Analysis
-
max time kernel
150s -
max time network
125s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
25-05-2024 10:09
Static task
static1
Behavioral task
behavioral1
Sample
73721887b1e40471f291a80a58d66ff0_NeikiAnalytics.exe
Resource
win7-20240221-en
General
-
Target
73721887b1e40471f291a80a58d66ff0_NeikiAnalytics.exe
-
Size
4.1MB
-
MD5
73721887b1e40471f291a80a58d66ff0
-
SHA1
6066a9a7b39677b25ac347cf911abc4d68cc75e0
-
SHA256
af41907dde7a5370a373b5fe8d9f3852d57d1002a787ca4b4382cf713198f297
-
SHA512
df281d4c2f9ef8812aec35ddafed222da487ee0af69b4be95578a2680ab562b9ce95c935eddfd1358c0b447d750be3c6184a4d3fd9fdc5954f2f228d9b948e8a
-
SSDEEP
98304:HquwTfmIkbquibhaubey8xw4weLmAcL8k4+6XNB3Rebmbqb0l:YLmIkbquibpii2yAk4+2fEKmbm
Malware Config
Signatures
-
Glupteba payload 18 IoCs
Processes:
resource yara_rule behavioral2/memory/2880-2-0x0000000002D80000-0x000000000366B000-memory.dmp family_glupteba behavioral2/memory/2880-3-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/2880-81-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/2880-127-0x0000000002D80000-0x000000000366B000-memory.dmp family_glupteba behavioral2/memory/3476-132-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/2376-209-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/2376-216-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/2376-218-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/2376-220-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/2376-222-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/2376-224-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/2376-226-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/2376-228-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/2376-230-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/2376-232-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/2376-234-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/2376-236-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/2376-238-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba -
Modifies Windows Firewall 2 TTPs 1 IoCs
Processes:
netsh.exepid Process 1876 netsh.exe -
Executes dropped EXE 2 IoCs
Processes:
csrss.exeinjector.exepid Process 2376 csrss.exe 2776 injector.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
73721887b1e40471f291a80a58d66ff0_NeikiAnalytics.execsrss.exedescription ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" 73721887b1e40471f291a80a58d66ff0_NeikiAnalytics.exe Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" csrss.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Manipulates WinMonFS driver. 1 IoCs
Roottkits write to WinMonFS to hide directories/files from being detected.
Processes:
csrss.exedescription ioc Process File opened for modification \??\WinMonFS csrss.exe -
Drops file in System32 directory 7 IoCs
Processes:
powershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exedescription ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log powershell.exe -
Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 1 IoCs
Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.
Processes:
73721887b1e40471f291a80a58d66ff0_NeikiAnalytics.exedescription ioc Process File opened (read-only) \??\VBoxMiniRdrDN 73721887b1e40471f291a80a58d66ff0_NeikiAnalytics.exe -
Drops file in Windows directory 2 IoCs
Processes:
73721887b1e40471f291a80a58d66ff0_NeikiAnalytics.exedescription ioc Process File opened for modification C:\Windows\rss 73721887b1e40471f291a80a58d66ff0_NeikiAnalytics.exe File created C:\Windows\rss\csrss.exe 73721887b1e40471f291a80a58d66ff0_NeikiAnalytics.exe -
Processes:
powershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepid Process 4136 powershell.exe 3508 powershell.exe 4384 powershell.exe 4012 powershell.exe 2608 powershell.exe 1508 powershell.exe 4004 powershell.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exepid Process 884 schtasks.exe 2856 schtasks.exe -
Modifies data under HKEY_USERS 64 IoCs
Processes:
powershell.exepowershell.exepowershell.exe73721887b1e40471f291a80a58d66ff0_NeikiAnalytics.exepowershell.exepowershell.exepowershell.exedescription ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1661 = "Bahia Daylight Time" 73721887b1e40471f291a80a58d66ff0_NeikiAnalytics.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-212 = "Pacific Standard Time" 73721887b1e40471f291a80a58d66ff0_NeikiAnalytics.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-91 = "Pacific SA Daylight Time" 73721887b1e40471f291a80a58d66ff0_NeikiAnalytics.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-11 = "Azores Daylight Time" 73721887b1e40471f291a80a58d66ff0_NeikiAnalytics.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-721 = "Central Pacific Daylight Time" 73721887b1e40471f291a80a58d66ff0_NeikiAnalytics.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1662 = "Bahia Standard Time" 73721887b1e40471f291a80a58d66ff0_NeikiAnalytics.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-172 = "Central Standard Time (Mexico)" 73721887b1e40471f291a80a58d66ff0_NeikiAnalytics.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2042 = "Eastern Standard Time (Mexico)" 73721887b1e40471f291a80a58d66ff0_NeikiAnalytics.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-931 = "Coordinated Universal Time" 73721887b1e40471f291a80a58d66ff0_NeikiAnalytics.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2181 = "Astrakhan Daylight Time" 73721887b1e40471f291a80a58d66ff0_NeikiAnalytics.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-31 = "Mid-Atlantic Daylight Time" 73721887b1e40471f291a80a58d66ff0_NeikiAnalytics.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1861 = "Russia TZ 6 Daylight Time" 73721887b1e40471f291a80a58d66ff0_NeikiAnalytics.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-382 = "South Africa Standard Time" 73721887b1e40471f291a80a58d66ff0_NeikiAnalytics.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1041 = "Ulaanbaatar Daylight Time" 73721887b1e40471f291a80a58d66ff0_NeikiAnalytics.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-681 = "E. Australia Daylight Time" 73721887b1e40471f291a80a58d66ff0_NeikiAnalytics.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2531 = "Chatham Islands Daylight Time" 73721887b1e40471f291a80a58d66ff0_NeikiAnalytics.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-52 = "Greenland Standard Time" 73721887b1e40471f291a80a58d66ff0_NeikiAnalytics.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-232 = "Hawaiian Standard Time" 73721887b1e40471f291a80a58d66ff0_NeikiAnalytics.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-3052 = "Qyzylorda Standard Time" 73721887b1e40471f291a80a58d66ff0_NeikiAnalytics.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-392 = "Arab Standard Time" 73721887b1e40471f291a80a58d66ff0_NeikiAnalytics.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-72 = "Newfoundland Standard Time" 73721887b1e40471f291a80a58d66ff0_NeikiAnalytics.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-92 = "Pacific SA Standard Time" 73721887b1e40471f291a80a58d66ff0_NeikiAnalytics.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-364 = "Middle East Daylight Time" 73721887b1e40471f291a80a58d66ff0_NeikiAnalytics.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-722 = "Central Pacific Standard Time" 73721887b1e40471f291a80a58d66ff0_NeikiAnalytics.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1932 = "Russia TZ 11 Standard Time" 73721887b1e40471f291a80a58d66ff0_NeikiAnalytics.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2341 = "Haiti Daylight Time" 73721887b1e40471f291a80a58d66ff0_NeikiAnalytics.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-335 = "Jordan Standard Time" 73721887b1e40471f291a80a58d66ff0_NeikiAnalytics.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1801 = "Line Islands Daylight Time" 73721887b1e40471f291a80a58d66ff0_NeikiAnalytics.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-3051 = "Qyzylorda Daylight Time" 73721887b1e40471f291a80a58d66ff0_NeikiAnalytics.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-271 = "Greenwich Daylight Time" 73721887b1e40471f291a80a58d66ff0_NeikiAnalytics.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-181 = "Mountain Daylight Time (Mexico)" 73721887b1e40471f291a80a58d66ff0_NeikiAnalytics.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2841 = "Saratov Daylight Time" 73721887b1e40471f291a80a58d66ff0_NeikiAnalytics.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-161 = "Central Daylight Time" 73721887b1e40471f291a80a58d66ff0_NeikiAnalytics.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-892 = "Morocco Standard Time" 73721887b1e40471f291a80a58d66ff0_NeikiAnalytics.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
powershell.exe73721887b1e40471f291a80a58d66ff0_NeikiAnalytics.exepowershell.exe73721887b1e40471f291a80a58d66ff0_NeikiAnalytics.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exeinjector.execsrss.exepid Process 4136 powershell.exe 4136 powershell.exe 2880 73721887b1e40471f291a80a58d66ff0_NeikiAnalytics.exe 2880 73721887b1e40471f291a80a58d66ff0_NeikiAnalytics.exe 3508 powershell.exe 3508 powershell.exe 3476 73721887b1e40471f291a80a58d66ff0_NeikiAnalytics.exe 3476 73721887b1e40471f291a80a58d66ff0_NeikiAnalytics.exe 3476 73721887b1e40471f291a80a58d66ff0_NeikiAnalytics.exe 3476 73721887b1e40471f291a80a58d66ff0_NeikiAnalytics.exe 3476 73721887b1e40471f291a80a58d66ff0_NeikiAnalytics.exe 3476 73721887b1e40471f291a80a58d66ff0_NeikiAnalytics.exe 3476 73721887b1e40471f291a80a58d66ff0_NeikiAnalytics.exe 3476 73721887b1e40471f291a80a58d66ff0_NeikiAnalytics.exe 3476 73721887b1e40471f291a80a58d66ff0_NeikiAnalytics.exe 3476 73721887b1e40471f291a80a58d66ff0_NeikiAnalytics.exe 4384 powershell.exe 4384 powershell.exe 4384 powershell.exe 4012 powershell.exe 4012 powershell.exe 2608 powershell.exe 2608 powershell.exe 1508 powershell.exe 1508 powershell.exe 4004 powershell.exe 4004 powershell.exe 2776 injector.exe 2776 injector.exe 2776 injector.exe 2776 injector.exe 2776 injector.exe 2776 injector.exe 2776 injector.exe 2776 injector.exe 2376 csrss.exe 2376 csrss.exe 2776 injector.exe 2776 injector.exe 2776 injector.exe 2776 injector.exe 2776 injector.exe 2776 injector.exe 2376 csrss.exe 2376 csrss.exe 2776 injector.exe 2776 injector.exe 2776 injector.exe 2776 injector.exe 2776 injector.exe 2776 injector.exe 2776 injector.exe 2776 injector.exe 2776 injector.exe 2776 injector.exe 2776 injector.exe 2776 injector.exe 2776 injector.exe 2776 injector.exe 2776 injector.exe 2776 injector.exe 2776 injector.exe 2776 injector.exe 2776 injector.exe -
Suspicious use of AdjustPrivilegeToken 10 IoCs
Processes:
powershell.exe73721887b1e40471f291a80a58d66ff0_NeikiAnalytics.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.execsrss.exedescription pid Process Token: SeDebugPrivilege 4136 powershell.exe Token: SeDebugPrivilege 2880 73721887b1e40471f291a80a58d66ff0_NeikiAnalytics.exe Token: SeImpersonatePrivilege 2880 73721887b1e40471f291a80a58d66ff0_NeikiAnalytics.exe Token: SeDebugPrivilege 3508 powershell.exe Token: SeDebugPrivilege 4384 powershell.exe Token: SeDebugPrivilege 4012 powershell.exe Token: SeDebugPrivilege 2608 powershell.exe Token: SeDebugPrivilege 1508 powershell.exe Token: SeDebugPrivilege 4004 powershell.exe Token: SeSystemEnvironmentPrivilege 2376 csrss.exe -
Suspicious use of WriteProcessMemory 30 IoCs
Processes:
