Analysis
-
max time kernel
150s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
06/06/2024, 21:38
Static task
static1
Behavioral task
behavioral1
Sample
1d61cba7849ce44e167e4722f18a9620_NeikiAnalytics.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
1d61cba7849ce44e167e4722f18a9620_NeikiAnalytics.exe
Resource
win10v2004-20240226-en
General
-
Target
1d61cba7849ce44e167e4722f18a9620_NeikiAnalytics.exe
-
Size
66KB
-
MD5
1d61cba7849ce44e167e4722f18a9620
-
SHA1
13f59780f8d9ba09c2d7881eb676b0f8b001cefa
-
SHA256
17dde2c0b57cc387900901ab24748b470e4ac166024cee18b6d1921bbaf035dc
-
SHA512
38175bd199fede529cce3b55ed2363eeb1f349d0cee80ff4c77c6d69740ea69fe8571b5c6c53cbe3916bcfe33f3fece5a25844795b081b27f3d21d84d1009456
-
SSDEEP
1536:EHfetdklPp+07gDSrB8Xru2zGeJxgawTzpXzrDJrXi1:IeklMMYJhqezw/pXzH9i1
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" svchost.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" svchost.exe -
Modifies Installed Components in the registry 2 TTPs 8 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" svchost.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} svchost.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" svchost.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999} svchost.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" explorer.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999} svchost.exe -
Executes dropped EXE 4 IoCs
pid Process 4496 explorer.exe 456 spoolsv.exe 1280 svchost.exe 1488 spoolsv.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" svchost.exe -
Drops file in Windows directory 6 IoCs
description ioc Process File opened for modification \??\c:\windows\system\svchost.exe svchost.exe File opened for modification C:\Windows\system\udsys.exe explorer.exe File opened for modification \??\c:\windows\system\explorer.exe 1d61cba7849ce44e167e4722f18a9620_NeikiAnalytics.exe File opened for modification \??\c:\windows\system\spoolsv.exe explorer.exe File opened for modification \??\c:\windows\system\svchost.exe spoolsv.exe File opened for modification \??\c:\windows\system\explorer.exe explorer.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3400 1d61cba7849ce44e167e4722f18a9620_NeikiAnalytics.exe 3400 1d61cba7849ce44e167e4722f18a9620_NeikiAnalytics.exe 4496 explorer.exe 4496 explorer.exe 4496 explorer.exe 4496 explorer.exe 4496 explorer.exe 4496 explorer.exe 4496 explorer.exe 4496 explorer.exe 4496 explorer.exe 4496 explorer.exe 4496 explorer.exe 4496 explorer.exe 4496 explorer.exe 4496 explorer.exe 4496 explorer.exe 4496 explorer.exe 1280 svchost.exe 1280 svchost.exe 1280 svchost.exe 1280 svchost.exe 4496 explorer.exe 4496 explorer.exe 1280 svchost.exe 1280 svchost.exe 4496 explorer.exe 4496 explorer.exe 4496 explorer.exe 1280 svchost.exe 4496 explorer.exe 1280 svchost.exe 4496 explorer.exe 1280 svchost.exe 4496 explorer.exe 1280 svchost.exe 1280 svchost.exe 4496 explorer.exe 4496 explorer.exe 1280 svchost.exe 4496 explorer.exe 1280 svchost.exe 4496 explorer.exe 1280 svchost.exe 4496 explorer.exe 1280 svchost.exe 4496 explorer.exe 1280 svchost.exe 1280 svchost.exe 1280 svchost.exe 4496 explorer.exe 4496 explorer.exe 4496 explorer.exe 1280 svchost.exe 4496 explorer.exe 1280 svchost.exe 4496 explorer.exe 1280 svchost.exe 4496 explorer.exe 1280 svchost.exe 4496 explorer.exe 1280 svchost.exe 4496 explorer.exe 1280 svchost.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 4496 explorer.exe 1280 svchost.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 3400 1d61cba7849ce44e167e4722f18a9620_NeikiAnalytics.exe 3400 1d61cba7849ce44e167e4722f18a9620_NeikiAnalytics.exe 4496 explorer.exe 4496 explorer.exe 456 spoolsv.exe 456 spoolsv.exe 1280 svchost.exe 1280 svchost.exe 1488 spoolsv.exe 1488 spoolsv.exe 4496 explorer.exe 4496 explorer.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 3400 wrote to memory of 4496 3400 1d61cba7849ce44e167e4722f18a9620_NeikiAnalytics.exe 91 PID 3400 wrote to memory of 4496 3400 1d61cba7849ce44e167e4722f18a9620_NeikiAnalytics.exe 91 PID 3400 wrote to memory of 4496 3400 1d61cba7849ce44e167e4722f18a9620_NeikiAnalytics.exe 91 PID 4496 wrote to memory of 456 4496 explorer.exe 92 PID 4496 wrote to memory of 456 4496 explorer.exe 92 PID 4496 wrote to memory of 456 4496 explorer.exe 92 PID 456 wrote to memory of 1280 456 spoolsv.exe 93 PID 456 wrote to memory of 1280 456 spoolsv.exe 93 PID 456 wrote to memory of 1280 456 spoolsv.exe 93 PID 1280 wrote to memory of 1488 1280 svchost.exe 94 PID 1280 wrote to memory of 1488 1280 svchost.exe 94 PID 1280 wrote to memory of 1488 1280 svchost.exe 94 PID 1280 wrote to memory of 2964 1280 svchost.exe 95 PID 1280 wrote to memory of 2964 1280 svchost.exe 95 PID 1280 wrote to memory of 2964 1280 svchost.exe 95 PID 1280 wrote to memory of 4624 1280 svchost.exe 106 PID 1280 wrote to memory of 4624 1280 svchost.exe 106 PID 1280 wrote to memory of 4624 1280 svchost.exe 106 PID 1280 wrote to memory of 1084 1280 svchost.exe 108 PID 1280 wrote to memory of 1084 1280 svchost.exe 108 PID 1280 wrote to memory of 1084 1280 svchost.exe 108
Processes
-
C:\Users\Admin\AppData\Local\Temp\1d61cba7849ce44e167e4722f18a9620_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\1d61cba7849ce44e167e4722f18a9620_NeikiAnalytics.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3400 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe2⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Modifies Installed Components in the registry
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4496 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE3⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:456 -
\??\c:\windows\system\svchost.exec:\windows\system\svchost.exe4⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Modifies Installed Components in the registry
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1280 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe PR5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1488
-
-
C:\Windows\SysWOW64\at.exeat 21:41 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe5⤵PID:2964
-
-
C:\Windows\SysWOW64\at.exeat 21:42 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe5⤵PID:4624
-
-
C:\Windows\SysWOW64\at.exeat 21:43 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe5⤵PID:1084
-
-
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3780 --field-trial-handle=2900,i,14549994492153927475,12895178890800740987,262144 --variations-seed-version /prefetch:81⤵PID:4468
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
66KB
MD5acddfaef2054b7db20d036fcbfeee7ea
SHA1a4d8c364575eaf37d2841872356711f0d2800a72
SHA256219e01f2d65829c0faa53e22ed1fa61ff036f1756a9994a1c7a7662ad4610120
SHA51266063cb6e50bb886277ca2325b25f490793bddee50e1ac38dd5fdc0a8d7c2664416cddb2474b3bc4be0b8da80e50e12da1a9fc782c476a1cfd171b84c6ea7fe0
-
Filesize
66KB
MD51a11050355a20bd06f78e2abd66bd770
SHA15f096ae93794e95a2a8d72964cbbdb6f2371aee1
SHA25622ed08a1e2a383b35fd8a00e8f11e6051effa99ef8f875f25f2cfe60618faa00
SHA512cb60e4e3395b5bea22d07752c5b3871d5380e320fc337e8dda4c1e1df7d8652d547c52049a39ad2568b26bacb3fb0c5ab006d48f7351c084b4a9a366dcb96b20
-
Filesize
66KB
MD503ec8d0e329688c8a29dc1b89bd5e3d4
SHA12b53b86a5ae140f6cc68ce7ba9f06502c7e2f9b8
SHA25653f7322053cf9dbe20ccc56b0c568bda7e1dcca4fd591bb3044b58c81432715b
SHA51250f650b433c761819971cc8547c174085667228e86844e627a0bfc46f047e74a9f7cd55a8426bf699b3c8324565110b5243a4064f8e2f832b56d07c299c87285
-
Filesize
66KB
MD5934d84ccd1527d0baba34f0dbbcf491b
SHA1170469631d1b1ee96bb7a03cd11eb351f1ccfe3b
SHA256e2dc6f608e24c2f9495b273e426686d7fcd67af4a41c4dd49a98b9029bb0bfd7
SHA51277b2a2009cd0e2effdc60ce546b41e9c54cad0626c5abd78916c98a4c56283badd48bd989067f47d563aa0d0779f6887c1b980ecc10260bc550ebd687c6b8941