Analysis
-
max time kernel
2s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
07/06/2024, 09:36
Static task
static1
Behavioral task
behavioral1
Sample
4af3f134148b96962869d510ce15e130_NeikiAnalytics.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
4af3f134148b96962869d510ce15e130_NeikiAnalytics.exe
Resource
win10v2004-20240426-en
General
-
Target
4af3f134148b96962869d510ce15e130_NeikiAnalytics.exe
-
Size
355KB
-
MD5
4af3f134148b96962869d510ce15e130
-
SHA1
46d71d52e64572cd95375486eee550edac18a48d
-
SHA256
11f93456de774db569eece932aa088332c18c5fda8410d4436a894939467a7b1
-
SHA512
59b9f94507cbe0806c9523387a71da0a55c1c45d0fce575a9139771fb59f72de4ca115ba0ae3d51d300f35b7559b68d2fafe2b9e5d4113487f617273b37ce1b4
-
SSDEEP
6144:BgEmWPDNND9yRPzLq+YXFqaZiMLic9kzVd7EAC4TSs9Ei:nmWhND9yJz+b1FcMLmp2ATTSsd
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\apppatch\\svchost.exe," svchost.exe -
Executes dropped EXE 1 IoCs
pid Process 5000 svchost.exe -
Modifies WinLogon 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\b33e0d9f = "\x15k^þÃ4.+ÙâÖ\x18Rj2…\"B\x1axù\\Š¼Á´žgg\x11ÇÔ–ß)<\x16ÖñöêY¢jBŠªÌžaÑ\x16&§jœÇ±t‘†ò^\x1ea©\x1a!\nª\u0081îa7QÁ¾þq¶âRáA$ÿá„bt*ÂÒF<\"Ò®ÌriÒ¶ÖÒ¶\f™×y:´š)â‰ÙL²ŽÖæi^Ö’\tÒ<ÁV‘q\x1e&ÏÙ6ñÁY’\x01yÙB±9\x01bj”\x11ÎÜÆI~¢–\"\x1f´‘ÇnY|ÔÙ2\x14º©¹±¡æ\x11ï\n¢”\x0f´·Ò\x11–\tZ\x14éÙ¢qÙ¢6ŠÜBQQ\aÁêîZ\t‰¶¡1\x01¿êæt”qŸÑ\u008fY\x11š,‡®T\n7çÂfú¯‚‰Þ´!<é\"9þÿ*>N‚TÂR\t_Nù" 4af3f134148b96962869d510ce15e130_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\b33e0d9f = "\x15k^þÃ4.+ÙâÖ\x18Rj2…\"B\x1axù\\Š¼Á´žgg\x11ÇÔ–ß)<\x16ÖñöêY¢jBŠªÌžaÑ\x16&§jœÇ±t‘†ò^\x1ea©\x1a!\nª\u0081îa7QÁ¾þq¶âRáA$ÿá„bt*ÂÒF<\"Ò®ÌriÒ¶ÖÒ¶\f™×y:´š)â‰ÙL²ŽÖæi^Ö’\tÒ<ÁV‘q\x1e&ÏÙ6ñÁY’\x01yÙB±9\x01bj”\x11ÎÜÆI~¢–\"\x1f´‘ÇnY|ÔÙ2\x14º©¹±¡æ\x11ï\n¢”\x0f´·Ò\x11–\tZ\x14éÙ¢qÙ¢6ŠÜBQQ\aÁêîZ\t‰¶¡1\x01¿êæt”qŸÑ\u008fY\x11š,‡®T\n7çÂfú¯‚‰Þ´!<é\"9þÿ*>N‚TÂR\t_Nù" svchost.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\apppatch\svchost.exe 4af3f134148b96962869d510ce15e130_NeikiAnalytics.exe File opened for modification C:\Windows\apppatch\svchost.exe 4af3f134148b96962869d510ce15e130_NeikiAnalytics.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1412 4af3f134148b96962869d510ce15e130_NeikiAnalytics.exe 1412 4af3f134148b96962869d510ce15e130_NeikiAnalytics.exe 1412 4af3f134148b96962869d510ce15e130_NeikiAnalytics.exe 1412 4af3f134148b96962869d510ce15e130_NeikiAnalytics.exe 1412 4af3f134148b96962869d510ce15e130_NeikiAnalytics.exe 1412 4af3f134148b96962869d510ce15e130_NeikiAnalytics.exe 1412 4af3f134148b96962869d510ce15e130_NeikiAnalytics.exe 1412 4af3f134148b96962869d510ce15e130_NeikiAnalytics.exe 5000 svchost.exe 5000 svchost.exe 5000 svchost.exe 5000 svchost.exe 5000 svchost.exe 5000 svchost.exe 5000 svchost.exe 5000 svchost.exe 5000 svchost.exe 5000 svchost.exe 5000 svchost.exe 5000 svchost.exe 5000 svchost.exe 5000 svchost.exe 5000 svchost.exe 5000 svchost.exe 5000 svchost.exe 5000 svchost.exe 5000 svchost.exe 5000 svchost.exe 5000 svchost.exe 5000 svchost.exe 5000 svchost.exe 5000 svchost.exe 5000 svchost.exe 5000 svchost.exe 5000 svchost.exe 5000 svchost.exe 5000 svchost.exe 5000 svchost.exe 5000 svchost.exe 5000 svchost.exe 5000 svchost.exe 5000 svchost.exe 5000 svchost.exe 5000 svchost.exe 5000 svchost.exe 5000 svchost.exe 5000 svchost.exe 5000 svchost.exe 5000 svchost.exe 5000 svchost.exe 5000 svchost.exe 5000 svchost.exe 5000 svchost.exe 5000 svchost.exe 5000 svchost.exe 5000 svchost.exe 5000 svchost.exe 5000 svchost.exe 5000 svchost.exe 5000 svchost.exe 5000 svchost.exe 5000 svchost.exe 5000 svchost.exe 5000 svchost.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1412 4af3f134148b96962869d510ce15e130_NeikiAnalytics.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1412 wrote to memory of 5000 1412 4af3f134148b96962869d510ce15e130_NeikiAnalytics.exe 82 PID 1412 wrote to memory of 5000 1412 4af3f134148b96962869d510ce15e130_NeikiAnalytics.exe 82 PID 1412 wrote to memory of 5000 1412 4af3f134148b96962869d510ce15e130_NeikiAnalytics.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\4af3f134148b96962869d510ce15e130_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\4af3f134148b96962869d510ce15e130_NeikiAnalytics.exe"1⤵
- Modifies WinLogon
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:1412 -
C:\Windows\apppatch\svchost.exe"C:\Windows\apppatch\svchost.exe"2⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Modifies WinLogon
- Suspicious behavior: EnumeratesProcesses
PID:5000
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
593B
MD53b03d93d3487806337b5c6443ce7a62d
SHA193a7a790bb6348606cbdaf5daeaaf4ea8cf731d0
SHA2567392749832c70fcfc2d440d7afc2f880000dd564930d95d634eb1199fa15de30
SHA512770977beaeedafc5c98d0c32edc8c6c850f05e9f363bc9997fa73991646b02e5d40ceed0017b06caeab0db86423844bc4b0a9f0df2d8239230e423a7bfbd4a88
-
Filesize
168B
MD5d57e3a550060f85d44a175139ea23021
SHA12c5cb3428a322c9709a34d04dd86fe7628f8f0a6
SHA25643edf068d34276e8ade4113d4d7207de19fc98a2ae1c07298e593edae2a8774c
SHA5120364fe6a010fce7a3f4a6344c84468c64b20fd131f3160fc649db78f1075ba52d8a1c4496e50dbe27c357e01ee52e94cdcda8f7927cba28d5f2f45b9da690063
-
Filesize
1KB
MD5cf90a84113f2dc4773e4567a41fb7685
SHA1b9eabf0d79317f797d52fdd08b446ea3b4b2a0bf
SHA25695071afd4f51ccf38710d5a02f2eeecd0adcebfdf9abfe18667d912bda113cc0
SHA512ab9e666c280c1153dfa778a7b00ec73934984dafb5aff36ab6057db4139dd5999352ddd185b4f676f25f0c058f49c4e0c292b396436af6b1b127c853fe9fbf31
-
Filesize
593B
MD5926512864979bc27cf187f1de3f57aff
SHA1acdeb9d6187932613c7fa08eaf28f0cd8116f4b5
SHA256b3e893a653ec06c05ee90f2f6e98cc052a92f6616d7cca8c416420e178dcc73f
SHA512f6f9fd3ca9305bec879cfcd38e64111a18e65e30d25c49e9f2cd546cbab9b2dcd03eca81952f6b77c0eaab20192ef7bef0d8d434f6f371811929e75f8620633b
-
Filesize
42KB
MD5ede8bf84d1208b6f1e7898d16934381d
SHA13b84942f405689c1c7d04e953c3283d571644d5e
SHA2561842737c56995506a6c9ff191bbe6de882cf2622fdb1fe8d4d9e423e350a80ad
SHA51228969e12ca75c73d3f87a790cc8739069c0d18e9896d72553d539d371cb33d7af5c7b81950bc34928e3c1c6b466c469b905c2d7c4ec5feb8c6cf61e656844750
-
Filesize
457B
MD5531ec87a0b2f9477a52d88b111d0d46a
SHA150a72e5752075309f91c062e0282a7e7cd1e751e
SHA2564875b451859b1eb8d0d3b040b1bb8d654d212edb6d9c721cf0f4372129579385
SHA51207994963fd76b31ef0ba2c7f418dcb3ee0290f6baca2d8ec63a6e6b861557b13fbc20d2f0a10a66f35c4d72d4d2c1920ac88b96174604f2f8856868912327da1
-
Filesize
355KB
MD528b9e606dbcf2afb515d16def4c89f36
SHA1b39be1e10789418e0638928ce8649e275b950584
SHA256c3e57284fff2f1beae495cde43b81c96c68fcfbde9ca283e734f2a04d8de8954
SHA512cd9c8779586bcb79144706230e42403a125384e8eef026341c8d0db6b22b712b7217963d3d538f78ef3fbef0baa5d38671eeef6de4aa3aedf27c97bcf638bbfa