General
-
Target
a2a935649fbc3eb38195bcb7f218b280_NeikiAnalytics.exe
-
Size
287KB
-
Sample
240525-cc49jsaf3s
-
MD5
a2a935649fbc3eb38195bcb7f218b280
-
SHA1
7ec45138f71822932423c3a012acff793c681a7b
-
SHA256
3cd43564b5be851aa99978593a1be701004072a51112efbee18d9bac9cfb2d6e
-
SHA512
c1bb2562809b28faaf7bfce008d8884da16ac84d06d079ee116640ff27eee24d32e105cab6a3bb18931b7534bedf9963d49c35acb6ed3f8b76ffca04dcd95173
-
SSDEEP
6144:TvEa2U+T6i5LirrllHy4HUcMQY6Z27Ox0+Meyb:TEaN+T5xYrllrU7QY6Q7ObMV
Static task
static1
Behavioral task
behavioral1
Sample
a2a935649fbc3eb38195bcb7f218b280_NeikiAnalytics.exe
Resource
win7-20240508-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
http://www.klkjwre9fqwieluoi.info/
http://kukutrustnet777888.info/
Targets
-
-
Target
a2a935649fbc3eb38195bcb7f218b280_NeikiAnalytics.exe
-
Size
287KB
-
MD5
a2a935649fbc3eb38195bcb7f218b280
-
SHA1
7ec45138f71822932423c3a012acff793c681a7b
-
SHA256
3cd43564b5be851aa99978593a1be701004072a51112efbee18d9bac9cfb2d6e
-
SHA512
c1bb2562809b28faaf7bfce008d8884da16ac84d06d079ee116640ff27eee24d32e105cab6a3bb18931b7534bedf9963d49c35acb6ed3f8b76ffca04dcd95173
-
SSDEEP
6144:TvEa2U+T6i5LirrllHy4HUcMQY6Z27Ox0+Meyb:TEaN+T5xYrllrU7QY6Q7ObMV
-
Modifies WinLogon for persistence
-
Modifies firewall policy service
-
Modifies visiblity of hidden/system files in Explorer
-
Modifies Installed Components in the registry
-
Deletes itself
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Hide Artifacts
1Hidden Files and Directories
1Impair Defenses
3Disable or Modify Tools
3Modify Registry
9