Analysis

  • max time kernel
    150s
  • max time network
    97s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30/05/2024, 02:13

General

  • Target

    5ffe7a06d4cc9d586ca467352ba33bd0_NeikiAnalytics.exe

  • Size

    135KB

  • MD5

    5ffe7a06d4cc9d586ca467352ba33bd0

  • SHA1

    801949e50eace50cb6597cf2035116ec465ddac2

  • SHA256

    73d5a2ebd786528030509ecf9c9035f88296828483a53cef4272450e90c00246

  • SHA512

    25623e5a62a6384aaaee91f7695156f1d8dc4c70539c7a1992ee95fa0dfee180d78c4d4e06edea02bd393fc2d101da4cb3614865b2a03f863a8beadd527890b4

  • SSDEEP

    1536:4fsEqouTRcG/Mzvgf7xEuvnXNTRdUzwTekUOisZ1yDDajtXbVwRH:4VqoCl/YgjxEufVU0TbTyDDalu9

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 4 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Drops file in System32 directory 2 IoCs
  • Drops file in Windows directory 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 2 IoCs
  • Suspicious use of SetWindowsHookEx 10 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5ffe7a06d4cc9d586ca467352ba33bd0_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\5ffe7a06d4cc9d586ca467352ba33bd0_NeikiAnalytics.exe"
    1⤵
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:812
    • \??\c:\windows\resources\themes\explorer.exe
      c:\windows\resources\themes\explorer.exe
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Drops file in System32 directory
      • Drops file in Windows directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1132
      • \??\c:\windows\resources\spoolsv.exe
        c:\windows\resources\spoolsv.exe SE
        3⤵
        • Executes dropped EXE
        • Drops file in Windows directory
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:3168
        • \??\c:\windows\resources\svchost.exe
          c:\windows\resources\svchost.exe
          4⤵
          • Modifies visiblity of hidden/system files in Explorer
          • Executes dropped EXE
          • Adds Run key to start application
          • Drops file in System32 directory
          • Suspicious behavior: GetForegroundWindowSpam
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:2572
          • \??\c:\windows\resources\spoolsv.exe
            c:\windows\resources\spoolsv.exe PR
            5⤵
            • Executes dropped EXE
            • Suspicious use of SetWindowsHookEx
            PID:1332

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\Resources\Themes\explorer.exe

    Filesize

    135KB

    MD5

    e0b7be040f6baf7c5d42763836f15583

    SHA1

    a3a5eb0efe4b21b0a109abc25d87338d67e27fad

    SHA256

    3aea04b4413e0018c1a0c171153acf4ead1e00cb64ac8d8507636716deb4487e

    SHA512

    2ce8a6337b5f5507b4960b350dae29bd7a0438c8ec62a3a30907e8074b8778e8f9603f653cc2b339be7d43b29622fb4909996a853bf1721d877a2ae622e4031a

  • C:\Windows\Resources\spoolsv.exe

    Filesize

    135KB

    MD5

    dd96bd4a6c84179bea6f9aca06a20e14

    SHA1

    515e310633c02bd5b2da51729f026fa09a3edcde

    SHA256

    d8302ee3e96cba30e8237563ad6396d169cb4b123f6041a4a8a2242ec29b5446

    SHA512

    7a7b7f8fb33a3dca9022447d47f90ac7a0f7648d944e0f1dd81185d430e75ec320bc2e56466f8b75d2891137121e174d8ce42184baebdd29312baae3e1cd3d3d

  • C:\Windows\Resources\svchost.exe

    Filesize

    135KB

    MD5

    aee5fc384f3999729a22337e828f2806

    SHA1

    5e9156bfe163f00690b703149452f56ed173aaf8

    SHA256

    476a84997ebfae55d4989e75dee03fac3de5594a440dd0a67e4ddbd471facd94

    SHA512

    710d0946a01cbffc429e99dbb46e38df6f0c2a1c0a2e4c0b6bbe69eb07cfb1c6c1789a4c7415c70079daa42a32f64461409b63af49b5a77403adf7c8bd477588

  • memory/812-0-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/812-35-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/1332-29-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/1332-33-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/3168-34-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB