Analysis
-
max time kernel
150s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
08/06/2024, 01:13
Static task
static1
Behavioral task
behavioral1
Sample
7e78203ce5e13e4e9737b26e5db2c8f0_NeikiAnalytics.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
7e78203ce5e13e4e9737b26e5db2c8f0_NeikiAnalytics.exe
Resource
win10v2004-20240226-en
General
-
Target
7e78203ce5e13e4e9737b26e5db2c8f0_NeikiAnalytics.exe
-
Size
66KB
-
MD5
7e78203ce5e13e4e9737b26e5db2c8f0
-
SHA1
51496bf3704a2ff043660b92191a9d782cc0c0d2
-
SHA256
e560f73cab96babaaba237a3b5c36f329aba8e4961e441adfc8301db4b7b9191
-
SHA512
6e41b1a6accd92ed7a2c91ff742b5a4e5bf0f1548fcec13c687c4aa82e4ed7e6510c477d44b0d3d4ba06fe24c653ed3ea61eb04621bfe3fa0d30a792c08eeca8
-
SSDEEP
1536:EHfetdklPp+07gDSrB8Xru2zGeJxgawTzpXzrDJrXiY:IeklMMYJhqezw/pXzH9iY
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" svchost.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" svchost.exe -
Modifies Installed Components in the registry 2 TTPs 8 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" explorer.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999} svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" svchost.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} svchost.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" svchost.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999} svchost.exe -
Executes dropped EXE 4 IoCs
pid Process 2808 explorer.exe 2600 spoolsv.exe 2728 svchost.exe 2460 spoolsv.exe -
Loads dropped DLL 8 IoCs
pid Process 992 7e78203ce5e13e4e9737b26e5db2c8f0_NeikiAnalytics.exe 992 7e78203ce5e13e4e9737b26e5db2c8f0_NeikiAnalytics.exe 2808 explorer.exe 2808 explorer.exe 2600 spoolsv.exe 2600 spoolsv.exe 2728 svchost.exe 2728 svchost.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" svchost.exe -
Drops file in Windows directory 6 IoCs
description ioc Process File opened for modification \??\c:\windows\system\svchost.exe svchost.exe File opened for modification C:\Windows\system\udsys.exe explorer.exe File opened for modification \??\c:\windows\system\explorer.exe 7e78203ce5e13e4e9737b26e5db2c8f0_NeikiAnalytics.exe File opened for modification \??\c:\windows\system\spoolsv.exe explorer.exe File opened for modification \??\c:\windows\system\svchost.exe spoolsv.exe File opened for modification \??\c:\windows\system\explorer.exe explorer.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 992 7e78203ce5e13e4e9737b26e5db2c8f0_NeikiAnalytics.exe 2808 explorer.exe 2808 explorer.exe 2808 explorer.exe 2808 explorer.exe 2728 svchost.exe 2728 svchost.exe 2728 svchost.exe 2808 explorer.exe 2808 explorer.exe 2728 svchost.exe 2728 svchost.exe 2808 explorer.exe 2728 svchost.exe 2808 explorer.exe 2728 svchost.exe 2808 explorer.exe 2728 svchost.exe 2808 explorer.exe 2808 explorer.exe 2728 svchost.exe 2808 explorer.exe 2728 svchost.exe 2808 explorer.exe 2728 svchost.exe 2728 svchost.exe 2808 explorer.exe 2808 explorer.exe 2728 svchost.exe 2728 svchost.exe 2808 explorer.exe 2728 svchost.exe 2808 explorer.exe 2728 svchost.exe 2808 explorer.exe 2808 explorer.exe 2728 svchost.exe 2808 explorer.exe 2728 svchost.exe 2808 explorer.exe 2728 svchost.exe 2808 explorer.exe 2728 svchost.exe 2808 explorer.exe 2728 svchost.exe 2728 svchost.exe 2808 explorer.exe 2808 explorer.exe 2728 svchost.exe 2808 explorer.exe 2728 svchost.exe 2808 explorer.exe 2728 svchost.exe 2808 explorer.exe 2728 svchost.exe 2728 svchost.exe 2808 explorer.exe 2728 svchost.exe 2808 explorer.exe 2808 explorer.exe 2728 svchost.exe 2728 svchost.exe 2808 explorer.exe 2728 svchost.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 2808 explorer.exe 2728 svchost.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 992 7e78203ce5e13e4e9737b26e5db2c8f0_NeikiAnalytics.exe 992 7e78203ce5e13e4e9737b26e5db2c8f0_NeikiAnalytics.exe 2808 explorer.exe 2808 explorer.exe 2600 spoolsv.exe 2600 spoolsv.exe 2728 svchost.exe 2728 svchost.exe 2460 spoolsv.exe 2460 spoolsv.exe 2808 explorer.exe 2808 explorer.exe -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 992 wrote to memory of 2808 992 7e78203ce5e13e4e9737b26e5db2c8f0_NeikiAnalytics.exe 28 PID 992 wrote to memory of 2808 992 7e78203ce5e13e4e9737b26e5db2c8f0_NeikiAnalytics.exe 28 PID 992 wrote to memory of 2808 992 7e78203ce5e13e4e9737b26e5db2c8f0_NeikiAnalytics.exe 28 PID 992 wrote to memory of 2808 992 7e78203ce5e13e4e9737b26e5db2c8f0_NeikiAnalytics.exe 28 PID 2808 wrote to memory of 2600 2808 explorer.exe 29 PID 2808 wrote to memory of 2600 2808 explorer.exe 29 PID 2808 wrote to memory of 2600 2808 explorer.exe 29 PID 2808 wrote to memory of 2600 2808 explorer.exe 29 PID 2600 wrote to memory of 2728 2600 spoolsv.exe 30 PID 2600 wrote to memory of 2728 2600 spoolsv.exe 30 PID 2600 wrote to memory of 2728 2600 spoolsv.exe 30 PID 2600 wrote to memory of 2728 2600 spoolsv.exe 30 PID 2728 wrote to memory of 2460 2728 svchost.exe 31 PID 2728 wrote to memory of 2460 2728 svchost.exe 31 PID 2728 wrote to memory of 2460 2728 svchost.exe 31 PID 2728 wrote to memory of 2460 2728 svchost.exe 31 PID 2728 wrote to memory of 2232 2728 svchost.exe 32 PID 2728 wrote to memory of 2232 2728 svchost.exe 32 PID 2728 wrote to memory of 2232 2728 svchost.exe 32 PID 2728 wrote to memory of 2232 2728 svchost.exe 32 PID 2728 wrote to memory of 1252 2728 svchost.exe 36 PID 2728 wrote to memory of 1252 2728 svchost.exe 36 PID 2728 wrote to memory of 1252 2728 svchost.exe 36 PID 2728 wrote to memory of 1252 2728 svchost.exe 36 PID 2728 wrote to memory of 3036 2728 svchost.exe 38 PID 2728 wrote to memory of 3036 2728 svchost.exe 38 PID 2728 wrote to memory of 3036 2728 svchost.exe 38 PID 2728 wrote to memory of 3036 2728 svchost.exe 38
Processes
-
C:\Users\Admin\AppData\Local\Temp\7e78203ce5e13e4e9737b26e5db2c8f0_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\7e78203ce5e13e4e9737b26e5db2c8f0_NeikiAnalytics.exe"1⤵
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:992 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe2⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Modifies Installed Components in the registry
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2808 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2600 -
\??\c:\windows\system\svchost.exec:\windows\system\svchost.exe4⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Modifies Installed Components in the registry
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2728 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe PR5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2460
-
-
C:\Windows\SysWOW64\at.exeat 01:15 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe5⤵PID:2232
-
-
C:\Windows\SysWOW64\at.exeat 01:16 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe5⤵PID:1252
-
-
C:\Windows\SysWOW64\at.exeat 01:17 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe5⤵PID:3036
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
66KB
MD541edf94a3fbc55487ed710598179f0d4
SHA1c2112bbc9c321b73bf8c45fd4a41f6794f623b51
SHA2562e491e2011c7b69dfde1f434ad70f6605055c49bb5cf73ecbafc25d059827b38
SHA512b7cdc79dfea2098d7a0ff95b0ca25ac1f0293da0bcbff27dcb5a035930e816d2395402dd4878d06884165ea0917a3f5462a12a8f4015af0ef58e32ab05be1a8c
-
Filesize
66KB
MD5ea270f14fe9003da7978852066b0e001
SHA1e600772e5073599613afb8f2adf440bafd8159b2
SHA256f0865f3136a7c8c0a024583e51e316866ee68e1d186582bb9697500702715fbb
SHA5126ff82a32a2252b52abcebf2de9d3878b71ebb17034496eb03662daded8e28c484d1e6b9f819e347d079bf531538542b962d2d6e33df51d7440edd7767b2ef6e8
-
Filesize
66KB
MD513dd148d1bbfd864702715fd474d590d
SHA15fbc7cc7c6008a26bbd2237483545e5440c8ef7b
SHA2568215a01896212c92cd910763a40ea4215fd32a03a17c4fb774d271ae7831f83d
SHA5122887c4a8402f47d775968cb95688da26a1e7936a7dc18bf8aba288b557a4e94b6ed74dc92848aae0e4deb4d4499a17cfe4ab1f6fffa2941e3d785c69c1f07db8
-
Filesize
66KB
MD527ad1c30dd4ed668a9bfcdee3b6650cd
SHA1a06d274e81f2388cf4c9582d4bb4a051036b7ea0
SHA2561f4df19ec36332efae0990dcb11013104cd9e323bc3aba95b3f5def1dd268e89
SHA512888af059b49b9e8215c3251dda216751c6b7deeabf345d29faf844fd122d10e9cb9ff61cc97df949bab1dc8e6ff2ce67a31dd5b25ab057a57d0c346459af583b