Analysis
-
max time kernel
151s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
08/06/2024, 01:13
Static task
static1
Behavioral task
behavioral1
Sample
7e78203ce5e13e4e9737b26e5db2c8f0_NeikiAnalytics.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
7e78203ce5e13e4e9737b26e5db2c8f0_NeikiAnalytics.exe
Resource
win10v2004-20240226-en
General
-
Target
7e78203ce5e13e4e9737b26e5db2c8f0_NeikiAnalytics.exe
-
Size
66KB
-
MD5
7e78203ce5e13e4e9737b26e5db2c8f0
-
SHA1
51496bf3704a2ff043660b92191a9d782cc0c0d2
-
SHA256
e560f73cab96babaaba237a3b5c36f329aba8e4961e441adfc8301db4b7b9191
-
SHA512
6e41b1a6accd92ed7a2c91ff742b5a4e5bf0f1548fcec13c687c4aa82e4ed7e6510c477d44b0d3d4ba06fe24c653ed3ea61eb04621bfe3fa0d30a792c08eeca8
-
SSDEEP
1536:EHfetdklPp+07gDSrB8Xru2zGeJxgawTzpXzrDJrXiY:IeklMMYJhqezw/pXzH9iY
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" svchost.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" svchost.exe -
Modifies Installed Components in the registry 2 TTPs 8 IoCs
description ioc Process Key deleted \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} svchost.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" svchost.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999} svchost.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" explorer.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999} svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" svchost.exe -
Executes dropped EXE 4 IoCs
pid Process 2940 explorer.exe 3812 spoolsv.exe 3228 svchost.exe 624 spoolsv.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" explorer.exe -
Drops file in Windows directory 6 IoCs
description ioc Process File opened for modification \??\c:\windows\system\svchost.exe svchost.exe File opened for modification C:\Windows\system\udsys.exe explorer.exe File opened for modification \??\c:\windows\system\explorer.exe 7e78203ce5e13e4e9737b26e5db2c8f0_NeikiAnalytics.exe File opened for modification \??\c:\windows\system\spoolsv.exe explorer.exe File opened for modification \??\c:\windows\system\svchost.exe spoolsv.exe File opened for modification \??\c:\windows\system\explorer.exe explorer.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3488 7e78203ce5e13e4e9737b26e5db2c8f0_NeikiAnalytics.exe 3488 7e78203ce5e13e4e9737b26e5db2c8f0_NeikiAnalytics.exe 2940 explorer.exe 2940 explorer.exe 2940 explorer.exe 2940 explorer.exe 2940 explorer.exe 2940 explorer.exe 2940 explorer.exe 2940 explorer.exe 3228 svchost.exe 3228 svchost.exe 3228 svchost.exe 3228 svchost.exe 2940 explorer.exe 2940 explorer.exe 3228 svchost.exe 2940 explorer.exe 2940 explorer.exe 3228 svchost.exe 3228 svchost.exe 2940 explorer.exe 2940 explorer.exe 3228 svchost.exe 2940 explorer.exe 3228 svchost.exe 2940 explorer.exe 3228 svchost.exe 2940 explorer.exe 3228 svchost.exe 2940 explorer.exe 3228 svchost.exe 2940 explorer.exe 2940 explorer.exe 3228 svchost.exe 3228 svchost.exe 2940 explorer.exe 3228 svchost.exe 2940 explorer.exe 3228 svchost.exe 3228 svchost.exe 3228 svchost.exe 2940 explorer.exe 2940 explorer.exe 2940 explorer.exe 3228 svchost.exe 2940 explorer.exe 3228 svchost.exe 2940 explorer.exe 3228 svchost.exe 2940 explorer.exe 3228 svchost.exe 2940 explorer.exe 3228 svchost.exe 2940 explorer.exe 3228 svchost.exe 2940 explorer.exe 3228 svchost.exe 2940 explorer.exe 3228 svchost.exe 2940 explorer.exe 3228 svchost.exe 2940 explorer.exe 3228 svchost.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 2940 explorer.exe 3228 svchost.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 3488 7e78203ce5e13e4e9737b26e5db2c8f0_NeikiAnalytics.exe 3488 7e78203ce5e13e4e9737b26e5db2c8f0_NeikiAnalytics.exe 2940 explorer.exe 2940 explorer.exe 3812 spoolsv.exe 3812 spoolsv.exe 3228 svchost.exe 3228 svchost.exe 624 spoolsv.exe 624 spoolsv.exe 2940 explorer.exe 2940 explorer.