Analysis
-
max time kernel
120s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
02/06/2024, 21:25
Static task
static1
Behavioral task
behavioral1
Sample
6ae1e92879dc429246c1509cad6129e0_NeikiAnalytics.dll
Resource
win7-20240508-en
General
-
Target
6ae1e92879dc429246c1509cad6129e0_NeikiAnalytics.dll
-
Size
120KB
-
MD5
6ae1e92879dc429246c1509cad6129e0
-
SHA1
ccb377d396212e01a9d29582aecc54590fbaf59e
-
SHA256
09988d916fca14f17ba517def1c8b54211dd256525d4378cf6742b5dadf43c40
-
SHA512
a5a8068ffc0416d112ee090ac3b402a648ce2cd375f18a4cfbf7ff228eaddd6c499826f0163cb44a73d545b61e76fe7d73c018da095db2dd9177279245f4d84d
-
SSDEEP
1536:uR/E4oeqEtUifMUXFPLH2k1KLSyp9wHVsSZvcWfkI94iCEkLqVG8t4:LeqEtUifVLH51LVsSJBfkI9HkLovt
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Signatures
-
Modifies firewall policy service 2 TTPs 6 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" f76226f.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" f76226f.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "1" f76226f.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" f76281a.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" f76281a.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "1" f76281a.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" f76226f.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" f76281a.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" f76281a.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" f76281a.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" f76281a.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" f76281a.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" f76226f.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" f76226f.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" f76226f.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" f76281a.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" f76226f.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" f76226f.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" f76226f.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" f76281a.exe -
Executes dropped EXE 3 IoCs
pid Process 1228 f76226f.exe 2780 f76281a.exe 308 f7643a5.exe -
Loads dropped DLL 6 IoCs
pid Process 3000 rundll32.exe 3000 rundll32.exe 3000 rundll32.exe 3000 rundll32.exe 3000 rundll32.exe 3000 rundll32.exe -
resource yara_rule behavioral1/memory/1228-16-0x0000000000560000-0x000000000161A000-memory.dmp upx behavioral1/memory/1228-20-0x0000000000560000-0x000000000161A000-memory.dmp upx behavioral1/memory/1228-21-0x0000000000560000-0x000000000161A000-memory.dmp upx behavioral1/memory/1228-18-0x0000000000560000-0x000000000161A000-memory.dmp upx behavioral1/memory/1228-17-0x0000000000560000-0x000000000161A000-memory.dmp upx behavioral1/memory/1228-15-0x0000000000560000-0x000000000161A000-memory.dmp upx behavioral1/memory/1228-14-0x0000000000560000-0x000000000161A000-memory.dmp upx behavioral1/memory/1228-22-0x0000000000560000-0x000000000161A000-memory.dmp upx behavioral1/memory/1228-19-0x0000000000560000-0x000000000161A000-memory.dmp upx behavioral1/memory/1228-23-0x0000000000560000-0x000000000161A000-memory.dmp upx behavioral1/memory/1228-51-0x0000000000560000-0x000000000161A000-memory.dmp upx behavioral1/memory/1228-52-0x0000000000560000-0x000000000161A000-memory.dmp upx behavioral1/memory/1228-64-0x0000000000560000-0x000000000161A000-memory.dmp upx behavioral1/memory/1228-65-0x0000000000560000-0x000000000161A000-memory.dmp upx behavioral1/memory/1228-68-0x0000000000560000-0x000000000161A000-memory.dmp upx behavioral1/memory/1228-69-0x0000000000560000-0x000000000161A000-memory.dmp upx behavioral1/memory/1228-70-0x0000000000560000-0x000000000161A000-memory.dmp upx behavioral1/memory/1228-71-0x0000000000560000-0x000000000161A000-memory.dmp upx behavioral1/memory/1228-86-0x0000000000560000-0x000000000161A000-memory.dmp upx behavioral1/memory/1228-87-0x0000000000560000-0x000000000161A000-memory.dmp upx behavioral1/memory/1228-128-0x0000000000560000-0x000000000161A000-memory.dmp upx behavioral1/memory/1228-152-0x0000000000560000-0x000000000161A000-memory.dmp upx behavioral1/memory/2780-164-0x0000000000920000-0x00000000019DA000-memory.dmp upx behavioral1/memory/2780-190-0x0000000000920000-0x00000000019DA000-memory.dmp upx -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" f76226f.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" f76226f.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" f76281a.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" f76281a.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" f76281a.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\Svc f76281a.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" f76226f.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" f76226f.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" f76226f.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\Svc f76226f.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" f76281a.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" f76226f.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" f76281a.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" f76281a.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" f76281a.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" f76226f.exe -
Enumerates connected drives 3 TTPs 15 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\M: f76226f.exe File opened (read-only) \??\P: f76226f.exe File opened (read-only) \??\R: f76226f.exe File opened (read-only) \??\S: f76226f.exe File opened (read-only) \??\J: f76226f.exe File opened (read-only) \??\G: f76226f.exe File opened (read-only) \??\O: f76226f.exe File opened (read-only) \??\T: f76226f.exe File opened (read-only) \??\E: f76226f.exe File opened (read-only) \??\Q: f76226f.exe File opened (read-only) \??\N: f76226f.exe File opened (read-only) \??\I: f76226f.exe File opened (read-only) \??\K: f76226f.exe File opened (read-only) \??\L: f76226f.exe File opened (read-only) \??\H: f76226f.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\f7622ec f76226f.exe File opened for modification C:\Windows\SYSTEM.INI f76226f.exe File created C:\Windows\f767668 f76281a.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 1228 f76226f.exe 1228 f76226f.exe 2780 f76281a.exe -
Suspicious use of AdjustPrivilegeToken 41 IoCs
description pid Process Token: SeDebugPrivilege 1228 f76226f.exe Token: SeDebugPrivilege 1228 f76226f.exe Token: SeDebugPrivilege 1228 f76226f.exe Token: SeDebugPrivilege 1228 f76226f.exe Token: SeDebugPrivilege 1228 f76226f.exe Token: SeDebugPrivilege 1228 f76226f.exe Token: SeDebugPrivilege 1228 f76226f.exe Token: SeDebugPrivilege 1228 f76226f.exe Token: SeDebugPrivilege 1228 f76226f.exe Token: SeDebugPrivilege 1228 f76226f.exe Token: SeDebugPrivilege 1228 f76226f.exe Token: SeDebugPrivilege 1228 f76226f.exe Token: SeDebugPrivilege 1228 f76226f.exe Token: SeDebugPrivilege 1228 f76226f.exe Token: SeDebugPrivilege 1228 f76226f.exe Token: SeDebugPrivilege 1228 f76226f.exe Token: SeDebugPrivilege 1228 f76226f.exe Token: SeDebugPrivilege 1228 f76226f.exe Token: SeDebugPrivilege 1228 f76226f.exe Token: SeDebugPrivilege 1228 f76226f.exe Token: SeDebugPrivilege 1228 f76226f.exe Token: SeDebugPrivilege 2780 f76281a.exe Token: SeDebugPrivilege 2780 f76281a.exe Token: SeDebugPrivilege 2780 f76281a.exe Token: SeDebugPrivilege 2780 f76281a.exe Token: SeDebugPrivilege 2780 f76281a.exe Token: SeDebugPrivilege 2780 f76281a.exe Token: SeDebugPrivilege 2780 f76281a.exe Token: SeDebugPrivilege 2780 f76281a.exe Token: SeDebugPrivilege 2780 f76281a.exe Token: SeDebugPrivilege 2780 f76281a.exe Token: SeDebugPrivilege 2780 f76281a.exe Token: SeDebugPrivilege 2780 f76281a.exe Token: SeDebugPrivilege 2780 f76281a.exe Token: SeDebugPrivilege 2780 f76281a.exe Token: SeDebugPrivilege 2780 f76281a.exe Token: SeDebugPrivilege 2780 f76281a.exe Token: SeDebugPrivilege 2780 f76281a.exe Token: SeDebugPrivilege 2780 f76281a.exe Token: SeDebugPrivilege 2780 f76281a.exe Token: SeDebugPrivilege 2780 f76281a.exe -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 2992 wrote to memory of 3000 2992 rundll32.exe 28 PID 2992 wrote to memory of 3000 2992 