Analysis
-
max time kernel
142s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
26-05-2024 22:01
Behavioral task
behavioral1
Sample
0625209d9c999daa22861f91f5c6f810_NeikiAnalytics.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
0625209d9c999daa22861f91f5c6f810_NeikiAnalytics.exe
Resource
win10v2004-20240226-en
General
-
Target
0625209d9c999daa22861f91f5c6f810_NeikiAnalytics.exe
-
Size
383KB
-
MD5
0625209d9c999daa22861f91f5c6f810
-
SHA1
0439137d3dc9ad4f9f03fddac315ec5d69039e0a
-
SHA256
74c34db23b9043d62022ca9725e641c655e19f2dccbdfdcebb3c242ea6e13162
-
SHA512
c4cb56ad588cdfc06075ca21fbe470ae792f37a909fdb7b4c1ff2aac114a5e37398eb23272dbff6be014558e9c1b281fb3ee013d92ba84a9a26b48ebb0104a1c
-
SSDEEP
6144:Cd5afqlpDHA9NtTV3okaEXnMhr1gg5YdEV1l6RXMAcfBOWq3oXY/LBFV7UMXKb3w:Cd5acTP+n25J1sJWWLBF2MXKb5Ol7
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2456 svchost.exe -
resource yara_rule behavioral2/memory/2132-0-0x0000000000400000-0x000000000049D000-memory.dmp upx behavioral2/memory/2132-1-0x0000000000400000-0x000000000049D000-memory.dmp upx behavioral2/files/0x000b00000001ea83-11.dat upx behavioral2/memory/2456-12-0x0000000000400000-0x000000000049D000-memory.dmp upx behavioral2/memory/2132-14-0x0000000000400000-0x000000000049D000-memory.dmp upx behavioral2/memory/2456-22-0x0000000000400000-0x000000000049D000-memory.dmp upx -
Modifies WinLogon 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\26f99099 = "C:\\Windows\\apppatch\\svchost.exe" 0625209d9c999daa22861f91f5c6f810_NeikiAnalytics.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\apppatch\svchost.exe 0625209d9c999daa22861f91f5c6f810_NeikiAnalytics.exe File opened for modification C:\Windows\apppatch\svchost.exe 0625209d9c999daa22861f91f5c6f810_NeikiAnalytics.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 1864 2456 WerFault.exe 91 -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\Local Settings\MuiCache svchost.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2456 svchost.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2132 0625209d9c999daa22861f91f5c6f810_NeikiAnalytics.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeSecurityPrivilege 2132 0625209d9c999daa22861f91f5c6f810_NeikiAnalytics.exe Token: SeSecurityPrivilege 2132 0625209d9c999daa22861f91f5c6f810_NeikiAnalytics.exe Token: SeSecurityPrivilege 2456 svchost.exe Token: SeSecurityPrivilege 2456 svchost.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2132 wrote to memory of 2456 2132 0625209d9c999daa22861f91f5c6f810_NeikiAnalytics.exe 91 PID 2132 wrote to memory of 2456 2132 0625209d9c999daa22861f91f5c6f810_NeikiAnalytics.exe 91 PID 2132 wrote to memory of 2456 2132 0625209d9c999daa22861f91f5c6f810_NeikiAnalytics.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\0625209d9c999daa22861f91f5c6f810_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\0625209d9c999daa22861f91f5c6f810_NeikiAnalytics.exe"1⤵
- Modifies WinLogon
- Drops file in Windows directory
- Suspicious behavior: RenamesItself
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2132 -
C:\Windows\apppatch\svchost.exe"C:\Windows\apppatch\svchost.exe"2⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2456 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2456 -s 7003⤵
- Program crash
PID:1864
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 2456 -ip 24561⤵PID:2192
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=1412 --field-trial-handle=2676,i,447940133669489189,1353734109898858672,262144 --variations-seed-version /prefetch:81⤵PID:1652
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
383KB
MD52a4907891782b293001123017b95592c
SHA1326f04edfd0195d9150ea26e800e3ff8502e42b3
SHA2567410d295758e79b064c4aefd7ea3bc34ecb10e3e4f973c6eb878b0154cc63d7c
SHA5128770152583b5c82c28db93735eabccf28931f0a9164192ec623e6954c026fd174cffd29c6927a70a5d830f8f6ceb762c8e5c4cff49744b380108530968839a12