Analysis

  • max time kernel
    141s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    01/06/2024, 07:34

General

  • Target

    92d92095d225aa0c32c532c906104b50_NeikiAnalytics.exe

  • Size

    91KB

  • MD5

    92d92095d225aa0c32c532c906104b50

  • SHA1

    ac76e50703cec78747ae2c6d10e66e78b2b39810

  • SHA256

    141a532522bff35c6c29f8d828a3b7e8305d53e3b0c3ecd1c9acdb0306686962

  • SHA512

    29bcba7cdcf823b648654daa51b2cdff7779c4cdb6111073fc48d33ecab09910a2e38abfd51301cdf55a00c929ba3efc6a99647037cd4f808382d8f534a016c5

  • SSDEEP

    1536:XRsjdLaslqdBXvTUL0Hnouy8VjDRsjdLaslqdBXvTUL0Hnouy8VjU:XOJKqsout9DOJKqsout9U

Score
10/10

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 2 IoCs
  • Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Disables RegEdit via registry modification 2 IoCs
  • Disables use of System Restore points 1 TTPs
  • Executes dropped EXE 13 IoCs
  • Loads dropped DLL 22 IoCs
  • Modifies system executable filetype association 2 TTPs 13 IoCs
  • UPX packed file 34 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 5 IoCs
  • Drops desktop.ini file(s) 4 IoCs
  • Enumerates connected drives 3 TTPs 22 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in System32 directory 20 IoCs
  • Drops file in Windows directory 5 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Control Panel 4 IoCs
  • Modifies Internet Explorer settings 1 TTPs 9 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SendNotifyMessage 2 IoCs
  • Suspicious use of SetWindowsHookEx 15 IoCs
  • Suspicious use of WriteProcessMemory 52 IoCs
  • System policy modification 1 TTPs 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\92d92095d225aa0c32c532c906104b50_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\92d92095d225aa0c32c532c906104b50_NeikiAnalytics.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Modifies visibility of file extensions in Explorer
    • Modifies visiblity of hidden/system files in Explorer
    • Disables RegEdit via registry modification
    • Loads dropped DLL
    • Modifies system executable filetype association
    • Adds Run key to start application
    • Drops desktop.ini file(s)
    • Enumerates connected drives
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies Control Panel
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    • System policy modification
    PID:2772
    • C:\Windows\xk.exe
      C:\Windows\xk.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:2356
    • C:\Windows\SysWOW64\IExplorer.exe
      C:\Windows\system32\IExplorer.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:992
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:800
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:2636
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:2628
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:2316
    • C:\Windows\xk.exe
      C:\Windows\xk.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:532
    • C:\Windows\SysWOW64\IExplorer.exe
      C:\Windows\system32\IExplorer.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:2152
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:428
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:1136
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:1656
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:2364
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:900
  • C:\Program Files (x86)\Microsoft Office\Office14\OUTLOOK.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\OUTLOOK.EXE" -Embedding
    1⤵
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of SetWindowsHookEx
    PID:1488

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\FORMS\FRMCACHE.DAT

    Filesize

    230KB

    MD5

    135ecbd695ab14db24f10fb2bffa1b28

    SHA1

    f56a76c6a2dffe19ca51ae6333c02eff4e451aaf

    SHA256

    5ed9794a366707f619f33fd0b4dae27c1817191c9d2e119cb64730b63b2a4da0

    SHA512

    3529138d139abf887bff1d40de114c0895d868a2a4c3b30b04acd15372a1622902351d5d0212b361c87daa5acba7b0cac6c27ac248810243204b61517ced0de9

  • C:\Users\Admin\AppData\Local\Microsoft\FORMS\FRMCACHE.DAT

    Filesize

    230KB

    MD5

    a829f0e4aa6947866d6d8ed6d78aa1fe

    SHA1

    c4ddf6e46c422bcf164b357afe72b4ef4466ea0d

    SHA256

    3f035f8a23a207df9be8c4bb0c4e32e3b657509f3574efae480300e0bcd9f6d4

    SHA512

    4db953152f64ed4d002bbd211e56a1219429366de7b12a1b5b48b747321cd2a9c91f9996e36f524465211d5b5ee8f0e4b4cad3372ff73d12c45bfce26e2999d1

  • C:\Users\Admin\AppData\Local\Microsoft\Outlook\mapisvc.inf

    Filesize

    1KB

    MD5

    48dd6cae43ce26b992c35799fcd76898

    SHA1

    8e600544df0250da7d634599ce6ee50da11c0355

    SHA256

    7bfe1f3691e2b4fb4d61fbf5e9f7782fbe49da1342dbd32201c2cc8e540dbd1a

    SHA512

    c1b9322c900f5be0ad166ddcfec9146918fb2589a17607d61490fd816602123f3af310a3e6d98a37d16000d4acbbcd599236f03c3c7f9376aeba7a489b329f31