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 3488 wrote to memory of 2940 3488 7e78203ce5e13e4e9737b26e5db2c8f0_NeikiAnalytics.exe 91 PID 3488 wrote to memory of 2940 3488 7e78203ce5e13e4e9737b26e5db2c8f0_NeikiAnalytics.exe 91 PID 3488 wrote to memory of 2940 3488 7e78203ce5e13e4e9737b26e5db2c8f0_NeikiAnalytics.exe 91 PID 2940 wrote to memory of 3812 2940 explorer.exe 92 PID 2940 wrote to memory of 3812 2940 explorer.exe 92 PID 2940 wrote to memory of 3812 2940 explorer.exe 92 PID 3812 wrote to memory of 3228 3812 spoolsv.exe 93 PID 3812 wrote to memory of 3228 3812 spoolsv.exe 93 PID 3812 wrote to memory of 3228 3812 spoolsv.exe 93 PID 3228 wrote to memory of 624 3228 svchost.exe 94 PID 3228 wrote to memory of 624 3228 svchost.exe 94 PID 3228 wrote to memory of 624 3228 svchost.exe 94 PID 3228 wrote to memory of 1436 3228 svchost.exe 95 PID 3228 wrote to memory of 1436 3228 svchost.exe 95 PID 3228 wrote to memory of 1436 3228 svchost.exe 95 PID 3228 wrote to memory of 3688 3228 svchost.exe 106 PID 3228 wrote to memory of 3688 3228 svchost.exe 106 PID 3228 wrote to memory of 3688 3228 svchost.exe 106 PID 3228 wrote to memory of 2568 3228 svchost.exe 108 PID 3228 wrote to memory of 2568 3228 svchost.exe 108 PID 3228 wrote to memory of 2568 3228 svchost.exe 108
Processes
-
C:\Users\Admin\AppData\Local\Temp\7e78203ce5e13e4e9737b26e5db2c8f0_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\7e78203ce5e13e4e9737b26e5db2c8f0_NeikiAnalytics.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3488 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe2⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Modifies Installed Components in the registry
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2940 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE3⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3812 -
\??\c:\windows\system\svchost.exec:\windows\system\svchost.exe4⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Modifies Installed Components in the registry
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3228 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe PR5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:624
-
-
C:\Windows\SysWOW64\at.exeat 01:16 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe5⤵PID:1436
-
-
C:\Windows\SysWOW64\at.exeat 01:17 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe5⤵PID:3688
-
-
C:\Windows\SysWOW64\at.exeat 01:18 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe5⤵PID:2568
-
-
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=1424 --field-trial-handle=2180,i,12780723798465539942,12010519452607841069,262144 --variations-seed-version /prefetch:81⤵PID:4048
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
66KB
MD5fa11955d3345bab18fa132b288a25b4d
SHA165f57d09fa0cc5a928b8f126a87bca03f54a6a7e
SHA25652643382d3f09e6dacd5b8d1aff2cd9d58bccd31f73ba0d9c1d5f7924410e0ad
SHA512f01c19ea2143501156c078cbddb7dd23ea8f7e48d8842b0516a75eb325fd3b3ade933eee732e0ae530c33f1ff3049f6f56a283b667fa708d26aa698cd824a07b
-
Filesize
66KB
MD5e809e9a6875f68d90b26794e7a767e15
SHA136fb5eab71c92cc64adff6892b47d65317665545
SHA256a940ed8049407e3bcf1178c280f21006ccc4cf339fcc5a1a0a999ac2b2f3a2c2
SHA5127053f1568ec9e296e1f02f6197f10225f56cd93299911bbb8c409ff7bf04c0b31264fefb44e240ee71436afcc855e407900b3ac44b75a6338693c7c745530070
-
Filesize
66KB
MD5a1ba8b6d74a58bc0a1b83a513ae71116
SHA1769bc12066697c48c2ed8327d1f7ac9323c07e0c
SHA25698dee41bea9af33c06fedb10891aa3e7e549e4372798c229ec1dc4958f288e78
SHA51234cfbdc6699090599a41a8370844f2ff3c4f304b321da7d86ce60c91ba03ca0edbfbb298c1e38cdf3e1d4ab27659d1a916be2950ac98d511b275b0fd15becb12
-
Filesize
66KB
MD5ee096cc00fd0dc5cf78858d86c5105e4
SHA152bb301e1e3116ab830af691717a0fda32736aee
SHA256de288ea2f66a8c7b13fb867293502160216ab0ed3184c4926795f9c983986e83
SHA512db04cc0444a285a25215b6ab84852e95d7c864fbccef4397a2c47ea8f94c3a8e8525f0aca6c4b65f79eefb15f904cedd05c48bedd35161664250843c2796dbd0