Analysis

  • max time kernel
    149s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03/06/2024, 15:30

General

  • Target

    05b0ecc5437ee37d57f6bee7f49c6da0_NeikiAnalytics.dll

  • Size

    772KB

  • MD5

    05b0ecc5437ee37d57f6bee7f49c6da0

  • SHA1

    eed97e35bf9b5b481a9a2229ebd79c0dbf1c24c7

  • SHA256

    16039a28c20113cadf04d3777b3edc261e88e5ac809c7cf0fc99f8a8f87de351

  • SHA512

    1d0f78a863a2b3f2b88af41e15cda51f2f2f4bfc8bb7b04d0532e4ac9245e13969ef28ea3e9e2e83fc0535c08e34ac764cb212bc73b3fcf4775efb9a342e7c1d

  • SSDEEP

    6144:Yi05kH9OyU2uv5SRf/FWgFgtdgqIRAUW9kVYeVprU4wfhTv5xD2ZP0GVGdXcukT4:rrHGPv5SmpteDmUWuVZkxikdXcq

Score
6/10

Malware Config

Signatures

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in System32 directory 2 IoCs
  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Modifies registry class 10 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 14 IoCs
  • Suspicious use of UnmapMainImage 1 IoCs
  • Suspicious use of WriteProcessMemory 24 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\05b0ecc5437ee37d57f6bee7f49c6da0_NeikiAnalytics.dll,#1
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    PID:2084
  • C:\Windows\system32\dllhost.exe
    C:\Windows\system32\dllhost.exe
    1⤵
      PID:4940
    • C:\Windows\system32\Magnify.exe
      C:\Windows\system32\Magnify.exe
      1⤵
        PID:5016
      • C:\Windows\System32\cmd.exe
        "C:\Windows\System32\cmd.exe" /c C:\Users\Admin\AppData\Local\Temp\kuXDxjs.cmd
        1⤵
          PID:4840
        • C:\Windows\System32\cmd.exe
          "C:\Windows\System32\cmd.exe" /c schtasks.exe /Delete /F /TN "User_Feed_Synchronization-{c8fa0120-b654-32d4-0e47-613d2c4281e9}"
          1⤵
          • Suspicious use of WriteProcessMemory
          PID:4912
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /Delete /F /TN "User_Feed_Synchronization-{c8fa0120-b654-32d4-0e47-613d2c4281e9}"
            2⤵
              PID:4528
          • C:\Windows\system32\EduPrintProv.exe
            C:\Windows\system32\EduPrintProv.exe
            1⤵
              PID:1780
            • C:\Windows\system32\grpconv.exe
              C:\Windows\system32\grpconv.exe
              1⤵
                PID:3492
              • C:\Windows\system32\SystemPropertiesAdvanced.exe
                C:\Windows\system32\SystemPropertiesAdvanced.exe
                1⤵
                  PID:4032
                • C:\Windows\System32\cmd.exe
                  "C:\Windows\System32\cmd.exe" /c C:\Users\Admin\AppData\Local\Temp\vQ4R.cmd
                  1⤵
                  • Drops file in System32 directory
                  PID:4048
                • C:\Windows\System32\fodhelper.exe
                  "C:\Windows\System32\fodhelper.exe"
                  1⤵
                  • Suspicious use of WriteProcessMemory
                  PID:4656
                  • C:\Windows\system32\cmd.exe
                    "C:\Windows\system32\cmd.exe" /c C:\Users\Admin\AppData\Local\Temp\W4er.cmd
                    2⤵
                    • Suspicious use of WriteProcessMemory
                    PID:888
                    • C:\Windows\system32\schtasks.exe
                      schtasks.exe /Create /F /TN "Arqdxytqgr" /SC minute /MO 60 /TR "C:\Windows\system32\3545\SystemPropertiesAdvanced.exe" /RL highest
                      3⤵
                      • Creates scheduled task(s)
                      PID:2972

                Network

                      MITRE ATT&CK Enterprise v15

                      Replay Monitor

                      Loading Replay Monitor...

                      Downloads

                      • C:\Users\Admin\AppData\Local\Temp\04EDC.tmp

                        Filesize

                        772KB

                        MD5

                        e356f90ae7719977dfd6f37bed39fb04

                        SHA1

                        3a70581275d14abb70cf3f1e3c80375cbcbd229a

                        SHA256

                        5e594c27a250369924d363a2818cbf9f343f3ef3c5f1000d86ae77593c084666

                        SHA512

                        df47740d8cd50f8cde749b5a1bfd64f9cee31f8c9e8f9c96495412bd7d86288e46cff15bae9183272dea4a62e59f4f74eefdce8d3fed77047f2545bb996ae4ec

                      • C:\Users\Admin\AppData\Local\Temp\A4CB8.tmp

                        Filesize

                        776KB

                        MD5

                        b4816ced25e9e29b6307c964fc361e3b

                        SHA1

                        4fd0b066eb8355828b357f9cfb1790fb2f822d36

                        SHA256

                        9b17e729859526b9ddb6ce940269bf8efad57afe28e059808e488d0d2dfc1b0b

                        SHA512

                        431a46ecf7b9b591b183db992de5605b497b6d0a24f7c9c11d2af0b00fef7e00c9c5f1f85924dde72b6eb8d9212c453279aa66de41443acb9e1da67106f58301

                      • C:\Users\Admin\AppData\Local\Temp\W4er.cmd

                        Filesize

                        145B

                        MD5

                        2e009f33d5fdc67299f9c55e04f1d196

                        SHA1

                        240401d655fb6ac3d9a41d629f207e5b5cf202dc

                        SHA256

                        3c09419402789164166a3c24cff09fef07014ba8091810ece9c99eda8c27537f

                        SHA512

                        98d6d41a71609cca2a278b7ce30c532a76267b967b1d78c59a6d2e6251d45f6152b36fbe7669feba995064b59c4cc0fc8740efd3497b7de705a3a56edae3b2c7

                      • C:\Users\Admin\AppData\Local\Temp\kuXDxjs.cmd

                        Filesize

                        230B

                        MD5

                        2e1d5d7b2cdcbec9433b65137c83fd2b

                        SHA1

                        1606898b9aa0687f808c37e9b8435439c07997e1

                        SHA256

                        a7a57a48c8642d70365d616002149d7134c53b1ff3e9f0ad23cd2d19999f868d

                        SHA512

                        0bdb6d303570472afeba42cbd374130a943b01c0fa6d2e5adef30c85306ab65cc3a9635689675e00ee3dcc7fda34995260e38b92ac213bff69de60fb66a198f3

                      • C:\Users\Admin\AppData\Local\Temp\vQ4R.cmd

                        Filesize

                        207B

                        MD5

                        dbf1b4ff7a224060560311e793d409a3

                        SHA1

                        eee0b37990164c1cf4cc6915df5156dfef33aaf0

                        SHA256

                        4399af7f04a67b00187c339cb1e43f00478ec6c10525dbe866ba8f44d6b8993b

                        SHA512

                        d52b52a04bc5a204ef824db8d684611764d7a9a82d587f6b1d395770cff7cd8c601319c7d35f463cfbfd166f6c9a6ece60e1d9d4a1d04bd9da79f8ffc9c2cb18

                      • C:\Users\Admin\AppData\Roaming\7ibrAC\Magnify.exe

                        Filesize

                        639KB

                        MD5

                        4029890c147e3b4c6f41dfb5f9834d42

                        SHA1

                        10d08b3f6dabe8171ca2dd52e5737e3402951c75

                        SHA256

                        57137f784594793dc0669042ccd3a71ddbfedeb77da6d97173d82613e08add4d

                        SHA512

                        dbdc60f8692f13c23dbed0b76e9c6758a5b413bd6aaf4e4d0ba74e69c0871eb759da95c3f85a31d972388b545dcf3bb8abbcbedd29a1e7e48c065130b98b893d

                      • C:\Users\Admin\AppData\Roaming\MICROS~1\Windows\STARTM~1\Programs\Startup\Ihmks.lnk

