Analysis
-
max time kernel
150s -
max time network
93s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
07/06/2024, 23:23
Static task
static1
Behavioral task
behavioral1
Sample
769cb826ac9a9994e1b505dc986e8670_NeikiAnalytics.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
769cb826ac9a9994e1b505dc986e8670_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
769cb826ac9a9994e1b505dc986e8670_NeikiAnalytics.exe
-
Size
66KB
-
MD5
769cb826ac9a9994e1b505dc986e8670
-
SHA1
e40cc3f7374a354e795e548bea42bef34dd92c90
-
SHA256
023ba237012a2032267ca40442a5bbbc1237f1414cef5fb37b099b543136329d
-
SHA512
f6fe44335d86067c5262be97039ffcccf44fa54c93f567b1a51b66f3618a367189dcbf6c65f8c159a8d641700109b4d98a9ef3779baa677564140b3350575800
-
SSDEEP
1536:EHfetdklPp+07gDSrB8Xru2zGeJxgawTzpXzrDJrXiy:IeklMMYJhqezw/pXzH9iy
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" svchost.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe -
Modifies Installed Components in the registry 2 TTPs 8 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999} svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" svchost.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} svchost.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" svchost.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999} svchost.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" explorer.exe -
Executes dropped EXE 4 IoCs
pid Process 220 explorer.exe 1592 spoolsv.exe 536 svchost.exe 1856 spoolsv.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" explorer.exe -
Drops file in Windows directory 6 IoCs
description ioc Process File opened for modification \??\c:\windows\system\explorer.exe explorer.exe File opened for modification \??\c:\windows\system\svchost.exe svchost.exe File opened for modification C:\Windows\system\udsys.exe explorer.exe File opened for modification \??\c:\windows\system\explorer.exe 769cb826ac9a9994e1b505dc986e8670_NeikiAnalytics.exe File opened for modification \??\c:\windows\system\spoolsv.exe explorer.exe File opened for modification \??\c:\windows\system\svchost.exe spoolsv.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2860 769cb826ac9a9994e1b505dc986e8670_NeikiAnalytics.exe 2860 769cb826ac9a9994e1b505dc986e8670_NeikiAnalytics.exe 220 explorer.exe 220 explorer.exe 220 explorer.exe 220 explorer.exe 220 explorer.exe 220 explorer.exe 536 svchost.exe 536 svchost.exe 536 svchost.exe 536 svchost.exe 220 explorer.exe 220 explorer.exe 536 svchost.exe 536 svchost.exe 220 explorer.exe 220 explorer.exe 536 svchost.exe 536 svchost.exe 220 explorer.exe 220 explorer.exe 536 svchost.exe 536 svchost.exe 220 explorer.exe 220 explorer.exe 536 svchost.exe 536 svchost.exe 220 explorer.exe 220 explorer.exe 536 svchost.exe 536 svchost.exe 220 explorer.exe 220 explorer.exe 536 svchost.exe 536 svchost.exe 220 explorer.exe 220 explorer.exe 536 svchost.exe 220 explorer.exe 220 explorer.exe 536 svchost.exe 536 svchost.exe 536 svchost.exe 220 explorer.exe 220 explorer.exe 220 explorer.exe 536 svchost.exe 536 svchost.exe 220 explorer.exe 220 explorer.exe 536 svchost.exe 220 explorer.exe 536 svchost.exe 536 svchost.exe 536 svchost.exe 220 explorer.exe 220 explorer.exe 220 explorer.exe 536 svchost.exe 536 svchost.exe 220 explorer.exe 220 explorer.exe 536 svchost.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 220 explorer.exe 536 svchost.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 2860 769cb826ac9a9994e1b505dc986e8670_NeikiAnalytics.exe 2860 769cb826ac9a9994e1b505dc986e8670_NeikiAnalytics.exe 220 explorer.exe 220 explorer.exe 1592 spoolsv.exe 1592 spoolsv.exe 536 svchost.exe 536 svchost.exe 1856 spoolsv.exe 1856 spoolsv.exe 220 explorer.exe 220 explorer.