Analysis
-
max time kernel
149s -
max time network
51s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
11-06-2024 21:44
Static task
static1
Behavioral task
behavioral1
Sample
06038fedf29979d267f9663315865c20_NeikiAnalytics.dll
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
06038fedf29979d267f9663315865c20_NeikiAnalytics.dll
Resource
win10v2004-20240508-en
General
-
Target
06038fedf29979d267f9663315865c20_NeikiAnalytics.dll
-
Size
496KB
-
MD5
06038fedf29979d267f9663315865c20
-
SHA1
c7b03dc841966e43a4d788848412c3e39cd42033
-
SHA256
13c23529ee4ebea3fef8f77517e07c7d8392729e48b72fb289b241113763c9f0
-
SHA512
e24f3f831f9a40d598c9272b5e383a286f4bff57b4b359177030f7017f6fac9b2561de98cb8129a982748d07a98f687137cd2ab45c21357cb4bddc978f945465
-
SSDEEP
6144:ui05kH9OyU2uv5SRf/FWgFgtBgqIRAUW9kVYeVprU4wfhTv5xD2ZP0GVGdXcukTg:BrHGPv5Smpt6DmUWuVZkxikdXcq
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Iphtcfjrejti = "\"C:\\Users\\Admin\\AppData\\Roaming\\ZMawhhj\\MoUsoCoreWorker.exe\"" Process not Found -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\system32\1154\Netplwiz.exe cmd.exe File opened for modification C:\Windows\system32\1154\Netplwiz.exe cmd.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 5028 schtasks.exe -
Modifies registry class 10 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000_Classes\ms-settings\shell\open\command\ = "C:\\Windows\\system32\\cmd.exe /c C:\\Users\\Admin\\AppData\\Local\\Temp\\jTI2i.cmd" Process not Found Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000_Classes\ms-settings\shell\open\command\DelegateExecute Process not Found Key deleted \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000_Classes\ms-settings\shell Process not Found Key deleted \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000_Classes\ms-settings Process not Found Key created \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000_Classes\ms-settings\shell\open\command Process not Found Key created \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000_Classes\ms-settings Process not Found Key created \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000_Classes\ms-settings\shell Process not Found Key created \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000_Classes\ms-settings\shell\open Process not Found Key deleted \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000_Classes\ms-settings\shell\open\command Process not Found Key deleted \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000_Classes\ms-settings\shell\open Process not Found -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 540 rundll32.exe 540 rundll32.exe 540 rundll32.exe 540 rundll32.exe 3376 Process not Found 3376 Process not Found 3376 Process not Found 3376 Process not Found 3376 Process not Found 3376 Process not Found 3376 Process not Found 3376 Process not Found 3376 Process not Found 3376 Process not Found 3376 Process not Found 3376 Process not Found 3376 Process not Found 3376 Process not Found 3376 Process not Found 3376 Process not Found 3376 Process not Found 3376 Process not Found 3376 Process not Found 3376 Process not Found 3376 Process not Found 3376 Process not Found 3376 Process not Found 3376 Process not Found 3376 Process not Found 3376 Process not Found 3376 Process not Found 3376 Process not Found 3376 Process not Found 3376 Process not Found 3376 Process not Found 3376 Process not