Analysis
-
max time kernel
150s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
09/06/2024, 22:56
Static task
static1
Behavioral task
behavioral1
Sample
034813d065a875ea8c6a4d1377218d20_NeikiAnalytics.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
034813d065a875ea8c6a4d1377218d20_NeikiAnalytics.exe
Resource
win10v2004-20240426-en
General
-
Target
034813d065a875ea8c6a4d1377218d20_NeikiAnalytics.exe
-
Size
65KB
-
MD5
034813d065a875ea8c6a4d1377218d20
-
SHA1
9e4d3ceaaf6dbc90fc7d622aaaf8e931f604c154
-
SHA256
9f484b61af15bc382c753462cd4aaa95d54badc68b54a5ad3b21be923a13fdc9
-
SHA512
8154e35031ced967bf0cc208d0a67e417e2dba26fd610eeb0ae574ae1894f9bb86519ae92611670228cfa0530d067024aebd395b482d96b1d81549450d310114
-
SSDEEP
1536:ECq3yRuqrI01eArdW/O7JnI2e13XiLij40MkTUVqa/Ouo111111111111111111R:7WNqkOJWmo1HpM0MkTUmum
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" svchost.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" svchost.exe -
Modifies Installed Components in the registry 2 TTPs 8 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999} svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" svchost.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} svchost.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" svchost.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999} svchost.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" explorer.exe -
Executes dropped EXE 4 IoCs
pid Process 3040 explorer.exe 2724 spoolsv.exe 2936 svchost.exe 2576 spoolsv.exe -
Loads dropped DLL 8 IoCs
pid Process 1844 034813d065a875ea8c6a4d1377218d20_NeikiAnalytics.exe 1844 034813d065a875ea8c6a4d1377218d20_NeikiAnalytics.exe 3040 explorer.exe 3040 explorer.exe 2724 spoolsv.exe 2724 spoolsv.exe 2936 svchost.exe 2936 svchost.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" explorer.exe -
Drops file in Windows directory 6 IoCs
description ioc Process File opened for modification \??\c:\windows\system\explorer.exe 034813d065a875ea8c6a4d1377218d20_NeikiAnalytics.exe File opened for modification \??\c:\windows\system\spoolsv.exe explorer.exe File opened for modification \??\c:\windows\system\svchost.exe spoolsv.exe File opened for modification \??\c:\windows\system\explorer.exe explorer.exe File opened for modification \??\c:\windows\system\svchost.exe svchost.exe File opened for modification C:\Windows\system\udsys.exe explorer.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1844 034813d065a875ea8c6a4d1377218d20_NeikiAnalytics.exe 3040 explorer.exe 3040 explorer.exe 3040 explorer.exe 2936 svchost.exe 2936 svchost.exe 3040 explorer.exe 2936 svchost.exe 3040 explorer.exe 2936 svchost.exe 3040 explorer.exe 2936 svchost.exe 3040 explorer.exe 2936 svchost.exe 3040 explorer.exe 2936 svchost.exe 3040 explorer.exe 2936 svchost.exe 3040 explorer.exe 2936 svchost.exe 3040 explorer.exe 2936 svchost.exe 3040 explorer.exe 2936 svchost.exe 3040 explorer.exe 2936 svchost.exe 3040 explorer.exe 2936 svchost.exe 3040 explorer.exe 2936 svchost.exe 3040 explorer.exe 2936 svchost.exe 3040 explorer.exe 2936 svchost.exe 3040 explorer.exe 2936 svchost.exe 3040 explorer.exe 2936 svchost.exe 3040 explorer.exe 2936 svchost.exe 3040 explorer.exe 2936 svchost.exe 3040 explorer.exe 2936 svchost.exe 3040 explorer.exe 2936 svchost.exe 3040 explorer.exe 2936 svchost.exe 3040 explorer.exe 2936 svchost.exe 3040 explorer.exe 2936 svchost.exe 3040 explorer.exe 2936 svchost.exe 3040 explorer.exe 2936 svchost.exe 3040 explorer.exe 2936 svchost.exe 3040 explorer.exe 2936 svchost.exe 3040 explorer.exe 2936 svchost.exe 3040 explorer.exe 2936 svchost.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 3040 explorer.exe 2936 svchost.