Analysis

  • max time kernel
    149s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30/05/2024, 12:08

General

  • Target

    148ac21619ee9d498a92bf64d21570d0_NeikiAnalytics.exe

  • Size

    91KB

  • MD5

    148ac21619ee9d498a92bf64d21570d0

  • SHA1

    4df8ea43c4647b0509a61dbec04a54796b298a92

  • SHA256

    caea8fc754e1074fff24d9b54a6f54654ea046576d730bca1ed2cba1694821af

  • SHA512

    0a4b2831b646fc44f4a8933d4355ca1a3fbb5e6d98b8d29c7fd62376bf5e6514917e256cc287695a669a28c8678e2679119f25857878bf608b82fa116eaf7206

  • SSDEEP

    1536:ERsjdf1aM67v32Z9x5nouy8VT9Rsjdf1aM67v32Z9x5nouy8VTU:EOaHv3YpoutN9OaHv3YpoutNU

Score
10/10

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 2 IoCs
  • Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Disables RegEdit via registry modification 2 IoCs
  • Disables use of System Restore points 1 TTPs
  • Executes dropped EXE 7 IoCs
  • Modifies system executable filetype association 2 TTPs 13 IoCs
  • UPX packed file 18 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 5 IoCs
  • Drops file in System32 directory 6 IoCs
  • Drops file in Windows directory 2 IoCs
  • Modifies Control Panel 4 IoCs
  • Modifies registry class 15 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs
  • System policy modification 1 TTPs 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\148ac21619ee9d498a92bf64d21570d0_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\148ac21619ee9d498a92bf64d21570d0_NeikiAnalytics.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Modifies visibility of file extensions in Explorer
    • Modifies visiblity of hidden/system files in Explorer
    • Disables RegEdit via registry modification
    • Modifies system executable filetype association
    • Adds Run key to start application
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies Control Panel
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    • System policy modification
    PID:1076
    • C:\Windows\xk.exe
      C:\Windows\xk.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:1796
    • C:\Windows\SysWOW64\IExplorer.exe
      C:\Windows\system32\IExplorer.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:3980
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:1728
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:4460
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:1404
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:5032
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:3396

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\WINDOWS\CSRSS.EXE

    Filesize

    91KB

    MD5

    d3bc36a9f9759193a0beb19c736e652a

    SHA1

    0d85c5986b8f8d9662dbfcd7e6a833fb01266f79

    SHA256

    f5781ab61cfad69cbaf2dbfa5308dfb98875c421d2ff4b748df1ce0cc36378fa

    SHA512

    78a02c79d00f30a10541685b2ffc806aec6067bfc1e9544cf9b80881d6b9a22f590ea7798567d27de68bbd1dd73aba2764a1457139dd5335f0dbfc6bc19bee9f

  • C:\Users\Admin\AppData\Local\WINDOWS\LSASS.EXE

    Filesize

    91KB

    MD5

    79f6d8ea747ff68e74579e2c7a3482e4

    SHA1

    24992336d8a00036292f9509b0100c6f1f97beb0

    SHA256

    69d210c45035265356c025453e5267ab4cc3c5e7de009887f31a40ce837a1718

    SHA512

    fcbd9e74b48740d6ea85b7703170f51f7554995cb9c6deadda3d692b74ad3e65964a35676919356f45d8eae758ad34435a0e05c3b05fc6871fd3ca9837761703

  • C:\Users\Admin\AppData\Local\WINDOWS\SERVICES.EXE

    Filesize

    91KB

    MD5

    25b8120f262de696ebffb6bd34ca7512

    SHA1

    2193be85445cd319b1fc1a0bb54255dbe0a14462

    SHA256

    b21eaff5ff80365935c02a6106f5ffdf21aa74e7a8ab35cb87c580ae0682212c

    SHA512

    bcdd188ef51719bc0010d0bd984ec45c5ff35df935a4e34adc80b41d8b356a18daac42c252029463c1d84b60ea00fb5255f55292e503f98d8efb160f0e56faf0

  • C:\Users\Admin\AppData\Local\WINDOWS\SMSS.EXE

    Filesize

    91KB

    MD5

    09248ffe6b6e1a7b9c1a7818cbd0b7f1

    SHA1

    de20096341331a98adc8ca509a52062d8beea0af

    SHA256

    b07d6c5b3ce70394e2c47004a3732d0410a7c0d0656cd51f9e36e2d95d57c194

    SHA512

    aa5a928dfcc6aa3e4129fcd8be9151f373550b74bac03dbbce37a8f449ecc0695a94415c5204961955246c14683d4dd90e87845a4e5e83c9413991f316106f84

  • C:\Users\Admin\AppData\Local\WINDOWS\WINLOGON.EXE

    Filesize

    91KB

    MD5

    912d3d504209b8c93ac368917aaf2872

    SHA1

    33842d97e5dad7eea517aa8b0c8e5ba0de8959e2

    SHA256

    35c54a2dc912878b81c54560917128a7e009f2f6801a7586a213f459d67f39b4

    SHA512

    c5d40613dfa064f4d817d91e25604601d7a4b384e4eb7c36f1772bbfcd2662f5a1f5d6fe823d63b61b356317064a79abc51aa001b18c74eb14515921de2e2c50

  • C:\Users\Admin\AppData\Local\winlogon.exe

    Filesize

    91KB

    MD5

    148ac21619ee9d498a92bf64d21570d0

    SHA1

    4df8ea43c4647b0509a61dbec04a54796b298a92

    SHA256

    caea8fc754e1074fff24d9b54a6f54654ea046576d730bca1ed2cba1694821af

    SHA512

    0a4b2831b646fc44f4a8933d4355ca1a3fbb5e6d98b8d29c7fd62376bf5e6514917e256cc287695a669a28c8678e2679119f25857878bf608b82fa116eaf7206

  • C:\Windows\SysWOW64\IExplorer.exe

    Filesize

    91KB

    MD5

    89fd5022a0a184937076309cc0550c1d

    SHA1

    5fd31e29c01b8165ddb3192915991a23ade1e84e

    SHA256

    3496f2b6e6d2d5c4998630f1aa56c2fb209996de55aae010ce0dc33592e2a78c

    SHA512

    14369da56ef19f2104dcfe69bda4882ca102533bac9084c59295a9cdebbe4537a50f2b24ae1dc283deb277f7d1ccb7657e253caad64790d301a882d487bf842f

  • C:\Windows\xk.exe

    Filesize

    91KB

    MD5

    29a2853fbacc2fa9bb654ca5783efee3

    SHA1

    53ce0c8233b9f2d96f87b042eef638ee3456b3a5

    SHA256

    46cb8db14404fbbf19b3a95428f3f7f2f67023a719d15e3dd0ea1378f5dd9e3d

    SHA512

    28f0db4ffa811989658c1ff21ceb096de5aa58c3167cd40a5551d42cad6c3da14fc3621c2f322748f81950d3b2da7fba4a0958c8e9d20c5dbe66042b816a5c83

  • memory/1076-155-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/1076-0-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/1404-141-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/1728-127-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/1796-112-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/3396-154-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/3980-121-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/3980-115-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/4460-135-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/5032-148-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB