Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
27/05/2024, 18:18
Static task
static1
Behavioral task
behavioral1
Sample
09d536f4273e2f2293c0650b67bbe9d0_NeikiAnalytics.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
09d536f4273e2f2293c0650b67bbe9d0_NeikiAnalytics.exe
Resource
win10v2004-20240426-en
General
-
Target
09d536f4273e2f2293c0650b67bbe9d0_NeikiAnalytics.exe
-
Size
212KB
-
MD5
09d536f4273e2f2293c0650b67bbe9d0
-
SHA1
d15a7256442e2e388d55a9fb0b5b4735c4254207
-
SHA256
1d17bada628e6dbba0d5a0d58c00befb611a6b1b453ca2d1ed5eee34b99e7f7b
-
SHA512
b89855a90471421937c3be7b21cc1e75aead128826cd532922b0427e20531b37c2f74f45ea7a2fd8567a51dc2d96348afc31bf69e9ffa2b6d8e746e33f94fb5f
-
SSDEEP
6144:yxNqLW6opBZMU/y/JEGjg+op2BSNCCr7/jU:sA6NBT/yEGjWwa7vU
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2492 svchost.exe -
Modifies WinLogon 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\cf453eb8 = "C:\\Windows\\apppatch\\svchost.exe" 09d536f4273e2f2293c0650b67bbe9d0_NeikiAnalytics.exe -
Drops file in Program Files directory 36 IoCs
description ioc Process File created C:\Program Files (x86)\Windows Defender\lymyxid.com svchost.exe File created C:\Program Files (x86)\Windows Defender\lyxynyx.com svchost.exe File opened for modification C:\Program Files (x86)\Windows Defender\symbols\dll\wrpcrt4.pdb svchost.exe File created C:\Program Files (x86)\Windows Defender\qetyfuv.com svchost.exe File created C:\Program Files (x86)\Windows Defender\lysyfyj.com svchost.exe File created C:\Program Files (x86)\Windows Defender\gatyfus.com svchost.exe File opened for modification C:\Program Files (x86)\Windows Defender\winsta.pdb svchost.exe File opened for modification C:\Program Files (x86)\Windows Defender\WinSCard.pdb svchost.exe File opened for modification C:\Program Files (x86)\Windows Defender\dll\WinSCard.pdb svchost.exe File opened for modification C:\Program Files (x86)\Windows Defender\symbols\dll\WinSCard.pdb svchost.exe File opened for modification C:\Program Files (x86)\Windows Defender\DLL\wkernel32.pdb svchost.exe File opened for modification C:\Program Files (x86)\Windows Defender\symbols\dll\wntdll.pdb svchost.exe File created C:\Program Files (x86)\Windows Defender\galyqaz.com svchost.exe File created C:\Program Files (x86)\Windows Defender\gadyciz.com svchost.exe File opened for modification C:\Program Files (x86)\Windows Defender\dll\wrpcrt4.pdb svchost.exe File opened for modification C:\Program Files (x86)\Windows Defender\symbols\dll\winsta.pdb svchost.exe File opened for modification C:\Program Files (x86)\Windows Defender\dll\wntdll.pdb svchost.exe File created C:\Program Files (x86)\Windows Defender\qegyval.com svchost.exe File opened for modification C:\Program Files (x86)\Windows Defender\wkernelbase.pdb svchost.exe File opened for modification C:\Program Files (x86)\Windows Defender\wrpcrt4.pdb svchost.exe File opened for modification C:\Program Files (x86)\Windows Defender\wntdll.pdb svchost.exe File created C:\Program Files (x86)\Windows Defender\vocyzit.com svchost.exe File opened for modification C:\Program Files (x86)\Windows Defender\symbols\dll\wkernelbase.pdb svchost.exe File opened for modification C:\Program Files (x86)\Windows Defender\dll\winsta.pdb svchost.exe File opened for modification C:\Program Files (x86)\Windows Defender\symbols\DLL\wkernel32.pdb svchost.exe File created C:\Program Files (x86)\Windows Defender\vonypom.com svchost.exe File created C:\Program Files (x86)\Windows Defender\pupycag.com svchost.exe File created C:\Program Files (x86)\Windows Defender\galynuh.com svchost.exe File created C:\Program Files (x86)\Windows Defender\vofycot.com svchost.exe File created C:\Program Files (x86)\Windows Defender\qetyhyg.com svchost.exe File opened for modification C:\Program Files (x86)\Windows Defender\wkernel32.pdb svchost.exe File created C:\Program Files (x86)\Windows Defender\pupydeq.com svchost.exe File created C:\Program Files (x86)\Windows Defender\qexyhuv.com svchost.exe File created C:\Program Files (x86)\Windows Defender\lygyvuj.com svchost.exe File created C:\Program Files (x86)\Windows Defender\gahyhiz.com svchost.exe File opened for modification C:\Program Files (x86)\Windows Defender\dll\wkernelbase.pdb svchost.