Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
27-05-2024 11:46
Static task
static1
Behavioral task
behavioral1
Sample
a991cbd4b23c71a49c53ad40295e36a0_NeikiAnalytics.dll
Resource
win7-20240508-en
General
-
Target
a991cbd4b23c71a49c53ad40295e36a0_NeikiAnalytics.dll
-
Size
120KB
-
MD5
a991cbd4b23c71a49c53ad40295e36a0
-
SHA1
a31c8d2b2ee268a8087f5eda4bc0871b96214206
-
SHA256
c975d4b915110a5d7fa6a1dea1a00e12da00aa95183a44881e2a37a62972b326
-
SHA512
32f228067eb726044a979f10597b112cc0565988623130634f1bfbbc262543b72d2adbae999a3f8a73e81d0f5911c2ec5a763197536d18a4cf3bace8704cf66e
-
SSDEEP
3072:J1Y9Q+ttAcA333UIdsWpc9xoOowK+YFpv:rYSrHdsW69xoOowKFz
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Signatures
-
Modifies firewall policy service 2 TTPs 6 IoCs
Processes:
f762221.exef763dbc.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" f762221.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" f762221.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "1" f762221.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" f763dbc.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" f763dbc.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "1" f763dbc.exe -
Processes:
f763dbc.exef762221.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" f763dbc.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" f762221.exe -
Processes:
f762221.exef763dbc.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" f762221.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" f762221.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" f762221.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" f762221.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" f763dbc.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" f763dbc.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" f762221.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" f762221.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" f763dbc.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" f763dbc.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" f763dbc.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" f763dbc.exe -
Executes dropped EXE 3 IoCs
Processes:
f762221.exef7623e5.exef763dbc.exepid process 2188 f762221.exe 2536 f7623e5.exe 2948 f763dbc.exe -
Loads dropped DLL 6 IoCs
Processes:
rundll32.exepid process 2988 rundll32.exe 2988 rundll32.exe 2988 rundll32.exe 2988 rundll32.exe 2988 rundll32.exe 2988 rundll32.exe -
Processes:
resource yara_rule behavioral1/memory/2188-14-0x00000000005B0000-0x000000000166A000-memory.dmp upx behavioral1/memory/2188-15-0x00000000005B0000-0x000000000166A000-memory.dmp upx behavioral1/memory/2188-19-0x00000000005B0000-0x000000000166A000-memory.dmp upx behavioral1/memory/2188-45-0x00000000005B0000-0x000000000166A000-memory.dmp upx behavioral1/memory/2188-20-0x00000000005B0000-0x000000000166A000-memory.dmp upx behavioral1/memory/2188-17-0x00000000005B0000-0x000000000166A000-memory.dmp upx behavioral1/memory/2188-22-0x00000000005B0000-0x000000000166A000-memory.dmp upx behavioral1/memory/2188-21-0x00000000005B0000-0x000000000166A000-memory.dmp upx behavioral1/memory/2188-18-0x00000000005B0000-0x000000000166A000-memory.dmp upx behavioral1/memory/2188-16-0x00000000005B0000-0x000000000166A000-memory.dmp upx behavioral1/memory/2188-62-0x00000000005B0000-0x000000000166A000-memory.dmp upx behavioral1/memory/2188-63-0x00000000005B0000-0x000000000166A000-memory.dmp upx behavioral1/memory/2188-64-0x00000000005B0000-0x000000000166A000-memory.dmp upx behavioral1/memory/2188-65-0x00000000005B0000-0x000000000166A000-memory.dmp upx behavioral1/memory/2188-66-0x00000000005B0000-0x000000000166A000-memory.dmp upx behavioral1/memory/2188-81-0x00000000005B0000-0x000000000166A000-memory.dmp upx behavioral1/memory/2188-99-0x00000000005B0000-0x000000000166A000-memory.dmp upx behavioral1/memory/2188-100-0x00000000005B0000-0x000000000166A000-memory.dmp upx behavioral1/memory/2188-103-0x00000000005B0000-0x000000000166A000-memory.dmp upx behavioral1/memory/2188-104-0x00000000005B0000-0x000000000166A000-memory.dmp upx behavioral1/memory/2188-106-0x00000000005B0000-0x000000000166A000-memory.dmp upx behavioral1/memory/2188-108-0x00000000005B0000-0x000000000166A000-memory.dmp upx behavioral1/memory/2188-149-0x00000000005B0000-0x000000000166A000-memory.dmp upx behavioral1/memory/2948-162-0x0000000000970000-0x0000000001A2A000-memory.dmp upx behavioral1/memory/2948-200-0x0000000000970000-0x0000000001A2A000-memory.dmp upx -
Processes:
f762221.exef763dbc.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" f762221.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\Svc f762221.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" f763dbc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\Svc f763dbc.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" f762221.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" f763dbc.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" f763dbc.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" f763dbc.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" f763dbc.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" f762221.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" f763dbc.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" f762221.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" f762221.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" f762221.exe -
Processes:
f762221.exef763dbc.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" f762221.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" f763dbc.exe -
Enumerates connected drives 3 TTPs 13 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
f762221.exef763dbc.exedescription ioc process File opened (read-only) \??\I: f762221.exe File opened (read-only) \??\J: f762221.exe File opened (read-only) \??\K: f762221.exe File opened (read-only) \??\L: f762221.exe File opened (read-only) \??\M: f762221.exe File opened (read-only) \??\G: f762221.exe File opened (read-only) \??\H: f762221.exe File opened (read-only) \??\O: f762221.exe File opened (read-only) \??\E: f762221.exe File opened (read-only) \??\P: f762221.exe File opened (read-only) \??\G: f763dbc.exe File opened (read-only) \??\N: f762221.exe File opened (read-only) \??\E: f763dbc.exe -
Drops file in Windows directory 3 IoCs
Processes:
f762221.exef763dbc.exedescription ioc process File created C:\Windows\f7622ad f762221.exe File opened for modification C:\Windows\SYSTEM.INI f762221.exe File created C:\Windows\f7672cf f763dbc.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
Processes:
f762221.exef763dbc.exepid process 2188 f762221.exe 2188 f762221.exe 2948 f763dbc.exe -
Suspicious use of AdjustPrivilegeToken 41 IoCs
Processes:
f762221.exef763dbc.exedescription pid process Token: SeDebugPrivilege 2188 f762221.exe Token: SeDebugPrivilege 2188 f762221.exe Token: SeDebugPrivilege 2188 f762221.exe Token: SeDebugPrivilege 2188 f762221.exe Token: SeDebugPrivilege 2188 f762221.exe Token: SeDebugPrivilege 2188 f762221.exe Token: SeDebugPrivilege 2188 f762221.exe Token: SeDebugPrivilege 2188 f762221.exe Token: SeDebugPrivilege 2188 f762221.exe Token: SeDebugPrivilege 2188 f762221.exe Token: SeDebugPrivilege 2188 f762221.exe Token: SeDebugPrivilege 2188 f762221.exe Token: SeDebugPrivilege 2188 f762221.exe Token: SeDebugPrivilege 2188 f762221.exe Token: SeDebugPrivilege 2188 f762221.exe Token: SeDebugPrivilege 2188 f762221.exe Token: SeDebugPrivilege 2188 f762221.exe Token: SeDebugPrivilege 2188 f762221.exe Token: SeDebugPrivilege 2188 f762221.exe Token: SeDebugPrivilege 2188 f762221.exe Token: SeDebugPrivilege 2188 f762221.exe Token: SeDebugPrivilege 2948 f763dbc.exe Token: SeDebugPrivilege 2948 f763dbc.exe Token: SeDebugPrivilege 2948 f763dbc.exe Token: SeDebugPrivilege 2948 f763dbc.exe Token: SeDebugPrivilege 2948 f763dbc.exe Token: SeDebugPrivilege 2948 f763dbc.exe Token: SeDebugPrivilege 2948 f763dbc.exe Token: SeDebugPrivilege 2948 f763dbc.exe Token: SeDebugPrivilege 2948 f763dbc.exe Token: SeDebugPrivilege 2948 f763dbc.exe Token: SeDebugPrivilege 2948 f763dbc.exe Token: SeDebugPrivilege 2948 f763dbc.exe Token: SeDebugPrivilege 2948 f763dbc.exe Token: SeDebugPrivilege 2948 f763dbc.exe Token: SeDebugPrivilege 2948 f763dbc.exe Token: SeDebugPrivilege 2948 f763dbc.exe Token: SeDebugPrivilege 2948 f763dbc.exe Token: SeDebugPrivilege 2948 f763dbc.exe Token: SeDebugPrivilege 2948 f763dbc.exe Token: SeDebugPrivilege 2948 f763dbc.exe -
Suspicious use of WriteProcessMemory 36 IoCs
Processes:
rundll32.exerundll32.exef762221.exef763dbc.exedescription pid process target process PID 1444 wrote to memory of 2988 1444 rundll32.exe rundll32.exe PID 1444 wrote to memory of 2988 1444 rundll32.exe rundll32.exe PID 1444 wrote to memory of 2988 1444 rundll32.exe rundll32.exe PID 1444 wrote to memory of 2988 1444 rundll32.exe rundll32.exe PID 1444 wrote to memory of 2988 1444 rundll32.exe rundll32.exe PID 1444 wrote to memory of 2988 1444 rundll32.exe rundll32.exe PID 1444 wrote to memory of 2988 1444 rundll32.exe rundll32.exe PID 2988 wrote to memory of 2188 2988 rundll32.exe f762221.exe PID 2988 wrote to memory of 2188 2988 rundll32.exe f762221.exe PID 2988 wrote to memory of 2188 2988 rundll32.exe f762221.exe PID 2988 wrote to memory of 2188 2988 rundll32.exe f762221.exe PID 2188 wrote to memory of 1108 2188 f762221.exe taskhost.exe PID 2188 wrote to memory of 1172 2188 f762221.exe Dwm.exe PID 2188 wrote to memory of 1200 2188 f762221.exe Explorer.EXE PID 2188 wrote to memory of 2408 2188 f762221.exe DllHost.exe PID 2188 wrote to memory of 1444 2188 f762221.exe rundll32.exe PID 2188 wrote to memory of 2988 2188 f762221.exe rundll32.exe PID 2188 wrote to memory of 2988 2188 f762221.exe rundll32.exe PID 2988 wrote to memory of 2536 2988 rundll32.exe f7623e5.exe PID 2988 wrote to memory of 2536 2988 rundll32.exe f7623e5.exe PID 2988 wrote to memory of 2536 2988 rundll32.exe f7623e5.exe PID 2988 wrote to memory of 2536 2988 rundll32.exe f7623e5.exe PID 2988 wrote to memory of 2948 2988 rundll32.exe f763dbc.exe PID 2988 wrote to memory of 2948 2988 rundll32.exe f763dbc.exe PID 2988 wrote to memory of 2948 2988 rundll32.exe f763dbc.exe PID 2988 wrote to memory of 2948 2988 rundll32.exe f763dbc.exe PID 2188 wrote to memory of 1108 2188 f762221.exe taskhost.exe PID 2188 wrote to memory of 1172 2188 f762221.exe Dwm.exe PID 2188 wrote to memory of 1200 2188 f762221.exe Explorer.EXE PID 2188 wrote to memory of 2536 2188 f762221.exe f7623e5.exe PID 2188 wrote to memory of 2536 2188 f762221.exe f7623e5.exe PID 2188 wrote to memory of 2948 2188 f762221.exe f763dbc.exe PID 2188 wrote to memory of 2948 2188 f762221.exe f763dbc.exe PID 2948 wrote to memory of 1108 2948 f763dbc.exe taskhost.exe PID 2948 wrote to memory of 1172 2948 f763dbc.exe Dwm.exe PID 2948 wrote to memory of 1200 2948 f763dbc.exe Explorer.EXE -
System policy modification 1 TTPs 2 IoCs
Processes:
f762221.exef763dbc.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" f762221.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" f763dbc.exe
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1108
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1172
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1200
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\a991cbd4b23c71a49c53ad40295e36a0_NeikiAnalytics.dll,#12⤵
- Suspicious use of WriteProcessMemory
PID:1444 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\a991cbd4b23c71a49c53ad40295e36a0_NeikiAnalytics.dll,#13⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2988 -
C:\Users\Admin\AppData\Local\Temp\f762221.exeC:\Users\Admin\AppData\Local\Temp\f762221.exe4⤵
- Modifies firewall policy service
- UAC bypass
- Windows security bypass
- Executes dropped EXE
- Windows security modification
- Checks whether UAC is enabled
- Enumerates connected drives
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2188
-
-
C:\Users\Admin\AppData\Local\Temp\f7623e5.exeC:\Users\Admin\AppData\Local\Temp\f7623e5.exe4⤵
- Executes dropped EXE
PID:2536
-
-
C:\Users\Admin\AppData\Local\Temp\f763dbc.exeC:\Users\Admin\AppData\Local\Temp\f763dbc.exe4⤵
- Modifies firewall policy service
- UAC bypass
- Windows security bypass
- Executes dropped EXE
- Windows security modification
- Checks whether UAC is enabled
- Enumerates connected drives
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2948
-
-
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:2408
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
3Disable or Modify Tools
3Modify Registry
5Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
257B
MD569747aa72c55455f90c97d173afba4d9
SHA1897c35b057d20d2d948a64874189389f74a799d5
SHA256f6a27bf39d3303b5078cb41ae8632e2b2a85c7c17cb7ba148f2845da8c6b7fe0
SHA512adab1becad24e6d9d986a9f922ae9f94c586ec003499877049d5de5639c6a540e699785a61eb8859b88c32977555a337695ec2c45ee735846e5e555b38cf5753
-
Filesize
97KB
MD503d75de4ca56a1210fb9cda623a8e0f9
SHA12744d74c3f2dce33f9791bfd1e0ce9676cba0970
SHA2567e0cdd7fb3eb8e885582f48b3e418e55aa928e12f121b9abb7025c9597cb124a
SHA512677f0ab8f79bcf57cdbae2a76e70190c1220f489cd214141f9e6f9dfd129cb12498a3d43dccd2bbc98b444f767336e94bf0e25c1331b2dc540043b5929fc45d0