Analysis
-
max time kernel
140s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
05/06/2024, 07:40
Static task
static1
Behavioral task
behavioral1
Sample
493f5c6079a421095b1a8921edf7b5c0_NeikiAnalytics.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
493f5c6079a421095b1a8921edf7b5c0_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
493f5c6079a421095b1a8921edf7b5c0_NeikiAnalytics.exe
-
Size
244KB
-
MD5
493f5c6079a421095b1a8921edf7b5c0
-
SHA1
8bc4f79f254f56265333bb2cf298feecf312e5ea
-
SHA256
cad48043676b26ad3d48b93e195744694a7199d8344058268a54c9cdc1a09341
-
SHA512
aa38ebea5e53c0c71d9f28726057c3cd1ef07fcee74bad1285e38f0cc25c3354879aa9f56914559b76886ecd5e540801a56275e2d4fafd81a9d5f237ad2e1d88
-
SSDEEP
6144:SEXlSylvFuWaS54hIAv/QhuA7HY8pPZ0FP6BzxM5EmX:3Aylvv5YRwh9HYd61xhmX
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\apppatch\\svchost.exe," svchost.exe -
Executes dropped EXE 1 IoCs
pid Process 3060 svchost.exe -
Loads dropped DLL 7 IoCs
pid Process 2964 493f5c6079a421095b1a8921edf7b5c0_NeikiAnalytics.exe 2964 493f5c6079a421095b1a8921edf7b5c0_NeikiAnalytics.exe 2724 WerFault.exe 2724 WerFault.exe 2724 WerFault.exe 2724 WerFault.exe 2724 WerFault.exe -
Modifies WinLogon 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\7a614b12 = "C:\\Windows\\apppatch\\svchost.exe" 493f5c6079a421095b1a8921edf7b5c0_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\7a614b12 = "C:\\Windows\\apppatch\\svchost.exe" svchost.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\apppatch\svchost.exe 493f5c6079a421095b1a8921edf7b5c0_NeikiAnalytics.exe File opened for modification C:\Windows\apppatch\svchost.exe 493f5c6079a421095b1a8921edf7b5c0_NeikiAnalytics.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2724 3060 WerFault.exe 28 -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 3060 svchost.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2964 493f5c6079a421095b1a8921edf7b5c0_NeikiAnalytics.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2964 wrote to memory of 3060 2964 493f5c6079a421095b1a8921edf7b5c0_NeikiAnalytics.exe 28 PID 2964 wrote to memory of 3060 2964 493f5c6079a421095b1a8921edf7b5c0_NeikiAnalytics.exe 28 PID 2964 wrote to memory of 3060 2964 493f5c6079a421095b1a8921edf7b5c0_NeikiAnalytics.exe 28 PID 2964 wrote to memory of 3060 2964 493f5c6079a421095b1a8921edf7b5c0_NeikiAnalytics.exe 28 PID 3060 wrote to memory of 2724 3060 svchost.exe 29 PID 3060 wrote to memory of 2724 3060 svchost.exe 29 PID 3060 wrote to memory of 2724 3060 svchost.exe 29 PID 3060 wrote to memory of 2724 3060 svchost.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\493f5c6079a421095b1a8921edf7b5c0_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\493f5c6079a421095b1a8921edf7b5c0_NeikiAnalytics.exe"1⤵
- Loads dropped DLL
- Modifies WinLogon
- Drops file in Windows directory
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:2964 -
C:\Windows\apppatch\svchost.exe"C:\Windows\apppatch\svchost.exe"2⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Modifies WinLogon
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3060 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3060 -s 3563⤵
- Loads dropped DLL
- Program crash
PID:2724
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
244KB
MD5df7bb5865362dde8358518d82cab2328
SHA17f36f5635ea985d68b5ab7916a6a992103222193
SHA25675abbb7b89511b72797cdb682db41c07233148ba84191e7f083125209cbb4153
SHA5127d2af0991a660d98f5d8be8c250a6d3c5b83e8f72334684021c47974143a56407fe1017c715c052338f593adf727265c39c6c0cce6bed34b714b81f7962161d3