Analysis
-
max time kernel
120s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
28-05-2024 22:44
Static task
static1
Behavioral task
behavioral1
Sample
11c193469217ff54092e14cd0e641380_NeikiAnalytics.dll
Resource
win7-20240508-en
General
-
Target
11c193469217ff54092e14cd0e641380_NeikiAnalytics.dll
-
Size
120KB
-
MD5
11c193469217ff54092e14cd0e641380
-
SHA1
bbcac625a0e9bebeedb0e83d3852edd8440a65b7
-
SHA256
069a33c68bba0aa179acc93e0346f3ca9d7e51d3920114c5d078c4bc98d2fc5d
-
SHA512
8ef991993fe471b08af273b8a73ef72785e3165fc797b0df6addf9019a040bee07cea6889de69056a697655cabd7178a58d08fba19fd2e7d31d023f0201c0cfb
-
SSDEEP
1536:oIuIZwvehOu9gY9vHCLpbZH4kEVhvBH0UZCzF5Y75lGrB52pXQp4K+5WGFCj:oIjwvej9N9PqivvpEZ5Y73Grayp4KJX
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Signatures
-
Modifies firewall policy service 2 TTPs 6 IoCs
Processes:
f7621c3.exef7623f5.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" f7621c3.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "1" f7621c3.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" f7623f5.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" f7623f5.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "1" f7623f5.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" f7621c3.exe -
Processes:
f7621c3.exef7623f5.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" f7621c3.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" f7623f5.exe -
Processes:
f7623f5.exef7621c3.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" f7623f5.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" f7623f5.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" f7621c3.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" f7621c3.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" f7621c3.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" f7623f5.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" f7623f5.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" f7623f5.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" f7621c3.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" f7621c3.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" f7621c3.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" f7623f5.exe -
Executes dropped EXE 3 IoCs
Processes:
f7621c3.exef7623f5.exef764460.exepid process 2236 f7621c3.exe 2556 f7623f5.exe 272 f764460.exe -
Loads dropped DLL 6 IoCs
Processes:
rundll32.exepid process 1704 rundll32.exe 1704 rundll32.exe 1704 rundll32.exe 1704 rundll32.exe 1704 rundll32.exe 1704 rundll32.exe -
Processes:
resource yara_rule behavioral1/memory/2236-12-0x00000000006C0000-0x000000000177A000-memory.dmp upx behavioral1/memory/2236-14-0x00000000006C0000-0x000000000177A000-memory.dmp upx behavioral1/memory/2236-17-0x00000000006C0000-0x000000000177A000-memory.dmp upx behavioral1/memory/2236-15-0x00000000006C0000-0x000000000177A000-memory.dmp upx behavioral1/memory/2236-39-0x00000000006C0000-0x000000000177A000-memory.dmp upx behavioral1/memory/2236-18-0x00000000006C0000-0x000000000177A000-memory.dmp upx behavioral1/memory/2236-19-0x00000000006C0000-0x000000000177A000-memory.dmp upx behavioral1/memory/2236-37-0x00000000006C0000-0x000000000177A000-memory.dmp upx behavioral1/memory/2236-42-0x00000000006C0000-0x000000000177A000-memory.dmp upx behavioral1/memory/2236-16-0x00000000006C0000-0x000000000177A000-memory.dmp upx behavioral1/memory/2236-60-0x00000000006C0000-0x000000000177A000-memory.dmp upx behavioral1/memory/2236-61-0x00000000006C0000-0x000000000177A000-memory.dmp upx behavioral1/memory/2236-62-0x00000000006C0000-0x000000000177A000-memory.dmp upx behavioral1/memory/2236-64-0x00000000006C0000-0x000000000177A000-memory.dmp upx behavioral1/memory/2236-63-0x00000000006C0000-0x000000000177A000-memory.dmp upx behavioral1/memory/2236-78-0x00000000006C0000-0x000000000177A000-memory.dmp upx behavioral1/memory/2236-97-0x00000000006C0000-0x000000000177A000-memory.dmp upx behavioral1/memory/2236-98-0x00000000006C0000-0x000000000177A000-memory.dmp upx behavioral1/memory/2236-99-0x00000000006C0000-0x000000000177A000-memory.dmp upx behavioral1/memory/2236-101-0x00000000006C0000-0x000000000177A000-memory.dmp upx behavioral1/memory/2236-104-0x00000000006C0000-0x000000000177A000-memory.dmp upx behavioral1/memory/2236-114-0x00000000006C0000-0x000000000177A000-memory.dmp upx behavioral1/memory/2236-138-0x00000000006C0000-0x000000000177A000-memory.dmp upx behavioral1/memory/2556-150-0x00000000009B0000-0x0000000001A6A000-memory.dmp upx behavioral1/memory/2556-155-0x00000000009B0000-0x0000000001A6A000-memory.dmp upx -
Processes:
f7623f5.exef7621c3.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\Svc f7623f5.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" f7621c3.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" f7623f5.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" f7623f5.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" f7623f5.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" f7623f5.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" f7623f5.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" f7621c3.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" f7621c3.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" f7623f5.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" f7621c3.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" f7621c3.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" f7621c3.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\Svc f7621c3.exe -
Processes:
f7621c3.exef7623f5.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" f7621c3.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" f7623f5.exe -
Enumerates connected drives 3 TTPs 10 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
f7621c3.exedescription ioc process File opened (read-only) \??\O: f7621c3.exe File opened (read-only) \??\E: f7621c3.exe File opened (read-only) \??\G: f7621c3.exe File opened (read-only) \??\H: f7621c3.exe File opened (read-only) \??\I: f7621c3.exe File opened (read-only) \??\J: f7621c3.exe File opened (read-only) \??\M: f7621c3.exe File opened (read-only) \??\K: f7621c3.exe File opened (read-only) \??\L: f7621c3.exe File opened (read-only) \??\N: f7621c3.exe -
Drops file in Windows directory 3 IoCs
Processes:
f7621c3.exef7623f5.exedescription ioc process File created C:\Windows\f762250 f7621c3.exe File opened for modification C:\Windows\SYSTEM.INI f7621c3.exe File created C:\Windows\f7672b0 f7623f5.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
f7621c3.exepid process 2236 f7621c3.exe 2236 f7621c3.exe -
Suspicious use of AdjustPrivilegeToken 21 IoCs
Processes:
f7621c3.exedescription pid process Token: SeDebugPrivilege 2236 f7621c3.exe Token: SeDebugPrivilege 2236 f7621c3.exe Token: SeDebugPrivilege 2236 f7621c3.exe Token: SeDebugPrivilege 2236 f7621c3.exe Token: SeDebugPrivilege 2236 f7621c3.exe Token: SeDebugPrivilege 2236 f7621c3.exe Token: SeDebugPrivilege 2236 f7621c3.exe Token: SeDebugPrivilege 2236 f7621c3.exe Token: SeDebugPrivilege 2236 f7621c3.exe Token: SeDebugPrivilege 2236 f7621c3.exe Token: SeDebugPrivilege 2236 f7621c3.exe Token: SeDebugPrivilege 2236 f7621c3.exe Token: SeDebugPrivilege 2236 f7621c3.exe Token: SeDebugPrivilege 2236 f7621c3.exe Token: SeDebugPrivilege 2236 f7621c3.exe Token: SeDebugPrivilege 2236 f7621c3.exe Token: SeDebugPrivilege 2236 f7621c3.exe Token: SeDebugPrivilege 2236 f7621c3.exe Token: SeDebugPrivilege 2236 f7621c3.exe Token: SeDebugPrivilege 2236 f7621c3.exe Token: SeDebugPrivilege 2236 f7621c3.exe -
Suspicious use of WriteProcessMemory 33 IoCs
Processes:
