Overview
overview
7Static
static
3701658ca4d...cs.exe
windows7-x64
701658ca4d...cs.exe
windows10-2004-x64
$PLUGINSDI...up.dll
windows7-x64
3$PLUGINSDI...up.dll
windows10-2004-x64
3$PLUGINSDIR/UAC.dll
windows7-x64
3$PLUGINSDIR/UAC.dll
windows10-2004-x64
3$PLUGINSDIR/inetc.dll
windows7-x64
3$PLUGINSDIR/inetc.dll
windows10-2004-x64
3Analysis
-
max time kernel
106s -
max time network
107s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
31/05/2024, 00:50
Static task
static1
Behavioral task
behavioral1
Sample
701658ca4de02ee07ec4ccc34ded3eb0_NeikiAnalytics.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
701658ca4de02ee07ec4ccc34ded3eb0_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/RealSpeedup.dll
Resource
win7-20240220-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/RealSpeedup.dll
Resource
win10v2004-20240426-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/UAC.dll
Resource
win7-20240508-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/UAC.dll
Resource
win10v2004-20240426-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/inetc.dll
Resource
win7-20240221-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/inetc.dll
Resource
win10v2004-20240226-en
Errors
General
-
Target
701658ca4de02ee07ec4ccc34ded3eb0_NeikiAnalytics.exe
-
Size
1.2MB
-
MD5
701658ca4de02ee07ec4ccc34ded3eb0
-
SHA1
a4e1c8bd74940e2bfeeed9588fc578add6c2b92b
-
SHA256
c962e389ee68c863b2aa54f7d1147ef2e13eef43a4f7a3033ab291eb422db628
-
SHA512
65e5107a08ac3da4639a11f4e1bf5a6d2e635fe61c733d6999a4c30e4721a1c10974f1d605a1def383fbd1443772b74a915cc8b46c9b251d9c9d91a49905de7c
-
SSDEEP
24576:9MDDnzUW2RbuGzdfraM28Y9VdxRKbVqEV8IN0SnKOBV8w5IHd:92nzUW4SGJ2M1YzdxKVn+ImiV29
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1176 Au_.exe -
Loads dropped DLL 64 IoCs
pid Process 1176 Au_.exe 1176 Au_.exe 1176 Au_.exe 1176 Au_.exe 1176 Au_.exe 1176 Au_.exe 1176 Au_.exe 1176 Au_.exe 1176 Au_.exe 1176 Au_.exe 1176 Au_.exe 1176 Au_.exe 1176 Au_.exe 1176 Au_.exe 1176 Au_.exe 1176 Au_.exe 1176 Au_.exe 1176 Au_.exe 1176 Au_.exe 1176 Au_.exe 1176 Au_.exe 1176 Au_.exe 1176 Au_.exe 1176 Au_.exe 1176 Au_.exe 1176 Au_.exe 1176 Au_.exe 1176 Au_.exe 1176 Au_.exe 1176 Au_.exe 1176 Au_.exe 1176 Au_.exe 1176 Au_.exe 1176 Au_.exe 1176 Au_.exe 1176 Au_.exe 1176 Au_.exe 1176 Au_.exe 1176 Au_.exe 1176 Au_.exe 1176 Au_.exe 1176 Au_.exe 1176 Au_.exe 1176 Au_.exe 1176 Au_.exe 1176 Au_.exe 1176 Au_.exe 1176 Au_.exe 1176 Au_.exe 1176 Au_.exe 1176 Au_.exe 1176 Au_.exe 1176 Au_.exe 1176 Au_.exe 1176 Au_.exe 1176 Au_.exe 1176 Au_.exe 1176 Au_.exe 1176 Au_.exe 1176 Au_.exe 1176 Au_.exe 1176 Au_.exe 1176 Au_.exe 1176 Au_.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
NSIS installer 2 IoCs
resource yara_rule behavioral2/files/0x0007000000023411-3.dat nsis_installer_1 behavioral2/files/0x0007000000023411-3.dat nsis_installer_2 -
Modifies data under HKEY_USERS 15 IoCs
description ioc Process Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationGlassAttribute = "1" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationAfterglow = "3288365271" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Themes\History\AutoColor = "0" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\AccentColor = "4292311040" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\StartColorMenu = "4288567808" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\AccentColorMenu = "4292311040" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationColor = "3288365271" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationAfterglowBalance = "10" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationBlurBalance = "1" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\EnableWindowColorization = "233" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent LogonUI.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\AccentPalette = a6d8ff0076b9ed00429ce3000078d700005a9e000042750000264200f7630c00 LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationColorBalance = "89" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Themes\History LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM LogonUI.exe -