                        Filesize

                        904B

                        MD5

                        4e87245ad63761b6b8c7f29fb439a953

                        SHA1

                        235e014ca5a13fed7cc06b458bb169bd55159849

                        SHA256

                        b548a4ddfbeee972292ad366ba921b55b3b0462924f829acc56a383c43edfdc9

                        SHA512

                        fcaef5d498e637ac6d854fb93fc886a46187907499bcab84c1eebf8ca115b749eb8ea77c14355237a1112ed7f0f65ca9dd90eb019ca078f7ff97512c03faa5ee

                      • memory/2084-1-0x0000000140000000-0x00000001400C1000-memory.dmp

                        Filesize

                        772KB

                      • memory/2084-2-0x0000028626A40000-0x0000028626A47000-memory.dmp

                        Filesize

                        28KB

                      • memory/2084-6-0x0000000140000000-0x00000001400C1000-memory.dmp

                        Filesize

                        772KB

                      • memory/3412-16-0x0000000140000000-0x00000001400C1000-memory.dmp

                        Filesize

                        772KB

                      • memory/3412-10-0x0000000140000000-0x00000001400C1000-memory.dmp

                        Filesize

                        772KB

                      • memory/3412-24-0x0000000140000000-0x00000001400C1000-memory.dmp

                        Filesize

                        772KB

                      • memory/3412-22-0x0000000140000000-0x00000001400C1000-memory.dmp

                        Filesize

                        772KB

                      • memory/3412-20-0x0000000140000000-0x00000001400C1000-memory.dmp

                        Filesize

                        772KB

                      • memory/3412-19-0x0000000140000000-0x00000001400C1000-memory.dmp

                        Filesize

                        772KB

                      • memory/3412-18-0x0000000140000000-0x00000001400C1000-memory.dmp

                        Filesize

                        772KB

                      • memory/3412-17-0x0000000140000000-0x00000001400C1000-memory.dmp

                        Filesize

                        772KB

                      • memory/3412-41-0x0000000140000000-0x00000001400C1000-memory.dmp

                        Filesize

                        772KB

                      • memory/3412-14-0x0000000140000000-0x00000001400C1000-memory.dmp

                        Filesize

                        772KB

                      • memory/3412-13-0x0000000140000000-0x00000001400C1000-memory.dmp

                        Filesize

                        772KB

                      • memory/3412-12-0x0000000140000000-0x00000001400C1000-memory.dmp

                        Filesize

                        772KB

                      • memory/3412-11-0x0000000140000000-0x00000001400C1000-memory.dmp

                        Filesize

                        772KB

                      • memory/3412-25-0x0000000140000000-0x00000001400C1000-memory.dmp

                        Filesize

                        772KB

                      • memory/3412-9-0x0000000140000000-0x00000001400C1000-memory.dmp

                        Filesize

                        772KB

                      • memory/3412-8-0x0000000140000000-0x00000001400C1000-memory.dmp

                        Filesize

                        772KB

                      • memory/3412-23-0x0000000140000000-0x00000001400C1000-memory.dmp

                        Filesize

                        772KB

                      • memory/3412-7-0x0000000140000000-0x00000001400C1000-memory.dmp

                        Filesize

                        772KB

                      • memory/3412-43-0x00000000012B0000-0x00000000012B7000-memory.dmp

                        Filesize

                        28KB

                      • memory/3412-44-0x00007FFDEFAE0000-0x00007FFDEFAF0000-memory.dmp

                        Filesize

                        64KB

                      • memory/3412-32-0x0000000140000000-0x00000001400C1000-memory.dmp

                        Filesize

                        772KB

                      • memory/3412-53-0x0000000140000000-0x00000001400C1000-memory.dmp

                        Filesize

                        772KB

                      • memory/3412-21-0x0000000140000000-0x00000001400C1000-memory.dmp

                        Filesize

                        772KB

                      • memory/3412-15-0x0000000140000000-0x00000001400C1000-memory.dmp

                        Filesize

                        772KB

                      • memory/3412-3-0x00000000031E0000-0x00000000031E1000-memory.dmp

                        Filesize

                        4KB

                      • memory/3412-5-0x00007FFDEF98A000-0x00007FFDEF98B000-memory.dmp

                        Filesize

                        4KB