Analysis

  • max time kernel
    18s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    27/05/2024, 12:52

General

  • Target

    013fa06d9f9a9034dd6fdacf49802060_NeikiAnalytics.exe

  • Size

    292KB

  • MD5

    013fa06d9f9a9034dd6fdacf49802060

  • SHA1

    c581bd0c0d661a2bf468598b31363dadd93066a3

  • SHA256

    e9f2e9ba0c5c8958e550481e1f2f850204d7882f04bd7414c254775c26271877

  • SHA512

    ae2fffc218c202052aff5bc7643fd92bd6dfac14c71169d05eefa82121d262ef854bf5aab5d7b87d21c58371f13bb0ac248ade75a67baada6767c08628c63ae1

  • SSDEEP

    6144:FvEI2U+T6i5LirrllHy4HUcMQY6s5oG7vdzYbXe:lEIN+T5xYrllrU7QY6a9zYq

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

http://www.klkjwre9fqwieluoi.info/

http://kukutrustnet777888.info/

Signatures

  • Modifies WinLogon for persistence 2 TTPs 2 IoCs
  • Modifies firewall policy service 2 TTPs 6 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Sality

    Sality is backdoor written in C++, first discovered in 2003.

  • UAC bypass 3 TTPs 2 IoCs
  • Windows security bypass 2 TTPs 12 IoCs
  • Modifies Installed Components in the registry 2 TTPs 5 IoCs
  • Deletes itself 2 IoCs
  • Executes dropped EXE 8 IoCs
  • Loads dropped DLL 16 IoCs
  • UPX packed file 38 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Windows security modification 2 TTPs 14 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks whether UAC is enabled 1 TTPs 2 IoCs
  • Enumerates connected drives 3 TTPs 3 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Windows directory 6 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of SetWindowsHookEx 24 IoCs
  • Suspicious use of WriteProcessMemory 58 IoCs
  • System policy modification 1 TTPs 2 IoCs

Processes

  • C:\Windows\system32\taskhost.exe
    "taskhost.exe"
    1⤵
      PID:1108
    • C:\Windows\system32\Dwm.exe
      "C:\Windows\system32\Dwm.exe"
      1⤵
        PID:1160
      • C:\Windows\Explorer.EXE
        C:\Windows\Explorer.EXE
        1⤵
          PID:1256
          • C:\Users\Admin\AppData\Local\Temp\013fa06d9f9a9034dd6fdacf49802060_NeikiAnalytics.exe
            "C:\Users\Admin\AppData\Local\Temp\013fa06d9f9a9034dd6fdacf49802060_NeikiAnalytics.exe"
            2⤵
            • Modifies firewall policy service
            • UAC bypass
            • Windows security bypass
            • Loads dropped DLL
            • Windows security modification
            • Checks whether UAC is enabled
            • Drops file in Windows directory
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            • System policy modification
            PID:2368
            • \??\c:\windows\system\explorer.exe
              c:\windows\system\explorer.exe
              3⤵
              • Modifies WinLogon for persistence
              • Modifies firewall policy service
              • Modifies visiblity of hidden/system files in Explorer
              • UAC bypass
              • Windows security bypass
              • Modifies Installed Components in the registry
              • Deletes itself
              • Executes dropped EXE
              • Loads dropped DLL
              • Windows security modification
              • Adds Run key to start application
              • Checks whether UAC is enabled
              • Enumerates connected drives
              • Drops file in Windows directory
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious behavior: GetForegroundWindowSpam
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of SetWindowsHookEx
              • Suspicious use of WriteProcessMemory
              • System policy modification
              PID:2804
              • \??\c:\windows\system\spoolsv.exe
                c:\windows\system\spoolsv.exe SE
                4⤵
                • Executes dropped EXE
                • Loads dropped DLL
                • Drops file in Windows directory
                • Suspicious use of SetWindowsHookEx
                • Suspicious use of WriteProcessMemory
                PID:2772
                • \??\c:\windows\system\svchost.exe
                  c:\windows\system\svchost.exe
                  5⤵
                  • Modifies WinLogon for persistence
                  • Modifies visiblity of hidden/system files in Explorer
                  • Modifies Installed Components in the registry
                  • Executes dropped EXE
                  • Loads dropped DLL
                  • Adds Run key to start application
                  • Drops file in Windows directory
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious behavior: GetForegroundWindowSpam
                  • Suspicious use of SetWindowsHookEx
                  • Suspicious use of WriteProcessMemory
                  PID:2444
                  • \??\c:\windows\system\spoolsv.exe
                    c:\windows\system\spoolsv.exe PR
                    6⤵
                    • Executes dropped EXE
                    • Suspicious use of SetWindowsHookEx
                    PID:1420
                  • C:\Windows\SysWOW64\at.exe
                    at 12:54 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe
                    6⤵
                      PID:2620
          • C:\Windows\system32\DllHost.exe
            C:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}
            1⤵
              PID:1600

            Network

                  MITRE ATT&CK Enterprise v15

                  Replay Monitor

                  Loading Replay Monitor...

                  Downloads

                  • C:\Users\Admin\AppData\Roaming\mrsys.exe

                    Filesize

                    292KB

                    MD5

                    fb2c81b164697503eee3bd2dfe448f2c

                    SHA1

                    d1dbd1ca55f5b959d428cb0817ac824a47fceb55

                    SHA256

                    225f73556241cace89ec05fffc5ca25199ae3eb01618ca323f1aab548d4bc122

                    SHA512

                    6d5b7a445cdf0699d0e799aeda6b45e67d5bcd195f6c654bf670db6c25650e207469ba7b1a9d709e6973fb0e762bb6ec8bb0bf6cba14f361678def9c72a09022

                  • C:\Windows\SYSTEM.INI

                    Filesize

                    257B

                    MD5

                    6d41c835c4a578084d21e7a3899568d7

                    SHA1

                    87f0d5ae59ecc5ddd5b1c463510869f6720713a8

                    SHA256

                    c546fe4de620c68d5f83d34b839daa5047edec432bc7059d261ea985471e8b48

                    SHA512

                    7656b53fc25032e5913a0ec2f7ac1cd0f46393be4c5134c6c3e20dca91fc84751ce9b6185dd62c51c7ff25be0508366ba38942cecb4cea3cae4b88f07a49d294

                  • C:\Windows\system\spoolsv.exe

                    Filesize

                    292KB

                    MD5

                    51c0d60890a1f749e58f2f9ce861ded2

                    SHA1

                    d8fdb1982091d71d5ac616e29bfeb749bacffa67

                    SHA256

                    9bad790df72827834f7c51eae4e135eb02bb8e554183fd1b6a8acf4997dd2048

                    SHA512

                    8c66cad59e706d0989c14229ac4e252acaf584b3aa08e018a32c55d46b958a5edfe81750ca5c2c822b037d31900e8cb4f14784580a2acd5cf9ac00fdf2d24ae2

                  • \Windows\system\explorer.exe

                    Filesize

                    292KB

                    MD5

                    868c8f0a092d41de60e455111d69e0ee

                    SHA1

                    4d25e9fa5f6d4ba2f640f46b047e6ade53c986c9

                    SHA256

                    66aa3a0d1d19da29f90106cbb69c661779cc9ef22ce9373e827f79eccb2786ff

                    SHA512

                    21c988de0c5d3a43edabba8580f9246f910f43bdfa011d199f503dfc192417ddacaa67edda5af7602fa673c064ed9e6bce0e2c5884b1c86da74d34f7de023735

                  • \Windows\system\svchost.exe

                    Filesize

                    292KB

                    MD5

                    324b67bbc6ade921d6d8b3efd3b21e48

                    SHA1

                    9a55d856a2364b9a3a76c6eed886a1226497f61a

                    SHA256

                    49d09ee1baa7a91969c827e2be10dfd930080ad4b99ab7dff49bcf822caf0685

                    SHA512

                    e2c48639b763d151341b96b649f9634482ec7a3857f5b4f2ccaea17c5c29b2cd042b9ed64b416f3a8687057ed37ce9a52f2185564626adf6f9be25081a528e61

                  • memory/1108-14-0x00000000001D0000-0x00000000001D2000-memory.dmp

                    Filesize

                    8KB

                  • memory/1108-14-0x00000000001D0000-0x00000000001D2000-memory.dmp

                    Filesize

                    8KB

                  • memory/1420-83-0x0000000000400000-0x0000000000442000-memory.dmp

                    Filesize

                    264KB

                  • memory/1420-81-0x0000000000400000-0x0000000000442000-memory.dmp

                    Filesize

                    264KB

                  • memory/1420-83-0x0000000000400000-0x0000000000442000-memory.dmp

                    Filesize

                    264KB

                  • memory/1420-81-0x0000000000400000-0x0000000000442000-memory.dmp

                    Filesize

                    264KB

                  • memory/2368-28-0x0000000002570000-0x00000000035FE000-memory.dmp

                    Filesize

                    16.6MB

                  • memory/2368-23-0x0000000004F50000-0x0000000004F51000-memory.dmp

                    Filesize

                    4KB

                  • memory/2368-1-0x0000000002570000-0x00000000035FE000-memory.dmp

                    Filesize

                    16.6MB

                  • memory/2368-30-0x0000000004E00000-0x0000000004E02000-memory.dmp

                    Filesize

                    8KB

                  • memory/2368-5-0x0000000002570000-0x00000000035FE000-memory.dmp

                    Filesize

                    16.6MB

                  • memory/2368-35-0x0000000005700000-0x0000000005742000-memory.dmp

                    Filesize

                    264KB

                  • memory/2368-29-0x0000000004E00000-0x0000000004E02000-memory.dmp

                    Filesize

                    8KB

                  • memory/2368-27-0x0000000002570000-0x00000000035FE000-memory.dmp

                    Filesize

                    16.6MB

                  • memory/2368-97-0x0000000004E00000-0x0000000004E02000-memory.dmp

                    Filesize

                    8KB

                  • memory/2368-28-0x0000000002570000-0x00000000035FE000-memory.dmp

                    Filesize

                    16.6MB

                  • memory/2368-13-0x0000000002570000-0x00000000035FE000-memory.dmp

                    Filesize

                    16.6MB

                  • memory/2368-100-0x0000000000400000-0x0000000000442000-memory.dmp

                    Filesize

                    264KB

                  • memory/2368-3-0x0000000002570000-0x00000000035FE000-memory.dmp

                    Filesize

                    16.6MB

                  • memory/2368-26-0x0000000004F50000-0x0000000004F51000-memory.dmp

                    Filesize

                    4KB

                  • memory/2368-80-0x0000000002570000-0x00000000035FE000-memory.dmp

                    Filesize

                    16.6MB

                  • memory/2368-12-0x0000000002570000-0x00000000035FE000-memory.dmp

                    Filesize

                    16.6MB

                  • memory/2368-80-0x0000000002570000-0x00000000035FE000-memory.dmp

                    Filesize

                    16.6MB

                  • memory/2368-7-0x0000000002570000-0x00000000035FE000-memory.dmp

                    Filesize

                    16.6MB

                  • memory/2368-6-0x0000000002570000-0x00000000035FE000-memory.dmp

                    Filesize

                    16.6MB

                  • memory/2368-11-0x0000000002570000-0x00000000035FE000-memory.dmp

                    Filesize

                    16.6MB

                  • memory/2368-100-0x0000000000400000-0x0000000000442000-memory.dmp

                    Filesize

                    264KB

                  • memory/2368-97-0x0000000004E00000-0x0000000004E02000-memory.dmp

                    Filesize

                    8KB

                  • memory/2368-4-0x0000000002570000-0x00000000035FE000-memory.dmp

                    Filesize

                    16.6MB

                  • memory/2368-0-0x0000000000400000-0x0000000000442000-memory.dmp

                    Filesize

                    264KB

                  • memory/2368-27-0x0000000002570000-0x00000000035FE000-memory.dmp

                    Filesize

                    16.6MB

                  • memory/2368-29-0x0000000004E00000-0x0000000004E02000-memory.dmp

                    Filesize

                    8KB

                  • memory/2368-35-0x0000000005700000-0x0000000005742000-memory.dmp

                    Filesize

                    264KB

                  • memory/2368-30-0x0000000004E00000-0x0000000004E02000-memory.dmp

                    Filesize

                    8KB

                  • memory/2368-1-0x0000000002570000-0x00000000035FE000-memory.dmp

                    Filesize

                    16.6MB

                  • memory/2368-23-0x0000000004F50000-0x0000000004F51000-memory.dmp

                    Filesize

                    4KB

                  • memory/2368-22-0x0000000004E00000-0x0000000004E02000-memory.dmp

                    Filesize

                    8KB

                  • memory/2368-5-0x0000000002570000-0x00000000035FE000-memory.dmp

                    Filesize

                    16.6MB

                  • memory/2368-13-0x0000000002570000-0x00000000035FE000-memory.dmp

                    Filesize

                    16.6MB

                  • memory/2368-26-0x0000000004F50000-0x0000000004F51000-memory.dmp

                    Filesize

                    4KB

