY
Malware Config
Extracted
njrat
v2.0
svchost
spys.ddns.net:1528
Windows
-
reg_key
Windows
-
splitter
|-F-|
Signatures
-
Drops startup file 1 IoCs
Processes:
AppLaunch.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Windows.lnk AppLaunch.exe -
Executes dropped EXE 1 IoCs
Processes:
svchost.exepid process 4048 svchost.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
powershell.exeAppLaunch.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\HWMonitor = "C:\\Users\\Admin\\AppData\\Roaming\\chome_exe\\HWMonitor.exe" powershell.exe Set value (str) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Windows2 = "C:\\Users\\Admin\\AppData\\Roaming\\svchost.exe" AppLaunch.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
ab877ed5f1043c36b0774e405ad59f80_NeikiAnalytics.exedescription pid process target process PID 3076 set thread context of 2652 3076 ab877ed5f1043c36b0774e405ad59f80_NeikiAnalytics.exe AppLaunch.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
ab877ed5f1043c36b0774e405ad59f80_NeikiAnalytics.exepowershell.exepid process 3076 ab877ed5f1043c36b0774e405ad59f80_NeikiAnalytics.exe 3076 ab877ed5f1043c36b0774e405ad59f80_NeikiAnalytics.exe 3752 powershell.exe 3752 powershell.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
ab877ed5f1043c36b0774e405ad59f80_NeikiAnalytics.exepowershell.exedescription pid process Token: SeDebugPrivilege 3076 ab877ed5f1043c36b0774e405ad59f80_NeikiAnalytics.exe Token: SeDebugPrivilege 3752 powershell.exe -
Suspicious use of WriteProcessMemory 20 IoCs
Processes:
ab877ed5f1043c36b0774e405ad59f80_NeikiAnalytics.exeAppLaunch.exedescription pid process target process PID 3076 wrote to memory of 3752 3076 ab877ed5f1043c36b0774e405ad59f80_NeikiAnalytics.exe powershell.exe PID 3076 wrote to memory of 3752 3076 ab877ed5f1043c36b0774e405ad59f80_NeikiAnalytics.exe powershell.exe PID 3076 wrote to memory of 3752 3076 ab877ed5f1043c36b0774e405ad59f80_NeikiAnalytics.exe powershell.exe PID 3076 wrote to memory of 984 3076 ab877ed5f1043c36b0774e405ad59f80_NeikiAnalytics.exe AppLaunch.exe PID 3076 wrote to memory of 984 3076 ab877ed5f1043c36b0774e405ad59f80_NeikiAnalytics.exe AppLaunch.exe PID 3076 wrote to memory of 984 3076 ab877ed5f1043c36b0774e405ad59f80_NeikiAnalytics.exe AppLaunch.exe PID 3076 wrote to memory of 2652 3076 ab877ed5f1043c36b0774e405ad59f80_NeikiAnalytics.exe AppLaunch.exe PID 3076 wrote to memory of 2652 3076 ab877ed5f1043c36b0774e405ad59f80_NeikiAnalytics.exe AppLaunch.exe PID 3076 wrote to memory of 2652 3076 ab877ed5f1043c36b0774e405ad59f80_NeikiAnalytics.exe AppLaunch.exe PID 3076 wrote to memory of 2652 3076 ab877ed5f1043c36b0774e405ad59f80_NeikiAnalytics.exe AppLaunch.exe PID 3076 wrote to memory of 2652 3076 ab877ed5f1043c36b0774e405ad59f80_NeikiAnalytics.exe AppLaunch.exe PID 3076 wrote to memory of 2652 3076 ab877ed5f1043c36b0774e405ad59f80_NeikiAnalytics.exe AppLaunch.exe PID 3076 wrote to memory of 2652 3076 ab877ed5f1043c36b0774e405ad59f80_NeikiAnalytics.exe AppLaunch.exe PID 3076 wrote to memory of 2652 3076 ab877ed5f1043c36b0774e405ad59f80_NeikiAnalytics.exe AppLaunch.exe PID 2652 wrote to memory of 4048 2652 AppLaunch.exe svchost.exe PID 2652 wrote to memory of 4048 2652 AppLaunch.exe svchost.exe PID 2652 wrote to memory of 4048 2652 AppLaunch.exe svchost.exe PID 2652 wrote to memory of 4388 2652 AppLaunch.exe attrib.exe PID 2652 wrote to memory of 4388 2652 AppLaunch.exe attrib.exe PID 2652 wrote to memory of 4388 2652 AppLaunch.exe attrib.exe -
Views/modifies file attributes 1 TTPs 1 IoCs
Processes
-
C:\Users\Admin\AppData\Local\Temp\ab877ed5f1043c36b0774e405ad59f80_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\ab877ed5f1043c36b0774e405ad59f80_NeikiAnalytics.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3076 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Remove-ItemProperty -Path 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run' -Name 'HWMonitor';New-ItemProperty -Path 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run' -Name 'HWMonitor' -Value '"C:\Users\Admin\AppData\Roaming\chome_exe\HWMonitor.exe"' -PropertyType 'String'2⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3752 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"2⤵PID:984
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"2⤵
- Drops startup file
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2652 -
C:\Users\Admin\AppData\Roaming\svchost.exe"C:\Users\Admin\AppData\Roaming\svchost.exe"3⤵
- Executes dropped EXE
PID:4048 -
C:\Windows\SysWOW64\attrib.exeattrib +h +r +s "C:\Users\Admin\AppData\Roaming\svchost.exe"3⤵
- Views/modifies file attributes
PID:4388
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
101KB
MD589d41e1cf478a3d3c2c701a27a5692b2
SHA1691e20583ef80cb9a2fd3258560e7f02481d12fd
SHA256dc5ac8d4d6d5b230ab73415c80439b4da77da1cfde18214ef601897f661abdac
SHA5125c9658f6ca0d8d067bfc76072c438ac13daa12d8c1fef33369e1bc36a592d160a2bdb22b4f3eed73e8670bb65107a4134e18e6dc604897a80cc0768769f475dc