73721887b1e40471f291a80a58d66ff0_NeikiAnalytics.exe73721887b1e40471f291a80a58d66ff0_NeikiAnalytics.execmd.execsrss.exedescription pid Process procid_target PID 2880 wrote to memory of 4136 2880 73721887b1e40471f291a80a58d66ff0_NeikiAnalytics.exe 87 PID 2880 wrote to memory of 4136 2880 73721887b1e40471f291a80a58d66ff0_NeikiAnalytics.exe 87 PID 2880 wrote to memory of 4136 2880 73721887b1e40471f291a80a58d66ff0_NeikiAnalytics.exe 87 PID 3476 wrote to memory of 3508 3476 73721887b1e40471f291a80a58d66ff0_NeikiAnalytics.exe 96 PID 3476 wrote to memory of 3508 3476 73721887b1e40471f291a80a58d66ff0_NeikiAnalytics.exe 96 PID 3476 wrote to memory of 3508 3476 73721887b1e40471f291a80a58d66ff0_NeikiAnalytics.exe 96 PID 3476 wrote to memory of 4316 3476 73721887b1e40471f291a80a58d66ff0_NeikiAnalytics.exe 101 PID 3476 wrote to memory of 4316 3476 73721887b1e40471f291a80a58d66ff0_NeikiAnalytics.exe 101 PID 4316 wrote to memory of 1876 4316 cmd.exe 103 PID 4316 wrote to memory of 1876 4316 cmd.exe 103 PID 3476 wrote to memory of 4384 3476 73721887b1e40471f291a80a58d66ff0_NeikiAnalytics.exe 104 PID 3476 wrote to memory of 4384 3476 73721887b1e40471f291a80a58d66ff0_NeikiAnalytics.exe 104 PID 3476 wrote to memory of 4384 3476 73721887b1e40471f291a80a58d66ff0_NeikiAnalytics.exe 104 PID 3476 wrote to memory of 4012 3476 73721887b1e40471f291a80a58d66ff0_NeikiAnalytics.exe 106 PID 3476 wrote to memory of 4012 3476 73721887b1e40471f291a80a58d66ff0_NeikiAnalytics.exe 106 PID 3476 wrote to memory of 4012 3476 73721887b1e40471f291a80a58d66ff0_NeikiAnalytics.exe 106 PID 3476 wrote to memory of 2376 3476 73721887b1e40471f291a80a58d66ff0_NeikiAnalytics.exe 108 PID 3476 wrote to memory of 2376 3476 73721887b1e40471f291a80a58d66ff0_NeikiAnalytics.exe 108 PID 3476 wrote to memory of 2376 3476 73721887b1e40471f291a80a58d66ff0_NeikiAnalytics.exe 108 PID 2376 wrote to memory of 2608 2376 csrss.exe 109 PID 2376 wrote to memory of 2608 2376 csrss.exe 109 PID 2376 wrote to memory of 2608 2376 csrss.exe 109 PID 2376 wrote to memory of 1508 2376 csrss.exe 115 PID 2376 wrote to memory of 1508 2376 csrss.exe 115 PID 2376 wrote to memory of 1508 2376 csrss.exe 115 PID 2376 wrote to memory of 4004 2376 csrss.exe 117 PID 2376 wrote to memory of 4004 2376 csrss.exe 117 PID 2376 wrote to memory of 4004 2376 csrss.exe 117 PID 2376 wrote to memory of 2776 2376 csrss.exe 119 PID 2376 wrote to memory of 2776 2376 csrss.exe 119 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\73721887b1e40471f291a80a58d66ff0_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\73721887b1e40471f291a80a58d66ff0_NeikiAnalytics.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2880 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4136
-
-
C:\Users\Admin\AppData\Local\Temp\73721887b1e40471f291a80a58d66ff0_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\73721887b1e40471f291a80a58d66ff0_NeikiAnalytics.exe"2⤵
- Adds Run key to start application
- Checks for VirtualBox DLLs, possible anti-VM trick
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3476 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Drops file in System32 directory
- Command and Scripting Interpreter: PowerShell
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3508
-
-
C:\Windows\system32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"3⤵
- Suspicious use of WriteProcessMemory
PID:4316 -
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes4⤵
- Modifies Windows Firewall
PID:1876
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Drops file in System32 directory
- Command and Scripting Interpreter: PowerShell
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4384
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Drops file in System32 directory
- Command and Scripting Interpreter: PowerShell
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4012
-
-
C:\Windows\rss\csrss.exeC:\Windows\rss\csrss.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Manipulates WinMonFS driver.
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2376 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Command and Scripting Interpreter: PowerShell
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2608
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F4⤵
- Creates scheduled task(s)
PID:884
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /delete /tn ScheduledUpdate /f4⤵PID:1184
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Command and Scripting Interpreter: PowerShell
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1508
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Command and Scripting Interpreter: PowerShell
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4004
-
-
C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exeC:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2776
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F4⤵
- Creates scheduled task(s)
PID:2856
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
281KB
MD5d98e33b66343e7c96158444127a117f6
SHA1bb716c5509a2bf345c6c1152f6e3e1452d39d50d
SHA2565de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1
SHA512705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log
Filesize2KB
MD53d086a433708053f9bf9523e1d87a4e8
SHA1b3ab5d4f282a4c8fe8c3005b8a557ed5a0e37f28
SHA2566f8fd1b8d9788ad54eaeee329232187e24b7b43393a01aeba2d6e9675231fb69
SHA512931ae42b4c68a4507ff2342332b08eb407050d47cf4176137ea022d0f6e513c689e998445a04c6d18d4877391705c586bfce0234632b898d41aaed0957996dfd
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD52b37e918a9f2ceb9d72c3bafb3349b16
SHA18121e7804d00c259de742d8d9dd5c51694d2ab2f
SHA256648084812aa2970dce6cb56d8814a7de59fd9a528d6e828279ead9f633d13237
SHA51208e2ce6aa3b19135c0bfc34c1dd1b8c5e3f5bd9d89a678b97873edf02038c81f7b13eb2c7c5396b4c6b5446804cd5eb4f7693bc742af08d5553e09130363c913
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD589fc31abe057b92a7eef5d786642a24a
SHA13ecf59b9675c96cc3d81231ebd6947da58be5698
SHA25645c4fe01c72e5e918f98003cd11bc582260ff3055dcded550edb4d07dee4657c
SHA512a2efd14a2402c91e5cfa5f7338fb51259ebea6d4176eca51d66116e49db95a7ddb93e7239f8eb8825e0ff85e1f156762e37bbe43acf2e8dc4cf8ccc22fba214a
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5686ff1c4c4bac1fad94704fb1c8df798
SHA136158624e63d95780ebd877787e60965c631ee5e
SHA256f9b3e305952023b538d9d49179ae480f5ca08c7aa7ae10bd678244657aa3cba8
SHA5124b4ef5b845fd009c9d8a1b61f4fcbbf42a2c3de14fcb4aca390d33f9689a5dcd67536f6a47c6ee250eadc761ecedd8c626c8d15d1712a68146bf09b4f90578a2
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD58720aab4f22465b5530d05aa4c3a0697
SHA1e7916dafd242377864e1f39244ff751808de4e4e
SHA256c25d045ae95cf5631dfb4bd30df98597c5323f71119f6b0a24f5bf7a68885e26
SHA5120f69f5b3fd9b653f6bbda1785d539042dcaf7453656d0f16f207e8a3f29ed9ac4e4fe1037460b750cc5a55bd2f1760b2819622cf49d60f133d027eacd8486d4a
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5996edbd40edea1ba0706d44d6984255b
SHA123ea9d2b2ab6e64e28daa32091d511327964dd5d
SHA2564b787a0ca0d17eab63a587d68c36ac7dd076c02124587473cd5c49e65cae4906
SHA5125a21c7d1ef7ca63f276b2829eafdf8f43285eae33e3571175b925d09821d0f2e04f1f012f6c632248aa578bd309915684ca8e2ef52d87e37091ac9a1e9e20f4d
-
Filesize
4.1MB
MD573721887b1e40471f291a80a58d66ff0
SHA16066a9a7b39677b25ac347cf911abc4d68cc75e0
SHA256af41907dde7a5370a373b5fe8d9f3852d57d1002a787ca4b4382cf713198f297
SHA512df281d4c2f9ef8812aec35ddafed222da487ee0af69b4be95578a2680ab562b9ce95c935eddfd1358c0b447d750be3c6184a4d3fd9fdc5954f2f228d9b948e8a