Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
04/06/2024, 01:18
Static task
static1
Behavioral task
behavioral1
Sample
1bff664f930564db077ebf93e31385e0_NeikiAnalytics.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
1bff664f930564db077ebf93e31385e0_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
1bff664f930564db077ebf93e31385e0_NeikiAnalytics.exe
-
Size
206KB
-
MD5
1bff664f930564db077ebf93e31385e0
-
SHA1
9825754d11b7d941809073b884a19d05361cefc2
-
SHA256
6eeacb1dbd789ab0783e72844750852223704cbba2c3bc2aa8217d5809e0f4f6
-
SHA512
1dca77bcc3359df1a93913b0d1676276d27e2ef36335f839b464ffca5d7c98400b63ba844207e5630dc2915ace2ac977ca91dff4858d403a53755eefe7c12a76
-
SSDEEP
3072:5vEfVUzSLhIVbV6i5LirrlZrHyrUHUckoMQ2RN6unLi:5vEN2U+T6i5LirrllHy4HUcMQY6Ki
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" svchost.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" svchost.exe -
Modifies Installed Components in the registry 2 TTPs 8 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999} svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" svchost.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} svchost.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" svchost.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\WOW6432NODE\MICROSOFT\ACTIVE SETUP\INSTALLED COMPONENTS\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999} svchost.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" explorer.exe -
Executes dropped EXE 4 IoCs
pid Process 2432 explorer.exe 2136 spoolsv.exe 4496 svchost.exe 1704 spoolsv.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" svchost.exe -
Drops file in Windows directory 6 IoCs
description ioc Process File opened for modification \??\c:\windows\system\svchost.exe spoolsv.exe File opened for modification \??\c:\windows\system\explorer.exe explorer.exe File opened for modification \??\c:\windows\system\svchost.exe svchost.exe File opened for modification C:\Windows\system\udsys.exe explorer.exe File opened for modification \??\c:\windows\system\explorer.exe 1bff664f930564db077ebf93e31385e0_NeikiAnalytics.exe File opened for modification \??\c:\windows\system\spoolsv.exe explorer.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4520 1bff664f930564db077ebf93e31385e0_NeikiAnalytics.exe 4520 1bff664f930564db077ebf93e31385e0_NeikiAnalytics.exe 2432 explorer.exe 2432 explorer.exe 2432 explorer.exe 2432 explorer.exe 2432 explorer.exe 2432 explorer.exe 4496 svchost.exe 4496 svchost.exe 4496 svchost.exe 4496 svchost.exe 2432 explorer.exe 2432 explorer.exe 4496 svchost.exe 4496 svchost.exe 2432 explorer.exe 2432 explorer.exe 4496 svchost.exe 4496 svchost.exe 2432 explorer.exe 2432 explorer.exe 4496 svchost.exe 4496 svchost.exe 2432 explorer.exe 2432 explorer.exe 4496 svchost.exe 4496 svchost.exe 2432 explorer.exe 2432 explorer.exe 4496 svchost.exe 4496 svchost.exe 2432 explorer.exe 2432 explorer.exe 4496 svchost.exe 4496 svchost.exe 2432 explorer.exe 2432 explorer.exe 4496 svchost.exe 4496 svchost.exe 2432 explorer.exe 2432 explorer.exe 4496 svchost.exe 4496 svchost.exe 2432 explorer.exe 2432 explorer.exe 4496 svchost.exe 4496 svchost.exe 2432 explorer.exe 2432 explorer.exe 4496 svchost.exe 4496 svchost.exe 2432 explorer.exe 2432 explorer.exe 4496 svchost.exe 4496 svchost.exe 2432 explorer.exe 2432 explorer.exe 4496 svchost.exe 4496 svchost.exe 2432 explorer.exe 2432 explorer.exe 4496 svchost.exe 4496 svchost.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 2432 explorer.exe 4496 svchost.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 4520 1bff664f930564db077ebf93e31385e0_NeikiAnalytics.exe 4520 1bff664f930564db077ebf93e31385e0_NeikiAnalytics.exe 2432 explorer.exe 2432 explorer.exe 2136 spoolsv.exe 2136 spoolsv.exe 4496 svchost.exe 4496 svchost.exe 1704 spoolsv.exe 1704 spoolsv.exe 2432 explorer.exe 2432 explorer.