rundll32.exerundll32.exef7621c3.exedescription pid process target process PID 1644 wrote to memory of 1704 1644 rundll32.exe rundll32.exe PID 1644 wrote to memory of 1704 1644 rundll32.exe rundll32.exe PID 1644 wrote to memory of 1704 1644 rundll32.exe rundll32.exe PID 1644 wrote to memory of 1704 1644 rundll32.exe rundll32.exe PID 1644 wrote to memory of 1704 1644 rundll32.exe rundll32.exe PID 1644 wrote to memory of 1704 1644 rundll32.exe rundll32.exe PID 1644 wrote to memory of 1704 1644 rundll32.exe rundll32.exe PID 1704 wrote to memory of 2236 1704 rundll32.exe f7621c3.exe PID 1704 wrote to memory of 2236 1704 rundll32.exe f7621c3.exe PID 1704 wrote to memory of 2236 1704 rundll32.exe f7621c3.exe PID 1704 wrote to memory of 2236 1704 rundll32.exe f7621c3.exe PID 2236 wrote to memory of 1056 2236 f7621c3.exe taskhost.exe PID 2236 wrote to memory of 1144 2236 f7621c3.exe Dwm.exe PID 2236 wrote to memory of 1180 2236 f7621c3.exe Explorer.EXE PID 2236 wrote to memory of 1448 2236 f7621c3.exe DllHost.exe PID 2236 wrote to memory of 1644 2236 f7621c3.exe rundll32.exe PID 2236 wrote to memory of 1704 2236 f7621c3.exe rundll32.exe PID 2236 wrote to memory of 1704 2236 f7621c3.exe rundll32.exe PID 1704 wrote to memory of 2556 1704 rundll32.exe f7623f5.exe PID 1704 wrote to memory of 2556 1704 rundll32.exe f7623f5.exe PID 1704 wrote to memory of 2556 1704 rundll32.exe f7623f5.exe PID 1704 wrote to memory of 2556 1704 rundll32.exe f7623f5.exe PID 1704 wrote to memory of 272 1704 rundll32.exe f764460.exe PID 1704 wrote to memory of 272 1704 rundll32.exe f764460.exe PID 1704 wrote to memory of 272 1704 rundll32.exe f764460.exe PID 1704 wrote to memory of 272 1704 rundll32.exe f764460.exe PID 2236 wrote to memory of 1056 2236 f7621c3.exe taskhost.exe PID 2236 wrote to memory of 1144 2236 f7621c3.exe Dwm.exe PID 2236 wrote to memory of 1180 2236 f7621c3.exe Explorer.EXE PID 2236 wrote to memory of 2556 2236 f7621c3.exe f7623f5.exe PID 2236 wrote to memory of 2556 2236 f7621c3.exe f7623f5.exe PID 2236 wrote to memory of 272 2236 f7621c3.exe f764460.exe PID 2236 wrote to memory of 272 2236 f7621c3.exe f764460.exe -
System policy modification 1 TTPs 2 IoCs
Processes:
f7621c3.exef7623f5.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" f7621c3.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" f7623f5.exe
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1056
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1144
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1180
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\11c193469217ff54092e14cd0e641380_NeikiAnalytics.dll,#12⤵
- Suspicious use of WriteProcessMemory
PID:1644 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\11c193469217ff54092e14cd0e641380_NeikiAnalytics.dll,#13⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1704 -
C:\Users\Admin\AppData\Local\Temp\f7621c3.exeC:\Users\Admin\AppData\Local\Temp\f7621c3.exe4⤵
- Modifies firewall policy service
- UAC bypass
- Windows security bypass
- Executes dropped EXE
- Windows security modification
- Checks whether UAC is enabled
- Enumerates connected drives
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2236
-
-
C:\Users\Admin\AppData\Local\Temp\f7623f5.exeC:\Users\Admin\AppData\Local\Temp\f7623f5.exe4⤵
- Modifies firewall policy service
- UAC bypass
- Windows security bypass
- Executes dropped EXE
- Windows security modification
- Checks whether UAC is enabled
- Drops file in Windows directory
- System policy modification
PID:2556
-
-
C:\Users\Admin\AppData\Local\Temp\f764460.exeC:\Users\Admin\AppData\Local\Temp\f764460.exe4⤵
- Executes dropped EXE
PID:272
-
-
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:1448
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
3Disable or Modify Tools
3Modify Registry
5Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
257B
MD5ec52f7dd356d86e3243ddcfc9bbc0ee6
SHA1ffb6fd6dd978ff5a3c3a2355fb3e902df943bed1
SHA2564569c0c8de6e62fc91d5117cce99828139f9431f9793351d5255d103be63d026
SHA512ed534543bb4f9f5409c020384e9988372383cb971e17c2f417417e127a5bb8ff76c8c5bdb4ab9450cc9a9fdb6307f7877e6cdf7fa76d52083944b8b9369a164c
-
Filesize
97KB
MD5bcb54cdd5fa96d544332a1cf357ef693
SHA1938a7fbfdc7374216e05218a2bddc58157572126
SHA256c112478ee7800f95c274eb4d010b8262dbf62524e2a7b8615f32df1620071a06
SHA512e6d6073ce387173d18e7f22739a665b0d9f0353f689d17341197cd03eb48a55b84b1ce186447a6bf7aefab786472c8253801adfbd9059ee9938ddf2c5de0a62b