Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26/05/2024, 19:53

General

  • Target

    d90f7a8f324b5066c91e22253ee5b650_NeikiAnalytics.exe

  • Size

    211KB

  • MD5

    d90f7a8f324b5066c91e22253ee5b650

  • SHA1

    21fd4bdf7c9e43cd7843456c5d5ed0c7ec69fa12

  • SHA256

    f6397e60575b7cbf356aefe51a043c7e711d577cbfa30e9f47ac890ae29af46f

  • SHA512

    e9ef2d384a0b6b605e40f77f015f2afbe12a6218a0b985abf6b4a126354711ebdf742ceedb771f0b611e91faea6df022b99f5b6bfebd64062b25c4d535298118

  • SSDEEP

    3072:JD6Xtx68yygRBE52mxkEOHLRMpZ4deth8PEAjAfIbAYGPhz6sPJBInxZqOy:Jh8cBzHLRMpZ4d1Zy

Score
10/10

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 2 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Modifies Installed Components in the registry 2 TTPs 8 IoCs
  • Executes dropped EXE 4 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Drops file in System32 directory 1 IoCs
  • Drops file in Windows directory 5 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 2 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d90f7a8f324b5066c91e22253ee5b650_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\d90f7a8f324b5066c91e22253ee5b650_NeikiAnalytics.exe"
    1⤵
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1540
    • \??\c:\windows\userinit.exe
      c:\windows\userinit.exe
      2⤵
      • Modifies WinLogon for persistence
      • Modifies visiblity of hidden/system files in Explorer
      • Modifies Installed Components in the registry
      • Executes dropped EXE
      • Adds Run key to start application
      • Drops file in System32 directory
      • Drops file in Windows directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:4188
      • \??\c:\windows\spoolsw.exe
        c:\windows\spoolsw.exe SE
        3⤵
        • Executes dropped EXE
        • Drops file in Windows directory
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1496
        • \??\c:\windows\swchost.exe
          c:\windows\swchost.exe
          4⤵
          • Modifies WinLogon for persistence
          • Modifies visiblity of hidden/system files in Explorer
          • Modifies Installed Components in the registry
          • Executes dropped EXE
          • Adds Run key to start application
          • Drops file in Windows directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: GetForegroundWindowSpam
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:3456
          • \??\c:\windows\spoolsw.exe
            c:\windows\spoolsw.exe PR
            5⤵
            • Executes dropped EXE
            • Suspicious use of SetWindowsHookEx
            PID:1848

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\mrsys.exe

    Filesize

    211KB

    MD5

    47ad335158ea604089e6a09d32fdbba6

    SHA1

    fb038c19b718e42585f26df25a49ab0b1d66d28e

    SHA256

    cc314b9e8302937a767409f15e209bf4a2c5f5945bed6b65e82d6759c74ffc7b

    SHA512

    3a4ee30dc7d5191aa7dadc2bbba5926f6a0f5beaf9b43ccb3804c0b74261d4c2eb7c1d5be23aaa97d0d11e2411950655bdd0fa906328a31c594fbd68409f81f9

  • C:\Windows\spoolsw.exe

    Filesize

    211KB

    MD5

    3596e0171b7c1d93ba35d921ae0bd51c

    SHA1

    c60b918369683542103c7325b39275144d060313

    SHA256

    5966313ac03b78f9f66d66151b361b17cba1a0a3bcb5bfdf92d4c1a4fe7991b2

    SHA512

    9d251550c2c86c67de20707883aae19c0430398aa6ad965600105d200381d933ea13b7273b78e10d4153b4d659cda0bd41ab7a7aa9872a2f6e1206133b5bdb08

  • C:\Windows\swchost.exe

    Filesize

    211KB

    MD5

    c9a9ca0f465869c9940e1e34ee3a57dd

    SHA1

    4a6a5735d711466145d8c19761cd72b0ff936aa4

    SHA256

    d12876c8d25ee8f936c40bd57b64d58fcf30acc1b4d195724a7eaf03b169c067

    SHA512

    d80f618360038cb18c27e345360a43cb1c3a3ca3df618e79c4acbbab6566eb280b25ad9edf518638ccfc0b1d41376750daeb68d4cd1f075c0f95228f4b59eaef

  • C:\Windows\userinit.exe

    Filesize

    211KB

    MD5

    c3ccc3652837061bc69d5dd9eb31bc19

    SHA1

    33a8a88d2dfaa9157b81fbeccbb27b7930e5c315

    SHA256

    adc8a379d48a1a2b294d1d1d7bd4a25bab0cd5496bf16e01da331371a5cbe552

    SHA512

    5b1cc7714caf1c14cda964aaf536fad17f78acd9f51177874d2cfcb8204b536cad6bc64f2f16f9a9cb13a2d2c8c5f3ccb54655b6c856be4bc38a871c74a2875e