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 2860 wrote to memory of 220 2860 769cb826ac9a9994e1b505dc986e8670_NeikiAnalytics.exe 82 PID 2860 wrote to memory of 220 2860 769cb826ac9a9994e1b505dc986e8670_NeikiAnalytics.exe 82 PID 2860 wrote to memory of 220 2860 769cb826ac9a9994e1b505dc986e8670_NeikiAnalytics.exe 82 PID 220 wrote to memory of 1592 220 explorer.exe 83 PID 220 wrote to memory of 1592 220 explorer.exe 83 PID 220 wrote to memory of 1592 220 explorer.exe 83 PID 1592 wrote to memory of 536 1592 spoolsv.exe 84 PID 1592 wrote to memory of 536 1592 spoolsv.exe 84 PID 1592 wrote to memory of 536 1592 spoolsv.exe 84 PID 536 wrote to memory of 1856 536 svchost.exe 86 PID 536 wrote to memory of 1856 536 svchost.exe 86 PID 536 wrote to memory of 1856 536 svchost.exe 86 PID 536 wrote to memory of 3288 536 svchost.exe 87 PID 536 wrote to memory of 3288 536 svchost.exe 87 PID 536 wrote to memory of 3288 536 svchost.exe 87 PID 536 wrote to memory of 4012 536 svchost.exe 100 PID 536 wrote to memory of 4012 536 svchost.exe 100 PID 536 wrote to memory of 4012 536 svchost.exe 100 PID 536 wrote to memory of 4696 536 svchost.exe 102 PID 536 wrote to memory of 4696 536 svchost.exe 102 PID 536 wrote to memory of 4696 536 svchost.exe 102
Processes
-
C:\Users\Admin\AppData\Local\Temp\769cb826ac9a9994e1b505dc986e8670_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\769cb826ac9a9994e1b505dc986e8670_NeikiAnalytics.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2860 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe2⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Modifies Installed Components in the registry
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:220 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE3⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1592 -
\??\c:\windows\system\svchost.exec:\windows\system\svchost.exe4⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Modifies Installed Components in the registry
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:536 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe PR5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1856
-
-
C:\Windows\SysWOW64\at.exeat 23:25 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe5⤵PID:3288
-
-
C:\Windows\SysWOW64\at.exeat 23:26 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe5⤵PID:4012
-
-
C:\Windows\SysWOW64\at.exeat 23:27 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe5⤵PID:4696
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
66KB
MD573de097e5acd8784266a0b1efea04100
SHA1b1c40e946a891b5ef9aea13952693d9de51ed310
SHA2569ce364de666f9dff750ce6680c5e7463aeffea909ccaba4ed35c83014c87c5e6
SHA512e6a273614685def18b2c262a4c8c920c8951c6147dbc1bed7f7d3dfa5d82e26d01204fc595bc01514d436c0e30f481b6566808d85bfdc565c780fa1e223ef2df
-
Filesize
66KB
MD56763a2a3adc66d3fa07a89eef7f2f949
SHA17253f1e78462b11ba1c12d34640d06f4fcedf155
SHA256824f5e2f7c9013e23363d0b4afd868ba77ca600a48cd616d7213ac27d9b23a15
SHA512076e942c2d81d546dc835e3b88f8196cf61563c7997579cdb20c6598f422e8b9c5523b4bec6da506ca084c23d3fffbf2be2f4057f63a358eb6096c52433e0ef3
-
Filesize
66KB
MD53bcede5817292862db75adb9a3a285fc
SHA1b2f687c17d50dc738544fd4c175711e7e5eee60a
SHA2561910d4e0b194d27f8d8d76a781a6d19ad13b5c2afd2541f94f0e9dc11663f990
SHA5120235bb09982a3127f8639b4dee9b064f6a3fc04ebd29eb576bfe5005be11c2e1269f3b88f0d1f5a6049173c92381d1e845bc30509832b50fc72dde08321a5246
-
Filesize
66KB
MD59a6382981b920b82d761ecaccdc3315a
SHA1ad4e34f5401104aac1940f1932a44029218376a2
SHA256a32c7079d517dbe8515d7c12eb1ca788e2d86c5d04d4f52f107413e375b2739b
SHA512ca997214e1414b3b2d9119847870deac14dc2a779527bc54d09391bd84cd8ddee369f02b86521c43f1b0fe4739d04fb2f8f04bfda9fd350e080eeaf65a17881c