Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
26-05-2024 03:36
Static task
static1
Behavioral task
behavioral1
Sample
5cadd59273a0df5771e57925e87c6d70_NeikiAnalytics.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
5cadd59273a0df5771e57925e87c6d70_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
5cadd59273a0df5771e57925e87c6d70_NeikiAnalytics.exe
-
Size
358KB
-
MD5
5cadd59273a0df5771e57925e87c6d70
-
SHA1
b369ac660ee00394cc77faa1a08df3fe7eb9f864
-
SHA256
7cc097c51fb20fe4c8f1e07fa8b0bfb4b5148be028bd0afde36016527e831e79
-
SHA512
b1247c809bae349e7b018a55b6a06669b23a69b4c757822d0df12689d8c10af645173d6592ad3c3871b027ea2ee19dae748165e29602a36572318547e00f7a3c
-
SSDEEP
6144:HrRcmWhxR1arY/PbgmFOabPIIBhJXAv7eTY9suz0xhttGSrDKE3KIQvSka8bj:HmmWTR1arYnEKosuzY34CZ3DQvSkN
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3232 svchost.exe -
Modifies WinLogon 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\7247fe48 = "C:\\Windows\\apppatch\\svchost.exe" 5cadd59273a0df5771e57925e87c6d70_NeikiAnalytics.exe -
Drops file in Program Files directory 36 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Windows Defender\wntdll.pdb svchost.exe File created C:\Program Files (x86)\Windows Defender\galyqaz.com svchost.exe File created C:\Program Files (x86)\Windows Defender\lyxynyx.com svchost.exe File created C:\Program Files (x86)\Windows Defender\qetyhyg.com svchost.exe File created C:\Program Files (x86)\Windows Defender\lygyvuj.com svchost.exe File opened for modification C:\Program Files (x86)\Windows Defender\dll\wkernelbase.pdb svchost.exe File opened for modification C:\Program Files (x86)\Windows Defender\dll\WinSCard.pdb svchost.exe File created C:\Program Files (x86)\Windows Defender\vonypom.com svchost.exe File created C:\Program Files (x86)\Windows Defender\pupycag.com svchost.exe File created C:\Program Files (x86)\Windows Defender\gadyciz.com svchost.exe File created C:\Program Files (x86)\Windows Defender\qegyval.com svchost.exe File opened for modification C:\Program Files (x86)\Windows Defender\symbols\dll\wkernelbase.pdb svchost.exe File opened for modification C:\Program Files (x86)\Windows Defender\wkernel32.pdb svchost.exe File created C:\Program Files (x86)\Windows Defender\qetyfuv.com svchost.exe File opened for modification C:\Program Files (x86)\Windows Defender\wrpcrt4.pdb svchost.exe File opened for modification C:\Program Files (x86)\Windows Defender\dll\wrpcrt4.pdb svchost.exe File opened for modification C:\Program Files (x86)\Windows Defender\symbols\dll\wrpcrt4.pdb svchost.exe File created C:\Program Files (x86)\Windows Defender\vocyzit.com svchost.exe File created C:\Program Files (x86)\Windows Defender\pupydeq.com svchost.exe File opened for modification C:\Program Files (x86)\Windows Defender\WinSCard.pdb svchost.exe File created C:\Program Files (x86)\Windows Defender\galynuh.com svchost.exe File opened for modification C:\Program Files (x86)\Windows Defender\winsta.pdb svchost.exe File opened for modification C:\Program Files (x86)\Windows Defender\symbols\DLL\wkernel32.pdb svchost.exe File opened for modification C:\Program Files (x86)\Windows Defender\dll\wntdll.pdb svchost.exe File opened for modification C:\Program Files (x86)\Windows Defender\DLL\wkernel32.pdb svchost.exe File created C:\Program Files (x86)\Windows Defender\vofycot.com svchost.exe File opened for modification C:\Program Files (x86)\Windows Defender\dll\winsta.pdb svchost.exe File opened for modification C:\Program Files (x86)\Windows Defender\symbols\dll\winsta.pdb svchost.exe File opened for modification C:\Program Files (x86)\Windows Defender\symbols\dll\WinSCard.pdb svchost.exe File opened for modification C:\Program Files (x86)\Windows Defender\symbols\dll\wntdll.pdb svchost.exe File created C:\Program Files (x86)\Windows Defender\lymyxid.com svchost.exe File created C:\Program Files (x86)\Windows Defender\gahyqah.com svchost.exe File created C:\Program Files (x86)\Windows Defender\gatyfus.com svchost.exe File created C:\Program Files (x86)\Windows Defender\qexyhuv.com svchost.exe File created C:\Program Files (x86)\Windows Defender\gahyhiz.com svchost.exe File opened for modification C:\Program Files (x86)\Windows Defender\wkernelbase.pdb svchost.