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 4520 wrote to memory of 2432 4520 1bff664f930564db077ebf93e31385e0_NeikiAnalytics.exe 82 PID 4520 wrote to memory of 2432 4520 1bff664f930564db077ebf93e31385e0_NeikiAnalytics.exe 82 PID 4520 wrote to memory of 2432 4520 1bff664f930564db077ebf93e31385e0_NeikiAnalytics.exe 82 PID 2432 wrote to memory of 2136 2432 explorer.exe 83 PID 2432 wrote to memory of 2136 2432 explorer.exe 83 PID 2432 wrote to memory of 2136 2432 explorer.exe 83 PID 2136 wrote to memory of 4496 2136 spoolsv.exe 84 PID 2136 wrote to memory of 4496 2136 spoolsv.exe 84 PID 2136 wrote to memory of 4496 2136 spoolsv.exe 84 PID 4496 wrote to memory of 1704 4496 svchost.exe 85 PID 4496 wrote to memory of 1704 4496 svchost.exe 85 PID 4496 wrote to memory of 1704 4496 svchost.exe 85 PID 4496 wrote to memory of 2616 4496 svchost.exe 86 PID 4496 wrote to memory of 2616 4496 svchost.exe 86 PID 4496 wrote to memory of 2616 4496 svchost.exe 86 PID 4496 wrote to memory of 3836 4496 svchost.exe 105 PID 4496 wrote to memory of 3836 4496 svchost.exe 105 PID 4496 wrote to memory of 3836 4496 svchost.exe 105 PID 4496 wrote to memory of 824 4496 svchost.exe 115 PID 4496 wrote to memory of 824 4496 svchost.exe 115 PID 4496 wrote to memory of 824 4496 svchost.exe 115
Processes
-
C:\Users\Admin\AppData\Local\Temp\1bff664f930564db077ebf93e31385e0_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\1bff664f930564db077ebf93e31385e0_NeikiAnalytics.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4520 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe2⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Modifies Installed Components in the registry
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2432 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE3⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2136 -
\??\c:\windows\system\svchost.exec:\windows\system\svchost.exe4⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Modifies Installed Components in the registry
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4496 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe PR5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1704
-
-
C:\Windows\SysWOW64\at.exeat 01:20 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe5⤵PID:2616
-
-
C:\Windows\SysWOW64\at.exeat 01:21 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe5⤵PID:3836
-
-
C:\Windows\SysWOW64\at.exeat 01:22 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe5⤵PID:824
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
207KB
MD5a0ba4701918d8bd649b22304d29261b1
SHA1657133071d4e0649a7c514d3f5608907464d50a4
SHA2564b770b71fadce3ca69f81fb44d04efb81d70a8731d18c8a1982134553c2f2307
SHA512c450be39b2cfa1a2a93c0127e9c1c874a3c7c01acfff471733e9827a43a5f0dc4118a6feeeee2387daf09870c1d7d1bdd79d1cb802bf0f89ed89fa4d7167f6ef
-
Filesize
207KB
MD5c5eb7e0d89b97c220620d98d38283652
SHA1f413a0f5b4c188e8a8286da8ffa57752cdbcc236
SHA2562d96d8a831538e01d89ac9eedd7182eb3381f703243414bcc18c120104b16b79
SHA51227f34b71ea421f8a09918d11ce9e26603e9520779b267f453e3f6d26074de534d022e995947b179ebe060e133e7f666d2b383c90f53568a256e6d4b8ab8a1ec5
-
Filesize
206KB
MD510f6bb014131befd42eed68bfeb5c9a3
SHA1de714d3f6d63c34a83dc143ad64b674d29f9b40c
SHA2563c17ce67905e7d5db87d09f0dc3aaa867334d889437ac54a8873040f1c91254b
SHA5124ef7e2eb6bd367d8cdc2da5a4eeb6b121e1d0f91e5bae0b431872e33fc1915991f50d8851cdd4cc3add0a6d38f537eca9b28200a681e203f51426a5b7df1dfc2
-
Filesize
206KB
MD507b109be6464a336134ca15de7702bf1
SHA1b6752e614229d92e32ea107d7c186bf9fb67b342
SHA256338c836c7d392c794fad4b17a0a2b608603be945dfc106b3d1cb9aa2cad6bcdb
SHA5125ab720fcc478b17e80282590014d5b888691639c7b16ba11edadb723a746013b0e8b7ac0170db361b80ffc3535c737a5eb6f3626bb84661fd118271c3b7b361f