  • C:\Users\Admin\AppData\Local\WINDOWS\SERVICES.EXE

    Filesize

    91KB

    MD5

    b84d95642c5b57c111116bed5bac7b4c

    SHA1

    bad370e98c4a3c7c7cde4079f693d35e220ab09e

    SHA256

    6312ba481aa60f661f59eb02520939d4888fe1974c9d64c57d9de508461d48a9

    SHA512

    a09c6984b50e10466be16796ff4b46c0bb36f931ad8b33667f6de13141dbe13cd53ee1d95ad83fcb9857237d3bad3864af29edb47af651b2e77fbde83b7b6bae

  • C:\Users\Admin\AppData\Local\winlogon.exe

    Filesize

    91KB

    MD5

    92d92095d225aa0c32c532c906104b50

    SHA1

    ac76e50703cec78747ae2c6d10e66e78b2b39810

    SHA256

    141a532522bff35c6c29f8d828a3b7e8305d53e3b0c3ecd1c9acdb0306686962

    SHA512

    29bcba7cdcf823b648654daa51b2cdff7779c4cdb6111073fc48d33ecab09910a2e38abfd51301cdf55a00c929ba3efc6a99647037cd4f808382d8f534a016c5

  • C:\Windows\xk.exe

    Filesize

    91KB

    MD5

    5e6b52638fc92225cfc963f8a3d2aa21

    SHA1

    92140c32b06c2121178622ecbae49052f83d4f3c

    SHA256

    139f2280735f4e5f1b5abf6f22e004d8f23cae40c77b950e9e35f7815155cf25

    SHA512

    fc77bfaccb85433c7dea1cc4ea9619453618a3ac527578d51484599a212c1068629b5a71ae2a6438acddf8cbc749c4b36b9fb932698e50455d7b3007e1e6aff9

  • C:\Windows\xk.exe

    Filesize

    91KB

    MD5

    1b183ea91d32381f8a0189c977b213ec

    SHA1

    91a55833e8282685fdc733e37ea566c40e72cf22

    SHA256

    bde63e50cf34b0ed884ccbf7e7b99bee7fe861da30c9df6e2a9c3883fc63ac47

    SHA512

    c9855f20df37d05ea2b5ca1d7b5df008181bacc1c0d46a30c2809aae151cde1a2e3de40bb0910f0c24fdb6835cbe2b577ca0f3988ae7da0b42ef06f69e8d9024

  • \Users\Admin\AppData\Local\WINDOWS\CSRSS.EXE

    Filesize

    91KB

    MD5

    d0e339bf8cd4a6e10105ee595d120073

    SHA1

    cfda28c90f24ea41a19448556d024286d74a74cf

    SHA256

    b970695c0075dd24ca91997813a94bcfc44a0cb49d3d8de0444547b09f571dd6

    SHA512

    2aeb2dd59e09c742e0911345da86e995d06fbf2a2f2ec0c90f98d65f68e2fb94e8704976605fcad7a4df4e05cf5f6dfb5bb1e128c09ab45395d20bf0368ef6f0

  • \Users\Admin\AppData\Local\WINDOWS\CSRSS.EXE

    Filesize

    91KB

    MD5

    8a85f5779246b5700cd533b94c27c4ee

    SHA1

    c8045bd0c96b9a4571b30726f2a0a75df99f2180

    SHA256

    e05eb87f57607ae5b786e72e8eeb7d28ded38aa2d52b862aa92caec7403244f7

    SHA512

    ef3f9210876585577ddff57302a2940818708636c5d9b39ddeda3d6053f23b90d8b8d44ef9b7f6e79265b53a052733bb45e27fdec471d5d2f9f5940f6c3a016b

  • \Users\Admin\AppData\Local\WINDOWS\LSASS.EXE

    Filesize

    91KB

    MD5

    6fb7d30f9405cc794ce1602bd9fd63f7

    SHA1

    f97c07bc2a9ef0f617c6761c062864c9392c9893

    SHA256

    2775e41911610a36803c29c558cf201a0ec2501d3aa548674b8745350a8b466a

    SHA512

    7ab7357f5b712c7b6c1f0d1fae00af962137500e2d1539a4a1c6fead35bb8d55da365f71d01b089139dd0e6e21f721fd61aadb73e66112969e4343dd7aca9c76

  • \Users\Admin\AppData\Local\WINDOWS\SERVICES.EXE

    Filesize

    91KB

    MD5

    eec48371a91cb2101f4f109802dcf1b5

    SHA1

    5f6ddaacf94ec42f7412066657beb09ecbeb9cf8

    SHA256

    9bc24cae75af97ec62d3d4fc3eb76aa38af8cf52049e53b9bf334d8f22c095ec

    SHA512

    78643c6d942899def88b1f7e4ce572af18612cb41ca454c24606f3d192616c29d1fdcc8ae6fe5a0824a0684de6afa0b6de8c66eb12163b738932f98dd6981ff5