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 1844 034813d065a875ea8c6a4d1377218d20_NeikiAnalytics.exe 1844 034813d065a875ea8c6a4d1377218d20_NeikiAnalytics.exe 3040 explorer.exe 3040 explorer.exe 2724 spoolsv.exe 2724 spoolsv.exe 2936 svchost.exe 2936 svchost.exe 2576 spoolsv.exe 2576 spoolsv.exe 3040 explorer.exe 3040 explorer.exe -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 1844 wrote to memory of 3040 1844 034813d065a875ea8c6a4d1377218d20_NeikiAnalytics.exe 28 PID 1844 wrote to memory of 3040 1844 034813d065a875ea8c6a4d1377218d20_NeikiAnalytics.exe 28 PID 1844 wrote to memory of 3040 1844 034813d065a875ea8c6a4d1377218d20_NeikiAnalytics.exe 28 PID 1844 wrote to memory of 3040 1844 034813d065a875ea8c6a4d1377218d20_NeikiAnalytics.exe 28 PID 3040 wrote to memory of 2724 3040 explorer.exe 29 PID 3040 wrote to memory of 2724 3040 explorer.exe 29 PID 3040 wrote to memory of 2724 3040 explorer.exe 29 PID 3040 wrote to memory of 2724 3040 explorer.exe 29 PID 2724 wrote to memory of 2936 2724 spoolsv.exe 30 PID 2724 wrote to memory of 2936 2724 spoolsv.exe 30 PID 2724 wrote to memory of 2936 2724 spoolsv.exe 30 PID 2724 wrote to memory of 2936 2724 spoolsv.exe 30 PID 2936 wrote to memory of 2576 2936 svchost.exe 31 PID 2936 wrote to memory of 2576 2936 svchost.exe 31 PID 2936 wrote to memory of 2576 2936 svchost.exe 31 PID 2936 wrote to memory of 2576 2936 svchost.exe 31 PID 2936 wrote to memory of 1568 2936 svchost.exe 32 PID 2936 wrote to memory of 1568 2936 svchost.exe 32 PID 2936 wrote to memory of 1568 2936 svchost.exe 32 PID 2936 wrote to memory of 1568 2936 svchost.exe 32 PID 2936 wrote to memory of 2304 2936 svchost.exe 36 PID 2936 wrote to memory of 2304 2936 svchost.exe 36 PID 2936 wrote to memory of 2304 2936 svchost.exe 36 PID 2936 wrote to memory of 2304 2936 svchost.exe 36 PID 2936 wrote to memory of 2100 2936 svchost.exe 38 PID 2936 wrote to memory of 2100 2936 svchost.exe 38 PID 2936 wrote to memory of 2100 2936 svchost.exe 38 PID 2936 wrote to memory of 2100 2936 svchost.exe 38
Processes
-
C:\Users\Admin\AppData\Local\Temp\034813d065a875ea8c6a4d1377218d20_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\034813d065a875ea8c6a4d1377218d20_NeikiAnalytics.exe"1⤵
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1844 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe2⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Modifies Installed Components in the registry
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3040 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2724 -
\??\c:\windows\system\svchost.exec:\windows\system\svchost.exe4⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Modifies Installed Components in the registry
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2936 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe PR5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2576
-
-
C:\Windows\SysWOW64\at.exeat 23:02 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe5⤵PID:1568
-
-
C:\Windows\SysWOW64\at.exeat 23:03 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe5⤵PID:2304
-
-
C:\Windows\SysWOW64\at.exeat 23:04 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe5⤵PID:2100
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
65KB
MD565402a19e52b7fc41170d62f0ed76e85
SHA1cf5b6a73e02c9403f465d9d09d06ca00f55c9634
SHA256ccd661a6077a46c387747489016a79709ade24d62e5f0410547baf7f9d3e7c77
SHA512d94cec0fe0a077a5e14e5f528c7b1c34f0e8ee9b4a3f91e135a455867877ddfc66025838fb323438544640d9fcb274dc7949819edd28c02cc44d1a1b60e601ee
-
Filesize
65KB
MD5d134c14f8d1ba391c40a8cdd3fa39258
SHA1887c90d402a48a7a660d02640a684f6da8453507
SHA256a6c23390de3b2dc663621561bffd059060eb5ff523a0c7010645806b4dddd933
SHA51206f993aee38c777d409b0a8e1ba4c9e3caf9e20afbf0adab918512d38210c9fb7273b0610f6133d52df01d7bcb2e13c143ddb2182e2a58c4cd41e8ee20c3404b
-
Filesize
65KB
MD5db0c092eea3cad6c18cd8685c17e6f2e
SHA1719ad5c230d1096e1b565673cdd2186f81082132
SHA256956bef08d1868381f2fac6afe20667a2737a03dd5c40d41353f9f7d2ea63bce9
SHA512eef8b033d32ca33d435c4755f85eca4d6be8efe539105288aaf651bdc4a28ff28d1324701b858b40d9559e1e4984e956e877a2d55f6f103ea186b2e3a159fd6a
-
Filesize
65KB
MD54d061d76d954c4b346a82b1f50312d9b
SHA1b466a260287aaf045c4e692a159e3dfeca32b9d6
SHA256c7b628bcbc6029a543b85f1e56d1a2e1f1c7179786d3e06d5ba38a346f529d4f
SHA512879838d953ffaf224d1dc932b44e059addd2c866ae22275a0bd94934e4a55b74467e54e0e37daa9f54a8c30c5862af8c96bc5a7c3706d2da158fbcd5801a5ee0