Found 3376 Process not Found 3376 Process not Found 3376 Process not Found 3376 Process not Found 3376 Process not Found 3376 Process not Found 3376 Process not Found 3376 Process not Found 3376 Process not Found 3376 Process not Found 3376 Process not Found 3376 Process not Found 3376 Process not Found 3376 Process not Found 3376 Process not Found 3376 Process not Found 3376 Process not Found 3376 Process not Found 3376 Process not Found 3376 Process not Found 3376 Process not Found 3376 Process not Found 3376 Process not Found 3376 Process not Found 3376 Process not Found 3376 Process not Found 3376 Process not Found 3376 Process not Found -
Suspicious use of AdjustPrivilegeToken 14 IoCs
description pid Process Token: SeShutdownPrivilege 3376 Process not Found Token: SeCreatePagefilePrivilege 3376 Process not Found Token: SeShutdownPrivilege 3376 Process not Found Token: SeCreatePagefilePrivilege 3376 Process not Found Token: SeShutdownPrivilege 3376 Process not Found Token: SeCreatePagefilePrivilege 3376 Process not Found Token: SeShutdownPrivilege 3376 Process not Found Token: SeCreatePagefilePrivilege 3376 Process not Found Token: SeShutdownPrivilege 3376 Process not Found Token: SeCreatePagefilePrivilege 3376 Process not Found Token: SeShutdownPrivilege 3376 Process not Found Token: SeCreatePagefilePrivilege 3376 Process not Found Token: SeShutdownPrivilege 3376 Process not Found Token: SeCreatePagefilePrivilege 3376 Process not Found -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 3376 Process not Found 3376 Process not Found 3376 Process not Found -
Suspicious use of SendNotifyMessage 3 IoCs
pid Process 3376 Process not Found 3376 Process not Found 3376 Process not Found -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 3376 Process not Found -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 3376 wrote to memory of 4452 3376 Process not Found 85 PID 3376 wrote to memory of 4452 3376 Process not Found 85 PID 3376 wrote to memory of 4920 3376 Process not Found 86 PID 3376 wrote to memory of 4920 3376 Process not Found 86 PID 3376 wrote to memory of 4360 3376 Process not Found 87 PID 3376 wrote to memory of 4360 3376 Process not Found 87 PID 3376 wrote to memory of 2824 3376 Process not Found 89 PID 3376 wrote to memory of 2824 3376 Process not Found 89 PID 2824 wrote to memory of 1008 2824 cmd.exe 91 PID 2824 wrote to memory of 1008 2824 cmd.exe 91 PID 3376 wrote to memory of 3516 3376 Process not Found 92 PID 3376 wrote to memory of 3516 3376 Process not Found 92 PID 3376 wrote to memory of 872 3376 Process not Found 93 PID 3376 wrote to memory of 872 3376 Process not Found 93 PID 3376 wrote to memory of 640 3376 Process not Found 94 PID 3376 wrote to memory of 640 3376 Process not Found 94 PID 3376 wrote to memory of 8 3376 Process not Found 96 PID 3376 wrote to memory of 8 3376 Process not Found 96 PID 8 wrote to memory of 2840 8 fodhelper.exe 97 PID 8 wrote to memory of 2840 8 fodhelper.exe 97 PID 2840 wrote to memory of 5028 2840 cmd.exe 99 PID 2840 wrote to memory of 5028 2840 cmd.exe 99 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\06038fedf29979d267f9663315865c20_NeikiAnalytics.dll,#11⤵
- Suspicious behavior: EnumeratesProcesses
PID:540
-
C:\Windows\system32\AppVShNotify.exeC:\Windows\system32\AppVShNotify.exe1⤵PID:4452
-
C:\Windows\system32\MoUsoCoreWorker.exeC:\Windows\system32\MoUsoCoreWorker.exe1⤵PID:4920
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c C:\Users\Admin\AppData\Local\Temp\SrZsR.cmd1⤵PID:4360
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks.exe /Delete /F /TN "User_Feed_Synchronization-{3a9698a7-8b59-5789-8186-33aeee771cee}"1⤵
- Suspicious use of WriteProcessMemory
PID:2824 -
C:\Windows\system32\schtasks.exeschtasks.exe /Delete /F /TN "User_Feed_Synchronization-{3a9698a7-8b59-5789-8186-33aeee771cee}"2⤵PID:1008
-
-
C:\Windows\system32\MsSpellCheckingHost.exeC:\Windows\system32\MsSpellCheckingHost.exe1⤵PID:3516
-
C:\Windows\system32\Netplwiz.exeC:\Windows\system32\Netplwiz.exe1⤵PID:872
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c C:\Users\Admin\AppData\Local\Temp\Ubtd8LU.cmd1⤵
- Drops file in System32 directory
PID:640
-
C:\Windows\System32\fodhelper.exe"C:\Windows\System32\fodhelper.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:8 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c C:\Users\Admin\AppData\Local\Temp\jTI2i.cmd2⤵
- Suspicious use of WriteProcessMemory
PID:2840 -
C:\Windows\system32\schtasks.exeschtasks.exe /Create /F /TN "Niazd" /SC minute /MO 60 /TR "C:\Windows\system32\1154\Netplwiz.exe" /RL highest3⤵
- Creates scheduled task(s)
PID:5028
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
500KB
MD55dbd22330c0778b87ce3ed8147babdd7
SHA1b931ec35af7f3c1a9e1c7e32c3e37630df22a6cb
SHA25639f375339e42387d5d462d58d6d5a7ecb325c8119be46a24fe0b0ed6af0aee82
SHA5123c89b0b69524921dfe8cac9f7265c86a1211d1c2278dd0f53c1580f0927c74ebdf781fb91453117226851f40bb6744ef285c4dd468e3f86157ca01512f9d9938
-
Filesize
242B
MD5d586ce8f024648480a8e93472af44414
SHA1825c05680543a0c7b4a71ee9123ea80bdab2aca3
SHA256a415d5958a566f451ef23fd26ae17f5ec1d793d4d78f07ca1e1e86cd0a8e999d
SHA51228b099f206e6217fa0173bed69a03e9f77b08694bc6ec678b298121203e7d5ba6df947d76c05bae5ca208a99df9a24f80d5db7b1b4992537dbfdabb860789f57
-
Filesize
196B
MD54d4de76b3df26ea81e2fdc1d24e7c9d8
SHA12fc18b1b781e6977e58ed34d4584b4bbe0a2ddd5
SHA256c759b51f948e55db0a1ceffaaba3cf7860da1428c05ad6626a62cf3d11ebdb2f
SHA51217575b1bef4dbd02415490dc0d5aadb454b43a486b2de447b59ee46c176ea4ae317fed87e99622765e015f1c515d7b8d2fab01be43b61f4b53a3eee774e15f26
-
Filesize
124B
MD5186352ba3653ad0ab05b49207c3e2908
SHA12f83bb9ca648eaf9ba80beebf7e972cfa1bbded0
SHA2568f7d7c4399077e1a9eb27c7bb52033847801996ba71a28b4c194296339424e75
SHA512186a4c1b244f99de3e7c7f172dea3ba90b63096067a2e4188bfb919ae2aa47c34026e6807d235196b6f887b92a7dd402143a08e2dcfb08b2887d25d31f853dc0
-
Filesize
500KB
MD5b431896c3c499ca42e3f2f23e351905a
SHA18af682cd64911bf2a51b26c48af609b30b284aee
SHA256a9e3debce94f2e785044648c372b029ce9f7b3b90cac3421f8fc9f0cb9b96d23
SHA5127bec7cf8687309048365fda930ef494529a2d50aeda3122d174f83b5e5afaacd5d324d48c57e163d9eb96ad221688ff42be940eb61d7913438736f3207d7453c
-
Filesize
952B
MD5ed38b04dc3ebc2cafaa17f9c95643001
SHA16ab20bac2ea8b0dc5a079155731c7d2d5efd3579
SHA256bfc129630c3993e13d88bbf1b6211629b2f3aa1f1d8489693c89b0f2786ca1f1
SHA51208d11b680c6984b242016f54256c985bcce8502a2daa92f06308c39e4d5d08f57c21c184d64e4623f168f4f7ecdb49c3e40a92d09ed79749520cda3636606d32
-
Filesize
1.6MB
MD547c6b45ff22b73caf40bb29392386ce3
SHA17e29a8d98fbb9b02d3d22e3576f4fd61ab50ffe9
SHA256cbccb642725edb42e749e26ded68a16b3aa20e291a1a7793a2d4efebb75f99c0
SHA512c919ab84a497616e7969d58c251f4e6efc337b41ef6956864b86d66ae1437294c124232fec54433eab3a6518ed529f8445dd0b23706b2f42f3fa42e69711f331