Analysis

  • max time kernel
    134s
  • max time network
    104s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28-05-2024 21:22

General

  • Target

    0866a23e91b1d04e2eeeb277fc6933b0_NeikiAnalytics.exe

  • Size

    91KB

  • MD5

    0866a23e91b1d04e2eeeb277fc6933b0

  • SHA1

    ba716fb175f12fa39b49b6e556b4a5a50539e9c4

  • SHA256

    c2b81bf162cb3984c81a0dd1ac0da57db585193bf0462e4482b29832cd0a7c36

  • SHA512

    8a1435c780d63fabf1d8fb920f9017c7ec51b4d82fe6676eb203b8449b08b18fcb66dd03a19cd81b0eb6f40b3b32bfffb7a0495b81cbc3335629a2e4ee83931c

  • SSDEEP

    1536:jRsjdEIUFC2p79OCnouy8VDjRsjdEIUFC2p79OCnouy8VDV:jOm9CshoutdjOm9CshoutdV

Score
10/10

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 2 IoCs
  • Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Disables RegEdit via registry modification 2 IoCs
  • Disables use of System Restore points 1 TTPs
  • Executes dropped EXE 7 IoCs
  • Modifies system executable filetype association 2 TTPs 13 IoCs
  • UPX packed file 18 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 5 IoCs
  • Drops file in System32 directory 6 IoCs
  • Drops file in Windows directory 2 IoCs
  • Modifies Control Panel 4 IoCs
  • Modifies registry class 15 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs
  • System policy modification 1 TTPs 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0866a23e91b1d04e2eeeb277fc6933b0_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\0866a23e91b1d04e2eeeb277fc6933b0_NeikiAnalytics.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Modifies visibility of file extensions in Explorer
    • Modifies visiblity of hidden/system files in Explorer
    • Disables RegEdit via registry modification
    • Modifies system executable filetype association
    • Adds Run key to start application
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies Control Panel
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    • System policy modification
    PID:4180
    • C:\Windows\xk.exe
      C:\Windows\xk.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:1224
    • C:\Windows\SysWOW64\IExplorer.exe
      C:\Windows\system32\IExplorer.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:4004
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:1812
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:624
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:3684
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:220
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:3168

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\WINDOWS\CSRSS.EXE

    Filesize

    91KB

    MD5

    4f5fcfaaacc2c1402eb76d86c2bac65a

    SHA1

    01e79fcfe70c5f6c0da6fa8f13e9c693e53ddf5f

    SHA256

    886cc95d34947d232df4afbb92a76d6d34d83f6febbff70b7e93904ae965dd4b

    SHA512

    10ece0a9874fa0014c6c66c9303ad5a340d61bdbe12bbb477fb383a5342bcf12768f88985005265cdde54b9894d4b6187c410665ec4103eb19f7cbd17433c1d3

  • C:\Users\Admin\AppData\Local\WINDOWS\LSASS.EXE

    Filesize

    91KB

    MD5

    6212e332d0d18104824522df9796c365

    SHA1

    4f6c5f209aa99351fc25078f24824bf715497d17

    SHA256

    82bd068e5e716aab174ea37a8fae5bea04aff99477ffc9a567b5aaaf33088a99

    SHA512

    f15e76bdc5d7cecb99b68db1f1a5ef5c3c7ac50c96eebb3bda097da9e3671b3074ca2600568e2e53ca0db070f7e0c1972f14fa1697d0a9d5eda0faaf75b85658

  • C:\Users\Admin\AppData\Local\WINDOWS\SMSS.EXE

    Filesize

    91KB

    MD5

    6d9ff238ec7b59ab9e5d531f9f0a467d

    SHA1

    b4e67316037a74641e3efb366f42d534b815045f

    SHA256

    7d363003827ba7dc5696d166e276af4685cddca12ac253f6f846e7cf7c13c3cf

    SHA512

    33a55d472a2cd3d5ae47289c7d6b0ad23165d39b03f79418788526e82740625cdc3addf5327647c9794ccc9aa0e8977569320a34e21f90f8b7ae3dd88c4bf629

  • C:\Users\Admin\AppData\Local\winlogon.exe

    Filesize

    91KB

    MD5

    0866a23e91b1d04e2eeeb277fc6933b0

    SHA1

    ba716fb175f12fa39b49b6e556b4a5a50539e9c4

    SHA256

    c2b81bf162cb3984c81a0dd1ac0da57db585193bf0462e4482b29832cd0a7c36

    SHA512

    8a1435c780d63fabf1d8fb920f9017c7ec51b4d82fe6676eb203b8449b08b18fcb66dd03a19cd81b0eb6f40b3b32bfffb7a0495b81cbc3335629a2e4ee83931c

  • C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE

    Filesize

    91KB

    MD5

    183eb935cb22604e1f7c54c5e9d686d1

    SHA1

    d6a05dc823a7004e607f69dc8c7d00b44ee152d1

    SHA256

    7b5a610bbee3672823bd376fa9a5e954532a99ee8306e6b8afbe303ae141662b

    SHA512

    3248434c8369941c3e2895fc92291b7a1477f257c7d608367e8e240d172beda15e90e0a9fd4f417faf679151e3195e1d5281fc776e077280ae7fb1aa15b20fa7

  • C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE

    Filesize

    91KB

    MD5

    e8412a25cb763d8c5e8796cd8ca817bc

    SHA1

    54aae81fabe646b092df2f32735940c93fe997c6

    SHA256

    e8d8fff8183ce999aa5d896c829fc32c2baf8954322df92f533f7f3b473431b0

    SHA512

    8cb7757c5229b684746c8e3712eb21dacc62dc80ca86e26250a767e26d77f16eaf2d9ddef46c405b1123eddaa9aea8bf99255cc0f1ce560bedbba66ae609e435

  • C:\Windows\SysWOW64\IExplorer.exe

    Filesize

    91KB

    MD5

    f7c48bdd3535337b1154e407ac27680d

    SHA1

    3600c5cfb776c15df3f84deb32557ddb2d5e7a33

    SHA256

    1041e86250d2eb1b2c34e9595961dfe9e778bc0a9ff2c93ca0e1345c9faf5221

    SHA512

    f317c11172293b6532df3356a30ff62971fcb4f7d4c359f556d10cdebbae77daca5980077fdb565599068ce75c258b2fb703ae58537f887d5f19aac1d73621f3

  • C:\Windows\xk.exe

    Filesize

    91KB

    MD5

    462f85da39338bc3253b3fb747e798ac

    SHA1

    3f66953b02d7e2d8cf8d113a6b81578a76968251

    SHA256

    2da99d7f0aaf9c1b073531b95b2af65b2b9159b16f447f1d162be9f6b995236f

    SHA512

    15cfdafad5f6c8bed3dc29ee1dc0f9ff7859e77df6c4c080a96bddca75bab9a23da8ea5dff1c309f3475f4e28b5fcfc7d76d73ed4dc69d206aea0553aefee77e

  • memory/220-146-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/624-134-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/1224-113-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/1812-127-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/3168-150-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/3168-154-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/3684-141-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/4004-120-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/4180-0-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/4180-156-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB