Analysis
-
max time kernel
150s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
06/06/2024, 21:38
Static task
static1
Behavioral task
behavioral1
Sample
1d61cba7849ce44e167e4722f18a9620_NeikiAnalytics.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
1d61cba7849ce44e167e4722f18a9620_NeikiAnalytics.exe
Resource
win10v2004-20240226-en
General
-
Target
1d61cba7849ce44e167e4722f18a9620_NeikiAnalytics.exe
-
Size
66KB
-
MD5
1d61cba7849ce44e167e4722f18a9620
-
SHA1
13f59780f8d9ba09c2d7881eb676b0f8b001cefa
-
SHA256
17dde2c0b57cc387900901ab24748b470e4ac166024cee18b6d1921bbaf035dc
-
SHA512
38175bd199fede529cce3b55ed2363eeb1f349d0cee80ff4c77c6d69740ea69fe8571b5c6c53cbe3916bcfe33f3fece5a25844795b081b27f3d21d84d1009456
-
SSDEEP
1536:EHfetdklPp+07gDSrB8Xru2zGeJxgawTzpXzrDJrXi1:IeklMMYJhqezw/pXzH9i1
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" svchost.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" svchost.exe -
Modifies Installed Components in the registry 2 TTPs 8 IoCs
description ioc Process Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} svchost.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" svchost.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999} svchost.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" explorer.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999} svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" svchost.exe -
Executes dropped EXE 4 IoCs
pid Process 2456 explorer.exe 2732 spoolsv.exe 2808 svchost.exe 2516 spoolsv.exe -
Loads dropped DLL 8 IoCs
pid Process 1796 1d61cba7849ce44e167e4722f18a9620_NeikiAnalytics.exe 1796 1d61cba7849ce44e167e4722f18a9620_NeikiAnalytics.exe 2456 explorer.exe 2456 explorer.exe 2732 spoolsv.exe 2732 spoolsv.exe 2808 svchost.exe 2808 svchost.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" svchost.exe -
Drops file in Windows directory 6 IoCs
description ioc Process File opened for modification \??\c:\windows\system\svchost.exe spoolsv.exe File opened for modification \??\c:\windows\system\explorer.exe explorer.exe File opened for modification \??\c:\windows\system\svchost.exe svchost.exe File opened for modification C:\Windows\system\udsys.exe explorer.exe File opened for modification \??\c:\windows\system\explorer.exe 1d61cba7849ce44e167e4722f18a9620_NeikiAnalytics.exe File opened for modification \??\c:\windows\system\spoolsv.exe explorer.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1796 1d61cba7849ce44e167e4722f18a9620_NeikiAnalytics.exe 2456 explorer.exe 2456 explorer.exe 2456 explorer.exe 2456 explorer.exe 2808 svchost.exe 2808 svchost.exe 2456 explorer.exe 2808 svchost.exe 2456 explorer.exe 2808 svchost.exe 2456 explorer.exe 2808 svchost.exe 2456 explorer.exe 2808 svchost.exe 2456 explorer.exe 2808 svchost.exe 2456 explorer.exe 2808 svchost.exe 2456 explorer.exe 2808 svchost.exe 2456 explorer.exe 2808 svchost.exe 2456 explorer.exe 2808 svchost.exe 2456 explorer.exe 2808 svchost.exe 2456 explorer.exe 2808 svchost.exe 2456 explorer.exe 2808 svchost.exe 2456 explorer.exe 2808 svchost.exe 2456 explorer.exe 2808 svchost.exe 2456 explorer.exe 2808 svchost.exe 2456 explorer.exe 2808 svchost.exe 2456 explorer.exe 2808 svchost.exe 2456 explorer.exe 2808 svchost.exe 2456 explorer.exe 2808 svchost.exe 2456 explorer.exe 2808 svchost.exe 2456 explorer.exe 2808 svchost.exe 2456 explorer.exe 2808 svchost.exe 2456 explorer.exe 2808 svchost.exe 2456 explorer.exe 2808 svchost.exe 2456 explorer.exe 2808 svchost.exe 2456 explorer.exe 2808 svchost.exe 2456 explorer.exe 2808 svchost.exe 2456 explorer.exe 2808 svchost.exe 2456 explorer.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 2456 explorer.exe 2808 svchost.