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\apppatch\svchost.exe 5cadd59273a0df5771e57925e87c6d70_NeikiAnalytics.exe File opened for modification C:\Windows\apppatch\svchost.exe 5cadd59273a0df5771e57925e87c6d70_NeikiAnalytics.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000_Classes\Local Settings\MuiCache svchost.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3232 svchost.exe 3232 svchost.exe 3232 svchost.exe 3232 svchost.exe 3232 svchost.exe 3232 svchost.exe 3232 svchost.exe 3232 svchost.exe 3232 svchost.exe 3232 svchost.exe 3232 svchost.exe 3232 svchost.exe 3232 svchost.exe 3232 svchost.exe 3232 svchost.exe 3232 svchost.exe 3232 svchost.exe 3232 svchost.exe 3232 svchost.exe 3232 svchost.exe 3232 svchost.exe 3232 svchost.exe 3232 svchost.exe 3232 svchost.exe 3232 svchost.exe 3232 svchost.exe 3232 svchost.exe 3232 svchost.exe 3232 svchost.exe 3232 svchost.exe 3232 svchost.exe 3232 svchost.exe 3232 svchost.exe 3232 svchost.exe 3232 svchost.exe 3232 svchost.exe 3232 svchost.exe 3232 svchost.exe 3232 svchost.exe 3232 svchost.exe 3232 svchost.exe 3232 svchost.exe 3232 svchost.exe 3232 svchost.exe 3232 svchost.exe 3232 svchost.exe 3232 svchost.exe 3232 svchost.exe 3232 svchost.exe 3232 svchost.exe 3232 svchost.exe 3232 svchost.exe 3232 svchost.exe 3232 svchost.exe 3232 svchost.exe 3232 svchost.exe 3232 svchost.exe 3232 svchost.exe 3232 svchost.exe 3232 svchost.exe 3232 svchost.exe 3232 svchost.exe 3232 svchost.exe 3232 svchost.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1636 5cadd59273a0df5771e57925e87c6d70_NeikiAnalytics.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeSecurityPrivilege 1636 5cadd59273a0df5771e57925e87c6d70_NeikiAnalytics.exe Token: SeSecurityPrivilege 1636 5cadd59273a0df5771e57925e87c6d70_NeikiAnalytics.exe Token: SeSecurityPrivilege 3232 svchost.exe Token: SeSecurityPrivilege 3232 svchost.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1636 wrote to memory of 3232 1636 5cadd59273a0df5771e57925e87c6d70_NeikiAnalytics.exe 82 PID 1636 wrote to memory of 3232 1636 5cadd59273a0df5771e57925e87c6d70_NeikiAnalytics.exe 82 PID 1636 wrote to memory of 3232 1636 5cadd59273a0df5771e57925e87c6d70_NeikiAnalytics.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\5cadd59273a0df5771e57925e87c6d70_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\5cadd59273a0df5771e57925e87c6d70_NeikiAnalytics.exe"1⤵
- Modifies WinLogon
- Drops file in Windows directory
- Suspicious behavior: RenamesItself
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1636 -
C:\Windows\apppatch\svchost.exe"C:\Windows\apppatch\svchost.exe"2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3232
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
168B
MD5d57e3a550060f85d44a175139ea23021
SHA12c5cb3428a322c9709a34d04dd86fe7628f8f0a6
SHA25643edf068d34276e8ade4113d4d7207de19fc98a2ae1c07298e593edae2a8774c
SHA5120364fe6a010fce7a3f4a6344c84468c64b20fd131f3160fc649db78f1075ba52d8a1c4496e50dbe27c357e01ee52e94cdcda8f7927cba28d5f2f45b9da690063
-
Filesize
358KB
MD50e976355b87064cfbc87c4046a06c539
SHA1208281487bbbd011634f3a88954dae15faa892c8
SHA25694e0dd809308c5c4009ba86bfbcb78bf8dcc672f0ad3e2ba11d3f558598fb749
SHA5121a8cb4f2560332d6301d70c1a43a388f9e30783fc7cb6b9af63429803259db66d2caf7d350fee2d9b9e3130d875092efab896f35a6f95869df7b7967d4594bf7