Analysis

  • max time kernel
    150s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07/06/2024, 05:19

General

  • Target

    3ae9b7c24748ed0e9afcf50bdd5f4d00_NeikiAnalytics.exe

  • Size

    135KB

  • MD5

    3ae9b7c24748ed0e9afcf50bdd5f4d00

  • SHA1

    97c294fc50a9d61298bb5a1bea4b6aae06549c06

  • SHA256

    6f2a637c20bce16a189f62fc122a8d55793cf01535e7f750634a2106205a2398

  • SHA512

    ed305c45dba1c6e721f466c623c3058b337d90e46984f403fb9ef529b9f57e8648904194cae838890e600dca484224fc3193f025acb82598b37372b09c843ad0

  • SSDEEP

    1536:UfsEqouTRcG/Mzvgf7xEuvnXNTRdUzwTekUOisZ1yDDajtXbV0hY/:UVqoCl/YgjxEufVU0TbTyDDalh/

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 4 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Drops file in System32 directory 2 IoCs
  • Drops file in Windows directory 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 2 IoCs
  • Suspicious use of SetWindowsHookEx 10 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3ae9b7c24748ed0e9afcf50bdd5f4d00_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\3ae9b7c24748ed0e9afcf50bdd5f4d00_NeikiAnalytics.exe"
    1⤵
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1700
    • \??\c:\windows\resources\themes\explorer.exe
      c:\windows\resources\themes\explorer.exe
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Drops file in System32 directory
      • Drops file in Windows directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:944
      • \??\c:\windows\resources\spoolsv.exe
        c:\windows\resources\spoolsv.exe SE
        3⤵
        • Executes dropped EXE
        • Drops file in Windows directory
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1000
        • \??\c:\windows\resources\svchost.exe
          c:\windows\resources\svchost.exe
          4⤵
          • Modifies visiblity of hidden/system files in Explorer
          • Executes dropped EXE
          • Adds Run key to start application
          • Drops file in System32 directory
          • Suspicious behavior: GetForegroundWindowSpam
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:4268
          • \??\c:\windows\resources\spoolsv.exe
            c:\windows\resources\spoolsv.exe PR
            5⤵
            • Executes dropped EXE
            • Suspicious use of SetWindowsHookEx
            PID:3044

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Windows\Resources\Themes\explorer.exe

          Filesize

          135KB

          MD5

          b4567829aa19856bfc51960ad309e992

          SHA1

          846c6213fff8e8d6df0168b3d36e53454b4e09cb

          SHA256

          e8df0823ac642db8615046c674d2aceee80ddf07108d6cc72047015b2dd31047

          SHA512

          17b84edbccbece34546cfd17191a00b88c69420bd4cf48c9fef39f9632f52ab81c6ee320f52b0bbabe396f817c3cd826ae0c9f6b6a8571e16b324a3635c2442e

        • C:\Windows\Resources\spoolsv.exe

          Filesize

          135KB

          MD5

          4da82e7e37022d5410ba1d4c772b58cd

          SHA1

          ab01a030d1ca0c1c19a5a44a7a87155582148e87

          SHA256

          a29ced7007bcb1d72878f01e84d9c2e770df9cb0d5e2691e7a5c451130e4a01f

          SHA512

          167c3613ad5d44c536b97428f8055a6fa9a17804394b96adb73cd4c3f4ee60c7b89199bf705d40f5fa83677b4a39d0729b3f526aa18c78b20d7b9d2c56abbcb1

        • \??\c:\windows\resources\svchost.exe

          Filesize

          135KB

          MD5

          45c9edff3950f51da09436509c8e21c6

          SHA1

          12aaec6c37fe85b3c85353f07ceeae9b02515058

          SHA256

          6bbe117c703b3959a088e7f5dfd95b92dbbf7286d5bee2a99a050d05276c49d4

          SHA512

          22b7df07a375d7f3e3b4cd7e3b78d7c9605bfec39abab5aba14ecea01a4051a9f7ef60a7cb18383505940af7d916c84d2be6cb0131c4a8d9d6dbe058331dfaa6

        • memory/1000-17-0x0000000000400000-0x000000000041F000-memory.dmp

          Filesize

          124KB

        • memory/1000-34-0x0000000000400000-0x000000000041F000-memory.dmp

          Filesize

          124KB

        • memory/1700-0-0x0000000000400000-0x000000000041F000-memory.dmp

          Filesize

          124KB

        • memory/1700-35-0x0000000000400000-0x000000000041F000-memory.dmp

          Filesize

          124KB

        • memory/3044-33-0x0000000000400000-0x000000000041F000-memory.dmp

          Filesize

          124KB