                  • memory/2368-0-0x0000000000400000-0x0000000000442000-memory.dmp

                    Filesize

                    264KB

                  • memory/2368-3-0x0000000002570000-0x00000000035FE000-memory.dmp

                    Filesize

                    16.6MB

                  • memory/2368-6-0x0000000002570000-0x00000000035FE000-memory.dmp

                    Filesize

                    16.6MB

                  • memory/2368-22-0x0000000004E00000-0x0000000004E02000-memory.dmp

                    Filesize

                    8KB

                  • memory/2368-4-0x0000000002570000-0x00000000035FE000-memory.dmp

                    Filesize

                    16.6MB

                  • memory/2368-11-0x0000000002570000-0x00000000035FE000-memory.dmp

                    Filesize

                    16.6MB

                  • memory/2368-7-0x0000000002570000-0x00000000035FE000-memory.dmp

                    Filesize

                    16.6MB

                  • memory/2368-12-0x0000000002570000-0x00000000035FE000-memory.dmp

                    Filesize

                    16.6MB

                  • memory/2444-129-0x00000000005A0000-0x00000000005A1000-memory.dmp

                    Filesize

                    4KB

                  • memory/2444-129-0x00000000005A0000-0x00000000005A1000-memory.dmp

                    Filesize

                    4KB

                  • memory/2444-131-0x0000000000590000-0x0000000000592000-memory.dmp

                    Filesize

                    8KB

                  • memory/2444-131-0x0000000000590000-0x0000000000592000-memory.dmp

                    Filesize

                    8KB

                  • memory/2772-56-0x0000000000400000-0x0000000000442000-memory.dmp

                    Filesize

                    264KB

                  • memory/2772-56-0x0000000000400000-0x0000000000442000-memory.dmp

                    Filesize

                    264KB

                  • memory/2772-86-0x0000000000400000-0x0000000000442000-memory.dmp

                    Filesize

                    264KB

                  • memory/2772-65-0x0000000002780000-0x00000000027C2000-memory.dmp

                    Filesize

                    264KB

                  • memory/2772-86-0x0000000000400000-0x0000000000442000-memory.dmp

                    Filesize

                    264KB

                  • memory/2772-65-0x0000000002780000-0x00000000027C2000-memory.dmp

                    Filesize

                    264KB

                  • memory/2804-105-0x0000000003400000-0x000000000448E000-memory.dmp

                    Filesize

                    16.6MB

                  • memory/2804-104-0x0000000003400000-0x000000000448E000-memory.dmp

                    Filesize

                    16.6MB

                  • memory/2804-41-0x0000000000400000-0x0000000000442000-memory.dmp

                    Filesize

                    264KB

                  • memory/2804-55-0x0000000002970000-0x00000000029B2000-memory.dmp

                    Filesize

                    264KB

                  • memory/2804-106-0x0000000003400000-0x000000000448E000-memory.dmp

                    Filesize

                    16.6MB

                  • memory/2804-110-0x0000000003400000-0x000000000448E000-memory.dmp

                    Filesize

                    16.6MB

                  • memory/2804-107-0x0000000003400000-0x000000000448E000-memory.dmp

                    Filesize

                    16.6MB

                  • memory/2804-55-0x0000000002970000-0x00000000029B2000-memory.dmp

                    Filesize

                    264KB

                  • memory/2804-102-0x0000000003400000-0x000000000448E000-memory.dmp

                    Filesize

                    16.6MB

                  • memory/2804-108-0x0000000003400000-0x000000000448E000-memory.dmp

                    Filesize

                    16.6MB

                  • memory/2804-41-0x0000000000400000-0x0000000000442000-memory.dmp

                    Filesize

                    264KB

                  • memory/2804-104-0x0000000003400000-0x000000000448E000-memory.dmp

                    Filesize

                    16.6MB

                  • memory/2804-106-0x0000000003400000-0x000000000448E000-memory.dmp

                    Filesize

                    16.6MB

                  • memory/2804-105-0x0000000003400000-0x000000000448E000-memory.dmp

                    Filesize

                    16.6MB

                  • memory/2804-107-0x0000000003400000-0x000000000448E000-memory.dmp

                    Filesize

                    16.6MB

                  • memory/2804-102-0x0000000003400000-0x000000000448E000-memory.dmp

                    Filesize

                    16.6MB

                  • memory/2804-108-0x0000000003400000-0x000000000448E000-memory.dmp

                    Filesize

                    16.6MB

                  • memory/2804-130-0x0000000001FA0000-0x0000000001FA2000-memory.dmp

                    Filesize

                    8KB

                  • memory/2804-130-0x0000000001FA0000-0x0000000001FA2000-memory.dmp

                    Filesize

                    8KB

                  • memory/2804-123-0x0000000001FB0000-0x0000000001FB1000-memory.dmp

                    Filesize

                    4KB

                  • memory/2804-123-0x0000000001FB0000-0x0000000001FB1000-memory.dmp

                    Filesize

                    4KB

                  • memory/2804-110-0x0000000003400000-0x000000000448E000-memory.dmp

                    Filesize

                    16.6MB