Analysis
-
max time kernel
150s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
27/05/2024, 17:12
Static task
static1
Behavioral task
behavioral1
Sample
01ba3daae3d2895e24dfd3e44462b870_NeikiAnalytics.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
01ba3daae3d2895e24dfd3e44462b870_NeikiAnalytics.exe
Resource
win10v2004-20240426-en
General
-
Target
01ba3daae3d2895e24dfd3e44462b870_NeikiAnalytics.exe
-
Size
503KB
-
MD5
01ba3daae3d2895e24dfd3e44462b870
-
SHA1
eab2e468b50c062a798bd292abd5cbc2c700603a
-
SHA256
ba0c27fa5e22f3819a4430f2e7e300c6c83524b5f65dedbe1638a0c2d2deba78
-
SHA512
8fd49d7780fbc82db4beb6ddfc8d54ffd613c11f6db8ec95995e21baa3ad166e32806a4c16acbd09ed36056ca9303160637b3aaa6e0fcaffdaec8dc9cca71940
-
SSDEEP
12288:3ENN+T5xYrllrU7QY6yRYiioQzhGTRKhWcFc9k:N5xolYQY6CYjJzhgKhWcFc9k
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" svchost.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" svchost.exe -
Modifies Installed Components in the registry 2 TTPs 8 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" svchost.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999} svchost.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" explorer.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999} svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" svchost.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} svchost.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} svchost.exe -
Executes dropped EXE 4 IoCs
pid Process 3560 explorer.exe 3056 spoolsv.exe 4780 svchost.exe 4660 spoolsv.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" svchost.exe -
Drops file in Windows directory 6 IoCs
description ioc Process File opened for modification \??\c:\windows\system\explorer.exe 01ba3daae3d2895e24dfd3e44462b870_NeikiAnalytics.exe File opened for modification \??\c:\windows\system\spoolsv.exe explorer.exe File opened for modification \??\c:\windows\system\svchost.exe spoolsv.exe File opened for modification \??\c:\windows\system\explorer.exe explorer.exe File opened for modification \??\c:\windows\system\svchost.exe svchost.exe File opened for modification C:\Windows\system\udsys.exe explorer.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2508 01ba3daae3d2895e24dfd3e44462b870_NeikiAnalytics.exe 2508 01ba3daae3d2895e24dfd3e44462b870_NeikiAnalytics.exe 3560 explorer.exe 3560 explorer.exe 3560 explorer.exe 3560 explorer.exe 3560 explorer.exe 3560 explorer.exe 4780 svchost.exe 4780 svchost.exe 4780 svchost.exe 4780 svchost.exe 3560 explorer.exe 3560 explorer.exe 4780 svchost.exe 4780 svchost.exe 3560 explorer.exe 3560 explorer.exe 4780 svchost.exe 4780 svchost.exe 3560 explorer.exe 3560 explorer.exe 4780 svchost.exe 4780 svchost.exe 3560 explorer.exe 3560 explorer.exe 4780 svchost.exe 4780 svchost.exe 3560 explorer.exe 3560 explorer.exe 4780 svchost.exe 4780 svchost.exe 3560 explorer.exe 3560 explorer.exe 4780 svchost.exe 4780 svchost.exe 3560 explorer.exe 3560 explorer.exe 4780 svchost.exe 4780 svchost.exe 3560 explorer.exe 3560 explorer.exe 4780 svchost.exe 4780 svchost.exe 3560 explorer.exe 3560 explorer.exe 4780 svchost.exe 4780 svchost.exe 3560 explorer.exe 3560 explorer.exe 4780 svchost.exe 4780 svchost.exe 3560 explorer.exe 3560 explorer.exe 4780 svchost.exe 4780 svchost.exe 3560 explorer.exe 3560 explorer.exe 4780 svchost.exe 4780 svchost.exe 3560 explorer.exe 3560 explorer.exe 4780 svchost.exe 4780 svchost.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 3560 explorer.exe 4780 svchost.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 2508 01ba3daae3d2895e24dfd3e44462b870_NeikiAnalytics.exe 2508 01ba3daae3d2895e24dfd3e44462b870_NeikiAnalytics.exe 3560 explorer.exe 3560 explorer.exe 3056 spoolsv.exe 3056 spoolsv.exe 4780 svchost.exe 4780 svchost.exe 4660 spoolsv.exe 4660 spoolsv.exe 3560 explorer.exe 3560 explorer.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 2508 wrote to memory of 3560 2508 01ba3daae3d2895e24dfd3e44462b870_NeikiAnalytics.exe 84 PID 2508 wrote to memory of 3560 2508 01ba3daae3d2895e24dfd3e44462b870_NeikiAnalytics.exe 84 PID 2508 wrote to memory of 3560 2508 01ba3daae3d2895e24dfd3e44462b870_NeikiAnalytics.exe 84 PID 3560 wrote to memory of 3056 3560 explorer.exe 85 PID 3560 wrote to memory of 3056 3560 explorer.exe 85 PID 3560 wrote to memory of 3056 3560 explorer.exe 85 PID 3056 wrote to memory of 4780 3056 spoolsv.exe 86 PID 3056 wrote to memory of 4780 3056 spoolsv.exe 86 PID 3056 wrote to memory of 4780 3056 spoolsv.exe 86 PID 4780 wrote to memory of 4660 4780 svchost.exe 87 PID 4780 wrote to memory of 4660 4780 svchost.exe 87 PID 4780 wrote to memory of 4660 4780 svchost.exe 87 PID 4780 wrote to memory of 2060 4780 svchost.exe 89 PID 4780 wrote to memory of 2060 4780 svchost.exe 89 PID 4780 wrote to memory of 2060 4780 svchost.exe 89 PID 4780 wrote to memory of 3156 4780 svchost.exe 102 PID 4780 wrote to memory of 3156 4780 svchost.exe 102 PID 4780 wrote to memory of 3156 4780 svchost.exe 102 PID 4780 wrote to memory of 1016 4780 svchost.exe 104 PID 4780 wrote to memory of 1016 4780 svchost.exe 104 PID 4780 wrote to memory of 1016 4780 svchost.exe 104
Processes
-
C:\Users\Admin\AppData\Local\Temp\01ba3daae3d2895e24dfd3e44462b870_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\01ba3daae3d2895e24dfd3e44462b870_NeikiAnalytics.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2508 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe2⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Modifies Installed Components in the registry
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3560 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE3⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3056 -
\??\c:\windows\system\svchost.exec:\windows\system\svchost.exe4⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Modifies Installed Components in the registry
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4780 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe PR5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4660
-
-
C:\Windows\SysWOW64\at.exeat 17:14 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe5⤵PID:2060
-
-
C:\Windows\SysWOW64\at.exeat 17:15 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe5⤵PID:3156
-
-
C:\Windows\SysWOW64\at.exeat 17:16 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe5⤵PID:1016
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
503KB
MD5a7a9329bc8eaae52061198b5b8f2e834
SHA13d2e1cefcca16690857df0ff342795ecd5236926
SHA25683309e5fe6e9ac7158569e7f10a0555f19c96a30bb85e6e9b46943835e2ccad8
SHA512ad267e9a35ad3ca2bbdc4c5b8f879477e53aadb36962ef1c4c39a2b59ab83c659b2fadaba7599bbb9a1e46d5cc4804f802e62693364dc9a9481e1eb632828b53
-
Filesize
503KB
MD57c6df7b09b335d54aae7685be057f60e
SHA11a3e8da2869b6ed6127e368c7ef4bba6799fff77
SHA25634ce8ccbe88cb525218ddc5097890ea8f3230e3c300b921ec7579c6d479ff110
SHA5123c1ad43d6cae64ac32e201efecb904338cc497ce8055f63e7046fb13b37eacbcd3da519337af1d54b261cc5e54dd80e0c5c6884dddac970def7f5fbf00a99331
-
Filesize
503KB
MD5069b181f4388a3e6522270b851cbe72e
SHA10b1d79f72d339723a18a4d124f5ac3f37dc135df
SHA2563d8cb51ca779b5255039d36b520453097328a719ca3f417225d72f5861d9eccf
SHA5124d723d21f4f37efa89583bf80c99db19ff0df365b396b3eb12bfb35b9a7d656ad0ad5be3db620e85b731a1fc470165f49ff2016f851482a413b0f72358cc8575
-
Filesize
503KB
MD5c2ff9967343fe6c833ab5ba178fcb4de
SHA108bcc26287b247689a23280ba1a5d5a9ed6924c3
SHA256d563bd760e4dd5a6a2749028432c9d18a3eebdbe759024b2e3ecacabe8454b82
SHA512968ae7338e12ae140d404cf684d03c6bb5aa6299e43df4a08e988e88c900ba3224da3586987db0c4cf989277a09f1066c6f3485e070af5d0bf222fe30faf3b87