rundll32.exe 28 PID 2992 wrote to memory of 3000 2992 rundll32.exe 28 PID 2992 wrote to memory of 3000 2992 rundll32.exe 28 PID 2992 wrote to memory of 3000 2992 rundll32.exe 28 PID 2992 wrote to memory of 3000 2992 rundll32.exe 28 PID 2992 wrote to memory of 3000 2992 rundll32.exe 28 PID 3000 wrote to memory of 1228 3000 rundll32.exe 29 PID 3000 wrote to memory of 1228 3000 rundll32.exe 29 PID 3000 wrote to memory of 1228 3000 rundll32.exe 29 PID 3000 wrote to memory of 1228 3000 rundll32.exe 29 PID 1228 wrote to memory of 1104 1228 f76226f.exe 19 PID 1228 wrote to memory of 1156 1228 f76226f.exe 20 PID 1228 wrote to memory of 1188 1228 f76226f.exe 21 PID 1228 wrote to memory of 1996 1228 f76226f.exe 23 PID 1228 wrote to memory of 2992 1228 f76226f.exe 27 PID 1228 wrote to memory of 3000 1228 f76226f.exe 28 PID 1228 wrote to memory of 3000 1228 f76226f.exe 28 PID 3000 wrote to memory of 2780 3000 rundll32.exe 30 PID 3000 wrote to memory of 2780 3000 rundll32.exe 30 PID 3000 wrote to memory of 2780 3000 rundll32.exe 30 PID 3000 wrote to memory of 2780 3000 rundll32.exe 30 PID 3000 wrote to memory of 308 3000 rundll32.exe 31 PID 3000 wrote to memory of 308 3000 rundll32.exe 31 PID 3000 wrote to memory of 308 3000 rundll32.exe 31 PID 3000 wrote to memory of 308 3000 rundll32.exe 31 PID 1228 wrote to memory of 1104 1228 f76226f.exe 19 PID 1228 wrote to memory of 1156 1228 f76226f.exe 20 PID 1228 wrote to memory of 1188 1228 f76226f.exe 21 PID 1228 wrote to memory of 2780 1228 f76226f.exe 30 PID 1228 wrote to memory of 2780 1228 f76226f.exe 30 PID 1228 wrote to memory of 308 1228 f76226f.exe 31 PID 1228 wrote to memory of 308 1228 f76226f.exe 31 PID 2780 wrote to memory of 1104 2780 f76281a.exe 19 PID 2780 wrote to memory of 1156 2780 f76281a.exe 20 PID 2780 wrote to memory of 1188 2780 f76281a.exe 21 -
System policy modification 1 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" f76226f.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" f76281a.exe
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1104
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1156
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1188
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\6ae1e92879dc429246c1509cad6129e0_NeikiAnalytics.dll,#12⤵
- Suspicious use of WriteProcessMemory
PID:2992 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\6ae1e92879dc429246c1509cad6129e0_NeikiAnalytics.dll,#13⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:3000 -
C:\Users\Admin\AppData\Local\Temp\f76226f.exeC:\Users\Admin\AppData\Local\Temp\f76226f.exe4⤵
- Modifies firewall policy service
- UAC bypass
- Windows security bypass
- Executes dropped EXE
- Windows security modification
- Checks whether UAC is enabled
- Enumerates connected drives
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1228
-
-
C:\Users\Admin\AppData\Local\Temp\f76281a.exeC:\Users\Admin\AppData\Local\Temp\f76281a.exe4⤵
- Modifies firewall policy service
- UAC bypass
- Windows security bypass
- Executes dropped EXE
- Windows security modification
- Checks whether UAC is enabled
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2780
-
-
C:\Users\Admin\AppData\Local\Temp\f7643a5.exeC:\Users\Admin\AppData\Local\Temp\f7643a5.exe4⤵
- Executes dropped EXE
PID:308
-
-
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:1996
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
3Disable or Modify Tools
3Modify Registry
5Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
257B
MD58108a2276bc2c02aeb2f8b9ba31e8f99
SHA10705b8430c00df3e03c6128efec5ff83bbde0c51
SHA2567cd1c7e0acddc587b9f8adb5979302eb3adf07466ada61704ebc12fc43b2bd03
SHA5127a38a09f2d3fe57144f634aff3e0e8e189173c81495e6fadccb12e9c5fa33d3f696aa65bee9ef05239dac0a9fe7e137e38e2e5a8cfdfb290bfdc571a78d9c62c
-
Filesize
97KB
MD54bf6b715dcd66f952e8e1902777d9581
SHA17d00b5910515c2cc9e3f08e73974fdf89032df98
SHA2565112d1b9a1e43e612c75e2b6c48e5694c5fd43199d960dd80af743f08247d0fc
SHA512b08d0dfe6b4cf12d8424e202056dd86279050dd20bba156627699829ab6bdd63d869b5dee8ff152e57f5790b9a4b3fdae8f0a4e01cfc6d88ff64065ca16493db