  • \Users\Admin\AppData\Local\WINDOWS\SMSS.EXE

    Filesize

    91KB

    MD5

    1efaee30aa8efb18bd8039f60a16289f

    SHA1

    518de41d8ee01cc027217da543588f2374fe4186

    SHA256

    f053e212fe87e52e61d221ba841a0488e9cc435ba04e161fdd059ad69d56bef8

    SHA512

    aaa3583f7372872eb09ac44b211fb01142aa1367914eff054c9779e388e4a6575b92a5be0dbcba687fe39f64451d6905d270e5eb32bdbe25f11f985bd95560d7

  • \Users\Admin\AppData\Local\WINDOWS\WINLOGON.EXE

    Filesize

    91KB

    MD5

    71e100e0010a8b890d16ecf37005038d

    SHA1

    8f5a7ef5f726cbfe9b35835d2bbd67bd2d3ace11

    SHA256

    a53e93e139a97fa64f7c17e0afbe61200451daf062b2dab8e83285b939d05df6

    SHA512

    5421c42a7f99ba3437c054184d295af3fa919a831a1f29de3da19436daea6fa39f519897a2424cf1ec52945050b0ffde0487c9cb970ea9f60d8193757c4323f8

  • \Users\Admin\AppData\Local\WINDOWS\WINLOGON.EXE

    Filesize

    91KB

    MD5

    d24bd41caae20f3ebfc5b0368ce7b346

    SHA1

    fa4f5dca2f5b85e7c8e0de77ce94ae861cadb92f

    SHA256

    778dbe5e8c937efab5f941dc959f8b8143fad1c29e630ef67f5412aa6ca96cbe

    SHA512

    f4303ec2e6fd8455c5ddca3e24061183b59cf8feb4bd625fadc6e81a70157d11862d9af17df0d10c39078f45a08508269f169dfa4223652276208dffc3180111

  • \Windows\SysWOW64\IExplorer.exe

    Filesize

    91KB

    MD5

    1f5165dc6c1a7f88baa701eee9752ed2

    SHA1

    cb22bc87b7a061a308fb48ac6bb8c0788f5c9699

    SHA256

    6dbbff3492a1a61e7b71557c804d86832d29e953568adfe0b17607f83e812185

    SHA512

    a21d36bac61b2fa4e1ad522dc70b233baa7f7d073d23a3d10b3ae1a70f7f6cc5ecbe524ae2d6193befa96a4f3ffefea078fa7ca3f6286ad4888b7fa063f85b75

  • \Windows\SysWOW64\IExplorer.exe

    Filesize

    91KB

    MD5

    d6a61ae354eee3f47750a4dea2a0f3ce

    SHA1

    a2d28c9bb05064d855d98fbd47955a538da3115a

    SHA256

    92577367231435b97464a50ba6d63e0d94e245f9df091e8404d8c5c468b5e988

    SHA512

    f318819dca6a5385d854236d1b09517e0ecf854833627d68ffca045842e349ba99e7e27d0a4a51068e83486b08eb469114ccf0058fce7ae72407f67736ec1552

  • memory/428-267-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/532-241-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/800-146-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/900-303-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/900-313-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/992-128-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/992-124-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/1136-271-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/1488-332-0x000000005FFF0000-0x0000000060000000-memory.dmp

    Filesize

    64KB

  • memory/1656-292-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/2152-248-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/2316-175-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/2356-115-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/2364-295-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/2628-163-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/2636-152-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/2636-148-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/2772-244-0x00000000026A0000-0x00000000026CF000-memory.dmp

    Filesize

    188KB

  • memory/2772-0-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/2772-278-0x00000000026A0000-0x00000000026CF000-memory.dmp

    Filesize

    188KB

  • memory/2772-280-0x00000000026A0000-0x00000000026CF000-memory.dmp

    Filesize

    188KB

  • memory/2772-256-0x00000000026A0000-0x00000000026CF000-memory.dmp

    Filesize

    188KB

  • memory/2772-166-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/2772-147-0x00000000026A0000-0x00000000026CF000-memory.dmp

    Filesize

    188KB

  • memory/2772-231-0x00000000026A0000-0x00000000026CF000-memory.dmp

    Filesize

    188KB

  • memory/2772-123-0x00000000026A0000-0x00000000026CF000-memory.dmp

    Filesize

    188KB

  • memory/2772-227-0x00000000026A0000-0x00000000026CF000-memory.dmp

    Filesize

    188KB

  • memory/2772-243-0x00000000026A0000-0x00000000026CF000-memory.dmp

    Filesize

    188KB

  • memory/2772-111-0x00000000026A0000-0x00000000026CF000-memory.dmp

    Filesize

    188KB

  • memory/2772-106-0x00000000026A0000-0x00000000026CF000-memory.dmp

    Filesize

    188KB

  • memory/2772-457-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB