Analysis
-
max time kernel
150s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
05/06/2024, 08:06
Static task
static1
Behavioral task
behavioral1
Sample
4a8e5a3af4ea20df121c53aef8131e60_NeikiAnalytics.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
4a8e5a3af4ea20df121c53aef8131e60_NeikiAnalytics.dll
Resource
win10v2004-20240426-en
General
-
Target
4a8e5a3af4ea20df121c53aef8131e60_NeikiAnalytics.dll
-
Size
472KB
-
MD5
4a8e5a3af4ea20df121c53aef8131e60
-
SHA1
95052233e658df40c50e241bdb8bc0af96964642
-
SHA256
cf056eef42c6c29e6f04e592c0a01fd04224e19dc2e3920e6631d7b1061d74a4
-
SHA512
955dd4091944792842f51de3006f9313e2e4a740fd71db28f169b87c7144876246255d293c0b2fc70a1c605710d1f94a2fec1ff3e17ca0dc86ae6446ee93ba1a
-
SSDEEP
6144:4i05kH9OyU2uv5SRf/FWgFgtH+gqIRAUW9kVYeVprU4wfhTv5xD2ZP0GVGdXcukE:LrHGPv5SmptHDDmUWuVZkxikdXcq
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 1408 Process not Found -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\Uxhwu = "\"C:\\Users\\Admin\\AppData\\Roaming\\3Mx1X\\sdclt.exe\"" Process not Found -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\system32\9215\TpmInit.exe cmd.exe File opened for modification C:\Windows\system32\9215\TpmInit.exe cmd.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2668 schtasks.exe -
Modifies registry class 9 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\MSCFile\shell\open\command Process not Found Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\MSCFile Process not Found Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\MSCFile\shell Process not Found Key deleted \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\MSCFile\shell\open Process not Found Key deleted \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\MSCFile Process not Found Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\MSCFile\shell\open Process not Found Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\MSCFile\shell\open\command\ = "C:\\Windows\\system32\\cmd.exe /c C:\\Users\\Admin\\AppData\\Local\\Temp\\IqH.cmd" Process not Found Key deleted \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\MSCFile\shell\open\command Process not Found Key deleted \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\MSCFile\shell Process not Found -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2232 rundll32.exe 2232 rundll32.exe 1408 Process not Found 1408 Process not Found 1408 Process not Found 1408 Process not Found 1408 Process not Found 1408 Process not Found 1408 Process not Found 1408 Process not Found 1408 Process not Found 1408 Process not Found 1408 Process not Found 1408 Process not Found 1408 Process not Found 1408 Process not Found 1408 Process not Found 1408 Process not Found 1408 Process not Found 1408 Process not Found 1408 Process not Found 1408 Process not Found 1408 Process not Found 1408 Process not Found 1408 Process not Found 1408 Process not Found 1408 Process not Found 1408 Process not Found 1408 Process not Found 1408 Process not Found 1408 Process not Found 1408 Process not Found 1408 Process not Found 1408 Process not Found 1408 Process not Found 1408 Process not Found 1408 Process not Found 1408 Process not Found 1408 Process not Found 1408 Process not Found 1408 Process not Found 1408 Process not Found 1408 Process not Found 1408 Process not Found 1408 Process not Found 1408 Process not Found 1408 Process not Found 1408 Process not Found 1408 Process not Found 1408 Process not Found 1408 Process not Found 1408 Process not Found 1408 Process not Found 1408 Process not Found 1408 Process not Found 1408 Process not Found 1408 Process not Found 1408 Process not Found 1408 Process not Found 1408 Process not Found 1408 Process not Found 1408 Process not Found 1408 Process not Found 1408 Process not Found -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 1408 wrote to memory of 2448 1408 Process not Found 28 PID 1408 wrote to memory of 2448 1408 Process not Found 28 PID 1408 wrote to memory of 2448 1408 Process not Found 28 PID 1408 wrote to memory of 2612 1408 Process not Found 29 PID 1408 wrote to memory of 2612 1408 Process not Found 29 PID 1408 wrote to memory of 2612 1408 Process not Found 29 PID 1408 wrote to memory of 2852 1408 Process not Found 30 PID 1408 wrote to memory of 2852 1408 Process not Found 30 PID 1408 wrote to memory of 2852 1408 Process not Found 30 PID 1408 wrote to memory of 2804 1408 Process not Found 32 PID 1408 wrote to memory of 2804 1408 Process not Found 32 PID 1408 wrote to memory of 2804 1408 Process not Found 32 PID 2804 wrote to memory of 2996 2804 cmd.exe 34 PID 2804 wrote to memory of 2996 2804 cmd.exe 34 PID 2804 wrote to memory of 2996 2804 cmd.exe 34 PID 1408 wrote to memory of 2176 1408 Process not Found 35 PID 1408 wrote to memory of 2176 1408 Process not Found 35 PID 1408 wrote to memory of 2176 1408 Process not Found 35 PID 1408 wrote to memory of 2848 1408 Process not Found 36 PID 1408 wrote to memory of 2848 1408 Process not Found 36 PID 1408 wrote to memory of 2848 1408 Process not Found 36 PID 1408 wrote to memory of 1236 1408 Process not Found 37 PID 1408 wrote to memory of 1236 1408 Process not Found 37 PID 1408 wrote to memory of 1236 1408 Process not Found 37 PID 1408 wrote to memory of 528 1408 Process not Found 38 PID 1408 wrote to memory of 528 1408 Process not Found 38 PID 1408 wrote to memory of 528 1408 Process not Found 38 PID 1408 wrote to memory of 1372 1408 Process not Found 40 PID 1408 wrote to memory of 1372 1408 Process not Found 40 PID 1408 wrote to memory of 1372 1408 Process not Found 40 PID 1372 wrote to memory of 2188 1372 eventvwr.exe 41 PID 1372 wrote to memory of 2188 1372 eventvwr.exe 41 PID 1372 wrote to memory of 2188 1372 eventvwr.exe 41 PID 2188 wrote to memory of 2668 2188 cmd.exe 43 PID 2188 wrote to memory of 2668 2188 cmd.exe 43 PID 2188 wrote to memory of 2668 2188 cmd.exe 43 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4a8e5a3af4ea20df121c53aef8131e60_NeikiAnalytics.dll,#11⤵
- Suspicious behavior: EnumeratesProcesses
PID:2232
-
C:\Windows\system32\fontview.exeC:\Windows\system32\fontview.exe1⤵PID:2448
-
C:\Windows\system32\sdclt.exeC:\Windows\system32\sdclt.exe1⤵PID:2612
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c C:\Users\Admin\AppData\Local\Temp\HXRejNk.cmd1⤵PID:2852
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks.exe /Delete /F /TN "User_Feed_Synchronization-{f88aa085-2df5-1d76-19b1-e998b140f7f3}"1⤵
- Suspicious use of WriteProcessMemory
PID:2804 -
C:\Windows\system32\schtasks.exeschtasks.exe /Delete /F /TN "User_Feed_Synchronization-{f88aa085-2df5-1d76-19b1-e998b140f7f3}"2⤵PID:2996
-
-
C:\Windows\system32\TSWbPrxy.exeC:\Windows\system32\TSWbPrxy.exe1⤵PID:2176
-
C:\Windows\system32\ucsvc.exeC:\Windows\system32\ucsvc.exe1⤵PID:2848
-
C:\Windows\system32\TpmInit.exeC:\Windows\system32\TpmInit.exe1⤵PID:1236
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c C:\Users\Admin\AppData\Local\Temp\1x9c.cmd1⤵
- Drops file in System32 directory
PID:528
-
C:\Windows\System32\eventvwr.exe"C:\Windows\System32\eventvwr.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1372 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c C:\Users\Admin\AppData\Local\Temp\IqH.cmd2⤵
- Suspicious use of WriteProcessMemory
PID:2188 -
C:\Windows\system32\schtasks.exeschtasks.exe /Create /F /TN "Trqxvscxs" /SC minute /MO 60 /TR "C:\Windows\system32\9215\TpmInit.exe" /RL highest3⤵
- Creates scheduled task(s)
PID:2668
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
192B
MD5f67a67ba5f89c249c01c19eec83fc1eb
SHA109d6bbc0bb8afff6b71a6a80850ef5e4478617a0
SHA25609e2e7a891d7ae077a78125191ae7f8efac7e2488c987bc7b4328e29f39a49df
SHA5126f5d0014e11b4ae142b8245afd5ae806a953f646a6c6d86f845cd65cd6fd102a2ae3a6cb7f0a04d9b186d370a2de93da5955be9264a32ca5f869ec73ddfe4dba
-
Filesize
229B
MD5651bdfab43914ac76fc873966fe20594
SHA1f449ed87cd413402f43be13aa16742bac3719c41
SHA256ae39f2ba9713e184b1e248bec3fafc4010092ff00c8706cbf39d56869233bda3
SHA512a4639198d79bd8a5931b4c5c2d1def9f5ed7406377a06b5fd9b75143d75e2caec813c9ab739b5085cc720ac2c76a227ab3f5e871af5ebe50e4b7f0bb3a3a598e
-
Filesize
127B
MD51c6c7eabe7bc6a9ce7b69db162ef9513
SHA1cb9c7a7d329f76bc2b47a5065fd168ff0b458e2c
SHA2562d1d6fe7555768fad38594ae4f7c74b9670f58c311ea431e3ab906928976d6eb
SHA51279b79a1e17eef1df40d5a772a09900143363e59214892c49856a24d7a5821fcc70e77d67c5796e00dbe82f8982c6b57831bd7d4555e7326ac61840a5c2ec0800
-
Filesize
476KB
MD5069d9fe10066bcbf4497733f1a1da6a0
SHA1a4825345cdeee39b0984e0a230e3b003e0c6d4a6
SHA25616c71b8fd3d54aebb550258f27fef6f31f1295108638a4903156482e841d94eb
SHA5128ecacc06f684ceae00335d22bbd4720876fe6574b2bdb728f16b4a29289b22e2bd62fae36be98efa01fc427e27dfa353b92aeac93b3b38bffcf4499dd46bbe2b
-
Filesize
476KB
MD52014d0080db56ba5e6ad222195e75a06
SHA1064319a79a688b07ee3b4fa87afeaaa987ceb592
SHA2569190d264dd41b95e24065f1d0ecc7da41e45c8c8b36e4e1040ce756e21920c38
SHA5122358f85b212ca10e81974e80d347f0f1535f98eb5c1fdeed9837386d3eb3e816296c61ee39764f57cf795ceb97294eca73db5307ea96d2a106fef02b61c900ec
-
Filesize
1.2MB
MD5cdebd55ffbda3889aa2a8ce52b9dc097
SHA14b3cbfff5e57fa0cb058e93e445e3851063646cf
SHA25661bd24487c389fc2b939ce000721677cc173bde0edcafccff81069bbd9987bfd
SHA5122af69742e90d3478ae0a770b2630bfdc469077311c1f755f941825399b9a411e3d8d124126f59b01049456cddc01b237a3114847f1fe53f9e7d1a97e4ba36f13
-
Filesize
864B
MD544581b5922f0a825a9fd1e8b6eec4dad
SHA1d43de84542a356ef3422290e789ae8a343b6ce6f
SHA256405ae3ecf65ab8532f909e81415210b837fa4bc9dde3568d8039db3042355569
SHA5122fb7057d1e3beb84c0ccda106ba4cae34c111e52e47b8e5c8648f986cd5c9cab2698f5d6ebfb6d9f55ced51b19c074a4f02f839f79bea5c0fb6a56669478e9cf