Analysis
-
max time kernel
150s -
max time network
134s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
09-06-2024 22:56
Static task
static1
Behavioral task
behavioral1
Sample
034813d065a875ea8c6a4d1377218d20_NeikiAnalytics.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
034813d065a875ea8c6a4d1377218d20_NeikiAnalytics.exe
Resource
win10v2004-20240426-en
General
-
Target
034813d065a875ea8c6a4d1377218d20_NeikiAnalytics.exe
-
Size
65KB
-
MD5
034813d065a875ea8c6a4d1377218d20
-
SHA1
9e4d3ceaaf6dbc90fc7d622aaaf8e931f604c154
-
SHA256
9f484b61af15bc382c753462cd4aaa95d54badc68b54a5ad3b21be923a13fdc9
-
SHA512
8154e35031ced967bf0cc208d0a67e417e2dba26fd610eeb0ae574ae1894f9bb86519ae92611670228cfa0530d067024aebd395b482d96b1d81549450d310114
-
SSDEEP
1536:ECq3yRuqrI01eArdW/O7JnI2e13XiLij40MkTUVqa/Ouo111111111111111111R:7WNqkOJWmo1HpM0MkTUmum
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" explorer.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" svchost.exe -
Modifies Installed Components in the registry 2 TTPs 8 IoCs
description ioc Process Key deleted \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} svchost.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" svchost.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999} svchost.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" explorer.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999} svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" svchost.exe -
Executes dropped EXE 4 IoCs
pid Process 3676 explorer.exe 2204 spoolsv.exe 880 svchost.exe 3940 spoolsv.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" svchost.exe -
Drops file in Windows directory 6 IoCs
description ioc Process File opened for modification \??\c:\windows\system\explorer.exe 034813d065a875ea8c6a4d1377218d20_NeikiAnalytics.exe File opened for modification \??\c:\windows\system\spoolsv.exe explorer.exe File opened for modification \??\c:\windows\system\svchost.exe spoolsv.exe File opened for modification \??\c:\windows\system\explorer.exe explorer.exe File opened for modification \??\c:\windows\system\svchost.exe svchost.exe File opened for modification C:\Windows\system\udsys.exe explorer.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2184 034813d065a875ea8c6a4d1377218d20_NeikiAnalytics.exe 2184 034813d065a875ea8c6a4d1377218d20_NeikiAnalytics.exe 3676 explorer.exe 3676 explorer.exe 3676 explorer.exe 3676 explorer.exe 3676 explorer.exe 3676 explorer.exe 880 svchost.exe 880 svchost.exe 880 svchost.exe 880 svchost.exe 3676 explorer.exe 3676 explorer.exe 880 svchost.exe 880 svchost.exe 3676 explorer.exe 3676 explorer.exe 880 svchost.exe 880 svchost.exe 3676 explorer.exe 3676 explorer.exe 880 svchost.exe 880 svchost.exe 3676 explorer.exe 3676 explorer.exe 880 svchost.exe 880 svchost.exe 3676 explorer.exe 3676 explorer.exe 880 svchost.exe 880 svchost.exe 3676 explorer.exe 3676 explorer.exe 880 svchost.exe 880 svchost.exe 3676 explorer.exe 3676 explorer.exe 880 svchost.exe 880 svchost.exe 3676 explorer.exe 3676 explorer.exe 880 svchost.exe 880 svchost.exe 3676 explorer.exe 3676 explorer.exe 880 svchost.exe 880 svchost.exe 3676 explorer.exe 3676 explorer.exe 880 svchost.exe 880 svchost.exe 3676 explorer.exe 3676 explorer.exe 880 svchost.exe 880 svchost.exe 3676 explorer.exe 3676 explorer.exe 880 svchost.exe 880 svchost.exe 3676 explorer.exe 3676 explorer.exe 880 svchost.exe 880 svchost.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 3676 explorer.exe 880 svchost.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 2184 034813d065a875ea8c6a4d1377218d20_NeikiAnalytics.exe 2184 034813d065a875ea8c6a4d1377218d20_NeikiAnalytics.exe 3676 explorer.exe 3676 explorer.exe 2204 spoolsv.exe 2204 spoolsv.exe 880 svchost.exe 880 svchost.exe 3940 spoolsv.exe 3940 spoolsv.exe 3676 explorer.exe 3676 explorer.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 2184 wrote to memory of 3676 2184 034813d065a875ea8c6a4d1377218d20_NeikiAnalytics.exe 81 PID 2184 wrote to memory of 3676 2184 034813d065a875ea8c6a4d1377218d20_NeikiAnalytics.exe 81 PID 2184 wrote to memory of 3676 2184 034813d065a875ea8c6a4d1377218d20_NeikiAnalytics.exe 81 PID 3676 wrote to memory of 2204 3676 explorer.exe 82 PID 3676 wrote to memory of 2204 3676 explorer.exe 82 PID 3676 wrote to memory of 2204 3676 explorer.exe 82 PID 2204 wrote to memory of 880 2204 spoolsv.exe 83 PID 2204 wrote to memory of 880 2204 spoolsv.exe 83 PID 2204 wrote to memory of 880 2204 spoolsv.exe 83 PID 880 wrote to memory of 3940 880 svchost.exe 84 PID 880 wrote to memory of 3940 880 svchost.exe 84 PID 880 wrote to memory of 3940 880 svchost.exe 84 PID 880 wrote to memory of 692 880 svchost.exe 85 PID 880 wrote to memory of 692 880 svchost.exe 85 PID 880 wrote to memory of 692 880 svchost.exe 85 PID 880 wrote to memory of 4172 880 svchost.exe 95 PID 880 wrote to memory of 4172 880 svchost.exe 95 PID 880 wrote to memory of 4172 880 svchost.exe 95 PID 880 wrote to memory of 4308 880 svchost.exe 97 PID 880 wrote to memory of 4308 880 svchost.exe 97 PID 880 wrote to memory of 4308 880 svchost.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\034813d065a875ea8c6a4d1377218d20_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\034813d065a875ea8c6a4d1377218d20_NeikiAnalytics.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2184 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe2⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Modifies Installed Components in the registry
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3676 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE3⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2204 -
\??\c:\windows\system\svchost.exec:\windows\system\svchost.exe4⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Modifies Installed Components in the registry
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:880 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe PR5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3940
-
-
C:\Windows\SysWOW64\at.exeat 23:02 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe5⤵PID:692
-
-
C:\Windows\SysWOW64\at.exeat 23:03 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe5⤵PID:4172
-
-
C:\Windows\SysWOW64\at.exeat 23:04 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe5⤵PID:4308
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
65KB
MD5d560b143ac5ca5416b86a16779d3ff41
SHA1d02edabe342791a0f73e8580c4af816a47670b2d
SHA25699543f9fdcc132d407dcc5bf7e4fc919e9d47fa70626c75c0738165f7cc0199b
SHA5124721ca0693af1e13dba353e6a125e1f83a84f2be1409eddb137c3e9b08f3edffe77eb572eb2934650552956f53ba8755294c38e68f469af69c2c0facce0ea16c
-
Filesize
65KB
MD542a1ceb7419188c9af3b9b71cc2fd2d4
SHA16ba5b529c9e4635231d154f5f83a3a6696cd40ff
SHA256c222b00884f03f72b7fd75eb0ca2367bf7613687b25c9ec4e9ec5d986715f259
SHA512624ad3d160f2b3f90632f2ba8e15db8aa969b9e1af8925866e3c747c8acf9a7cfd9105b8cb94b656fa6dfcf5b957d3e18fa5036aac90aa4311b3d41f16966912
-
Filesize
65KB
MD5b9b714cec2b7da1bebe97932522236c0
SHA152c6c1edf70ad9aa08ced6fd61cbe4016c5b3013
SHA2565b7fa10c085fd89783b415dce1cd1d54d9f722e0ba1d988a8043d62d77a8e4e9
SHA512f8a03c8ff2f15eb065226f0163c675d5c3cfe282b843e0b5486cadaa4123fb784c67bccee6da4cd6347524faceb9880231d1c57132d1b6711993e1949d3ebc9a
-
Filesize
65KB
MD57653fa6496fceaf6572aec2008ece050
SHA18082e244f1abc0852e3e86779100d06e87764bed
SHA2564274a5f5bbc020df754d129d2caede5300873c096cd372a7994f6598cb4c9245
SHA512cfb4cbb24beca008ed810a580eb9ee3f79ac6e542d955ea957c9ea5e9c4333be79bb6e052a3c65961b57cf6758ea32d619156bf49b46b267051c35ec9ce43ecf