Suspicious behavior: EnumeratesProcesses 48 IoCs
pid Process 1176 Au_.exe 1176 Au_.exe 1176 Au_.exe 1176 Au_.exe 1176 Au_.exe 1176 Au_.exe 1176 Au_.exe 1176 Au_.exe 1176 Au_.exe 1176 Au_.exe 1176 Au_.exe 1176 Au_.exe 1176 Au_.exe 1176 Au_.exe 1176 Au_.exe 1176 Au_.exe 1176 Au_.exe 1176 Au_.exe 1176 Au_.exe 1176 Au_.exe 1176 Au_.exe 1176 Au_.exe 1176 Au_.exe 1176 Au_.exe 1176 Au_.exe 1176 Au_.exe 1176 Au_.exe 1176 Au_.exe 1176 Au_.exe 1176 Au_.exe 1176 Au_.exe 1176 Au_.exe 1176 Au_.exe 1176 Au_.exe 1176 Au_.exe 1176 Au_.exe 1176 Au_.exe 1176 Au_.exe 1176 Au_.exe 1176 Au_.exe 1176 Au_.exe 1176 Au_.exe 1176 Au_.exe 1176 Au_.exe 1176 Au_.exe 1176 Au_.exe 1176 Au_.exe 1176 Au_.exe -
Suspicious use of AdjustPrivilegeToken 25 IoCs
description pid Process Token: SeDebugPrivilege 1176 Au_.exe Token: SeDebugPrivilege 1176 Au_.exe Token: SeDebugPrivilege 1176 Au_.exe Token: SeDebugPrivilege 1176 Au_.exe Token: SeDebugPrivilege 1176 Au_.exe Token: SeDebugPrivilege 1176 Au_.exe Token: SeDebugPrivilege 1176 Au_.exe Token: SeDebugPrivilege 1176 Au_.exe Token: SeDebugPrivilege 1176 Au_.exe Token: SeDebugPrivilege 1176 Au_.exe Token: SeDebugPrivilege 1176 Au_.exe Token: SeDebugPrivilege 1176 Au_.exe Token: SeDebugPrivilege 1176 Au_.exe Token: SeDebugPrivilege 1176 Au_.exe Token: SeDebugPrivilege 1176 Au_.exe Token: SeDebugPrivilege 1176 Au_.exe Token: SeDebugPrivilege 1176 Au_.exe Token: SeDebugPrivilege 1176 Au_.exe Token: SeDebugPrivilege 1176 Au_.exe Token: SeDebugPrivilege 1176 Au_.exe Token: SeDebugPrivilege 1176 Au_.exe Token: SeDebugPrivilege 1176 Au_.exe Token: SeDebugPrivilege 1176 Au_.exe Token: SeDebugPrivilege 1176 Au_.exe Token: SeShutdownPrivilege 1176 Au_.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3624 LogonUI.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4036 wrote to memory of 1176 4036 701658ca4de02ee07ec4ccc34ded3eb0_NeikiAnalytics.exe 83 PID 4036 wrote to memory of 1176 4036 701658ca4de02ee07ec4ccc34ded3eb0_NeikiAnalytics.exe 83 PID 4036 wrote to memory of 1176 4036 701658ca4de02ee07ec4ccc34ded3eb0_NeikiAnalytics.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\701658ca4de02ee07ec4ccc34ded3eb0_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\701658ca4de02ee07ec4ccc34ded3eb0_NeikiAnalytics.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4036 -
C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe"C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe" _?=C:\Users\Admin\AppData\Local\Temp\2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1176
-
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x4 /state0:0xa397c055 /state1:0x41c64e6d1⤵
- Modifies data under HKEY_USERS
- Suspicious use of SetWindowsHookEx
PID:3624
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
32.5MB
MD5588ec0b41aec420aa6b898c86b571d2e
SHA1d92e663e2a197d436dd112951814c212e41be9a3
SHA256890109c062672432707f1a6b44c90e57e0e131aec4e8c1f7ef24b0058e0da784
SHA512fed27edee1287dfd201c45918bcea1e6edcd6f7ff48180d9047a6449a1bf45bd69facf57edb65333bd8b34bbdd89958630181bf943b8f0baba98198b144951c9
-
Filesize
14KB
MD54814167aa1c7ec892e84907094646faa
SHA1a57a5ecbdfa9a8777a3c587f1acb02b783afc5ee
SHA25632dd7269abf5a0e5db888e307d9df313e87cef4f1b597965a9d8e00934658822
SHA512fb1f35e393997ecd2301f371892b59574ee6b666095c3a435336160481f6ef7ed5635c90ce5d2cf88e5ef4a5affb46cb841b7d17e7981bd6e998531193f5d067
-
Filesize
20KB
MD5e541458cfe66ef95ffbea40eaaa07289
SHA1caec1233f841ee72004231a3027b13cdeb13274c
SHA2563bce87b66d9272c82421920c34b0216e12c57a437d1955c36f23c74c1a01d420
SHA5120bf6313e4cb7bbdcfba828fb791540b630adc58c43aa4b5ba77790367d0f34f76077cd84cc62e2a2c98c788a88547f32a11e549873d172c5aa2753124847cd0c
-
Filesize
1.2MB
MD5701658ca4de02ee07ec4ccc34ded3eb0
SHA1a4e1c8bd74940e2bfeeed9588fc578add6c2b92b
SHA256c962e389ee68c863b2aa54f7d1147ef2e13eef43a4f7a3033ab291eb422db628
SHA51265e5107a08ac3da4639a11f4e1bf5a6d2e635fe61c733d6999a4c30e4721a1c10974f1d605a1def383fbd1443772b74a915cc8b46c9b251d9c9d91a49905de7c