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\apppatch\svchost.exe 09d536f4273e2f2293c0650b67bbe9d0_NeikiAnalytics.exe File opened for modification C:\Windows\apppatch\svchost.exe 09d536f4273e2f2293c0650b67bbe9d0_NeikiAnalytics.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000_Classes\Local Settings\MuiCache svchost.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2492 svchost.exe 2492 svchost.exe 2492 svchost.exe 2492 svchost.exe 2492 svchost.exe 2492 svchost.exe 2492 svchost.exe 2492 svchost.exe 2492 svchost.exe 2492 svchost.exe 2492 svchost.exe 2492 svchost.exe 2492 svchost.exe 2492 svchost.exe 2492 svchost.exe 2492 svchost.exe 2492 svchost.exe 2492 svchost.exe 2492 svchost.exe 2492 svchost.exe 2492 svchost.exe 2492 svchost.exe 2492 svchost.exe 2492 svchost.exe 2492 svchost.exe 2492 svchost.exe 2492 svchost.exe 2492 svchost.exe 2492 svchost.exe 2492 svchost.exe 2492 svchost.exe 2492 svchost.exe 2492 svchost.exe 2492 svchost.exe 2492 svchost.exe 2492 svchost.exe 2492 svchost.exe 2492 svchost.exe 2492 svchost.exe 2492 svchost.exe 2492 svchost.exe 2492 svchost.exe 2492 svchost.exe 2492 svchost.exe 2492 svchost.exe 2492 svchost.exe 2492 svchost.exe 2492 svchost.exe 2492 svchost.exe 2492 svchost.exe 2492 svchost.exe 2492 svchost.exe 2492 svchost.exe 2492 svchost.exe 2492 svchost.exe 2492 svchost.exe 2492 svchost.exe 2492 svchost.exe 2492 svchost.exe 2492 svchost.exe 2492 svchost.exe 2492 svchost.exe 2492 svchost.exe 2492 svchost.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2440 09d536f4273e2f2293c0650b67bbe9d0_NeikiAnalytics.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeSecurityPrivilege 2440 09d536f4273e2f2293c0650b67bbe9d0_NeikiAnalytics.exe Token: SeSecurityPrivilege 2440 09d536f4273e2f2293c0650b67bbe9d0_NeikiAnalytics.exe Token: SeSecurityPrivilege 2492 svchost.exe Token: SeSecurityPrivilege 2492 svchost.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2440 wrote to memory of 2492 2440 09d536f4273e2f2293c0650b67bbe9d0_NeikiAnalytics.exe 83 PID 2440 wrote to memory of 2492 2440 09d536f4273e2f2293c0650b67bbe9d0_NeikiAnalytics.exe 83 PID 2440 wrote to memory of 2492 2440 09d536f4273e2f2293c0650b67bbe9d0_NeikiAnalytics.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\09d536f4273e2f2293c0650b67bbe9d0_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\09d536f4273e2f2293c0650b67bbe9d0_NeikiAnalytics.exe"1⤵
- Modifies WinLogon
- Drops file in Windows directory
- Suspicious behavior: RenamesItself
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2440 -
C:\Windows\apppatch\svchost.exe"C:\Windows\apppatch\svchost.exe"2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2492
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
168B
MD5d57e3a550060f85d44a175139ea23021
SHA12c5cb3428a322c9709a34d04dd86fe7628f8f0a6
SHA25643edf068d34276e8ade4113d4d7207de19fc98a2ae1c07298e593edae2a8774c
SHA5120364fe6a010fce7a3f4a6344c84468c64b20fd131f3160fc649db78f1075ba52d8a1c4496e50dbe27c357e01ee52e94cdcda8f7927cba28d5f2f45b9da690063
-
Filesize
212KB
MD5e5465a5e851d319fa1d9e76e71f06a2f
SHA1338c4740cc65d3ca883e48a17c2822b9092b0f52
SHA256c81ef11af60276316d3ce65ee8ff1b70a06e1f6cbf5104c95b2b4c3c685ed949
SHA512b59988063d1c0c3f730be636cef193ca6753da8b0aeba0bd2005ab793773a19cde2dbf9677dbc5b91854039f675dac600cf9a1c27e3c1ef429a51fad78210989