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 1796 1d61cba7849ce44e167e4722f18a9620_NeikiAnalytics.exe 1796 1d61cba7849ce44e167e4722f18a9620_NeikiAnalytics.exe 2456 explorer.exe 2456 explorer.exe 2732 spoolsv.exe 2732 spoolsv.exe 2808 svchost.exe 2808 svchost.exe 2516 spoolsv.exe 2516 spoolsv.exe 2456 explorer.exe 2456 explorer.exe -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 1796 wrote to memory of 2456 1796 1d61cba7849ce44e167e4722f18a9620_NeikiAnalytics.exe 28 PID 1796 wrote to memory of 2456 1796 1d61cba7849ce44e167e4722f18a9620_NeikiAnalytics.exe 28 PID 1796 wrote to memory of 2456 1796 1d61cba7849ce44e167e4722f18a9620_NeikiAnalytics.exe 28 PID 1796 wrote to memory of 2456 1796 1d61cba7849ce44e167e4722f18a9620_NeikiAnalytics.exe 28 PID 2456 wrote to memory of 2732 2456 explorer.exe 29 PID 2456 wrote to memory of 2732 2456 explorer.exe 29 PID 2456 wrote to memory of 2732 2456 explorer.exe 29 PID 2456 wrote to memory of 2732 2456 explorer.exe 29 PID 2732 wrote to memory of 2808 2732 spoolsv.exe 30 PID 2732 wrote to memory of 2808 2732 spoolsv.exe 30 PID 2732 wrote to memory of 2808 2732 spoolsv.exe 30 PID 2732 wrote to memory of 2808 2732 spoolsv.exe 30 PID 2808 wrote to memory of 2516 2808 svchost.exe 31 PID 2808 wrote to memory of 2516 2808 svchost.exe 31 PID 2808 wrote to memory of 2516 2808 svchost.exe 31 PID 2808 wrote to memory of 2516 2808 svchost.exe 31 PID 2808 wrote to memory of 1856 2808 svchost.exe 32 PID 2808 wrote to memory of 1856 2808 svchost.exe 32 PID 2808 wrote to memory of 1856 2808 svchost.exe 32 PID 2808 wrote to memory of 1856 2808 svchost.exe 32 PID 2808 wrote to memory of 1288 2808 svchost.exe 36 PID 2808 wrote to memory of 1288 2808 svchost.exe 36 PID 2808 wrote to memory of 1288 2808 svchost.exe 36 PID 2808 wrote to memory of 1288 2808 svchost.exe 36 PID 2808 wrote to memory of 1140 2808 svchost.exe 38 PID 2808 wrote to memory of 1140 2808 svchost.exe 38 PID 2808 wrote to memory of 1140 2808 svchost.exe 38 PID 2808 wrote to memory of 1140 2808 svchost.exe 38
Processes
-
C:\Users\Admin\AppData\Local\Temp\1d61cba7849ce44e167e4722f18a9620_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\1d61cba7849ce44e167e4722f18a9620_NeikiAnalytics.exe"1⤵
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1796 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe2⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Modifies Installed Components in the registry
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2456 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2732 -
\??\c:\windows\system\svchost.exec:\windows\system\svchost.exe4⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Modifies Installed Components in the registry
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2808 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe PR5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2516
-
-
C:\Windows\SysWOW64\at.exeat 21:41 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe5⤵PID:1856
-
-
C:\Windows\SysWOW64\at.exeat 21:42 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe5⤵PID:1288
-
-
C:\Windows\SysWOW64\at.exeat 21:43 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe5⤵PID:1140
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
66KB
MD516cf9f2257e829f75becd7877f06a685
SHA1bedd483c8d1031d3c1d4ed1e9396d34f6caba1a2
SHA256f8466896b4b6aaab6ca2a8a1ae2470ffb786ab09fad9552627798dd1115d0c18
SHA512fe53b1736958330bd9b599a577b612d2ed02d2aa57790df80e6798a01242e5aaae2e34e728129af149c075a36530e9c36a79363429beb29895e1e760cd022bf0
-
Filesize
66KB
MD5e54ee6f352861303853091dbfeb63b27
SHA174753f58a53d31db52c0ee54225ddbd7c091f88d
SHA256d1da85bd522b5b4ac96bc3fd004c2a72de31b3b1adf7d8ffb0f7af7c2bd9dd07
SHA5121d59c73d21fe23d0128f5a9561bd2b8f1159ef39ad0d626701f7f1ec9559db563c76575f62a0bbcb6bec788da2f9867c72acb920b8325fa6bfe7a13a4703adaa
-
Filesize
66KB
MD507267ffcbe88e4c68eca67e2cedc4e00
SHA1d070893e8bf03b7fee4ea98f13b63c636fc194e9
SHA256075d2fcd94683918af8fe7ff20de8cd694755dd28be2d76c0d803c8f1c7be4bf
SHA51269a8e33d90062a2777092872217826ab45ff426aa5e15b3f4c928c90b6c61f46e662ab08929e2c3e12eac1f526824cd7f8095329246f27023c67f9a381b494d2
-
Filesize
66KB
MD55e5c6afd305da42034cfc6e31c5bd92b
SHA13bc8e12b65da16b2ddc85c78faa748b2a016824e
SHA256a3b023aca1cb8f5cf9fdf4dea195b21dabad4150406d0bea873a5fc58a90831f
SHA512ef603cfa625a243e0ee67431bd805323a1581290aa6892a61074cff5f1a3d51012a02a793d899d1fd702e0e60416a2bac933e01b29ed393703354d89daf189d0