Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
12/06/2024, 11:46
Static task
static1
Behavioral task
behavioral1
Sample
37cafec88ef43c1466e375348a25ca40_NeikiAnalytics.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
37cafec88ef43c1466e375348a25ca40_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
37cafec88ef43c1466e375348a25ca40_NeikiAnalytics.exe
-
Size
200KB
-
MD5
37cafec88ef43c1466e375348a25ca40
-
SHA1
3bc12b95e3c5f2ed1dbc20b09cbc79c4badb4958
-
SHA256
a8faf39a76ff711323dbce85117f3d33e4cfacf6975867cc232762345fc6ffe7
-
SHA512
f2193e8773e85134746c6f60eb02a3a1cccd93938488fd3c65056094e39bec1c85b4361e5557735e4babf011a2a72e3779f43b22c215c9be7c580699521e4792
-
SSDEEP
3072:7vEfVUzSLhIVbV6i5LirrlZrHyrUHUckoMQ2RN6uBL9i6:7vEN2U+T6i5LirrllHy4HUcMQY6C9i6
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" svchost.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" svchost.exe -
Modifies Installed Components in the registry 2 TTPs 8 IoCs
description ioc Process Key deleted \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999} svchost.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" explorer.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999} svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" svchost.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} svchost.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" svchost.exe -
Executes dropped EXE 4 IoCs
pid Process 5032 explorer.exe 4072 spoolsv.exe 4916 svchost.exe 4328 spoolsv.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" svchost.exe -
Drops file in Windows directory 6 IoCs
description ioc Process File opened for modification \??\c:\windows\system\spoolsv.exe explorer.exe File opened for modification \??\c:\windows\system\svchost.exe spoolsv.exe File opened for modification \??\c:\windows\system\explorer.exe explorer.exe File opened for modification \??\c:\windows\system\svchost.exe svchost.exe File opened for modification C:\Windows\system\udsys.exe explorer.exe File opened for modification \??\c:\windows\system\explorer.exe 37cafec88ef43c1466e375348a25ca40_NeikiAnalytics.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2020 37cafec88ef43c1466e375348a25ca40_NeikiAnalytics.exe 2020 37cafec88ef43c1466e375348a25ca40_NeikiAnalytics.exe 5032 explorer.exe 5032 explorer.exe 5032 explorer.exe 5032 explorer.exe 5032 explorer.exe 5032 explorer.exe 4916 svchost.exe 4916 svchost.exe 4916 svchost.exe 4916 svchost.exe 5032 explorer.exe 5032 explorer.exe 4916 svchost.exe 4916 svchost.exe 5032 explorer.exe 5032 explorer.exe 4916 svchost.exe 4916 svchost.exe 5032 explorer.exe 5032 explorer.exe 4916 svchost.exe 4916 svchost.exe 5032 explorer.exe 5032 explorer.exe 4916 svchost.exe 4916 svchost.exe 5032 explorer.exe 5032 explorer.exe 4916 svchost.exe 4916 svchost.exe 5032 explorer.exe 5032 explorer.exe 4916 svchost.exe 4916 svchost.exe 5032 explorer.exe 5032 explorer.exe 4916 svchost.exe 4916 svchost.exe 5032 explorer.exe 5032 explorer.exe 4916 svchost.exe 4916 svchost.exe 5032 explorer.exe 5032 explorer.exe 4916 svchost.exe 4916 svchost.exe 5032 explorer.exe 5032 explorer.exe 4916 svchost.exe 4916 svchost.exe 5032 explorer.exe 5032 explorer.exe 4916 svchost.exe 4916 svchost.exe 5032 explorer.exe 5032 explorer.exe 4916 svchost.exe 4916 svchost.exe 5032 explorer.exe 5032 explorer.exe 4916 svchost.exe 4916 svchost.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 5032 explorer.exe 4916 svchost.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 2020 37cafec88ef43c1466e375348a25ca40_NeikiAnalytics.exe 2020 37cafec88ef43c1466e375348a25ca40_NeikiAnalytics.exe 5032 explorer.exe 5032 explorer.exe 4072 spoolsv.exe 4072 spoolsv.exe 4916 svchost.exe 4916 svchost.exe 4328 spoolsv.exe 4328 spoolsv.exe 5032 explorer.exe 5032 explorer.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 2020 wrote to memory of 5032 2020 37cafec88ef43c1466e375348a25ca40_NeikiAnalytics.exe 81 PID 2020 wrote to memory of 5032 2020 37cafec88ef43c1466e375348a25ca40_NeikiAnalytics.exe 81 PID 2020 wrote to memory of 5032 2020 37cafec88ef43c1466e375348a25ca40_NeikiAnalytics.exe 81 PID 5032 wrote to memory of 4072 5032 explorer.exe 82 PID 5032 wrote to memory of 4072 5032 explorer.exe 82 PID 5032 wrote to memory of 4072 5032 explorer.exe 82 PID 4072 wrote to memory of 4916 4072 spoolsv.exe 84 PID 4072 wrote to memory of 4916 4072 spoolsv.exe 84 PID 4072 wrote to memory of 4916 4072 spoolsv.exe 84 PID 4916 wrote to memory of 4328 4916 svchost.exe 85 PID 4916 wrote to memory of 4328 4916 svchost.exe 85 PID 4916 wrote to memory of 4328 4916 svchost.exe 85 PID 4916 wrote to memory of 2440 4916 svchost.exe 86 PID 4916 wrote to memory of 2440 4916 svchost.exe 86 PID 4916 wrote to memory of 2440 4916 svchost.exe 86 PID 4916 wrote to memory of 364 4916 svchost.exe 98 PID 4916 wrote to memory of 364 4916 svchost.exe 98 PID 4916 wrote to memory of 364 4916 svchost.exe 98 PID 4916 wrote to memory of 4856 4916 svchost.exe 100 PID 4916 wrote to memory of 4856 4916 svchost.exe 100 PID 4916 wrote to memory of 4856 4916 svchost.exe 100
Processes
-
C:\Users\Admin\AppData\Local\Temp\37cafec88ef43c1466e375348a25ca40_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\37cafec88ef43c1466e375348a25ca40_NeikiAnalytics.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2020 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe2⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Modifies Installed Components in the registry
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5032 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE3⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4072 -
\??\c:\windows\system\svchost.exec:\windows\system\svchost.exe4⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Modifies Installed Components in the registry
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4916 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe PR5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4328
-
-
C:\Windows\SysWOW64\at.exeat 11:48 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe5⤵PID:2440
-
-
C:\Windows\SysWOW64\at.exeat 11:49 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe5⤵PID:364
-
-
C:\Windows\SysWOW64\at.exeat 11:50 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe5⤵PID:4856
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
216KB
MD5b569b8a3e7ae9412189eb5cc3fc40f81
SHA1d10cfe580edbffa2874c1dae4b4508328c94b75d
SHA25621a85761fee3808a1ea0c31b788b311404d84d4ec48f5bb3632f460033906c16
SHA512e67ed33e68a2a8e176d63fd0f7f5dc8478cbbd928a89c1bea4762476574e19be4cfbcc8f4a29019771ad07b1db43af9a461ecae1c61ba5ecd5130bb3cacc082e
-
Filesize
216KB
MD5b4d9c68da54734eb4e8e7a999a9f5af1
SHA1791bfdba4fa74bf2e3a3096b68fd2807ac0142a6
SHA256dd1cf92145da7c07d4da5d1a2ff4a9153a762073b7695d65d44aa8d8d2fc38a9
SHA5121e16ff574092005aaff8fa39bad344a5a6b990a910562d170c05d63639bf8424ef38ee714c52527bbaade0878afb6b746a31ec4b015f6b6ef586a204fbf06519
-
Filesize
216KB
MD59e66df374dbfa9c662e74f52ddf06857
SHA1dd448bb7f76e0b95e1fe7467c92d7c94281f75db
SHA256ae4ae4d94f5230c78cd35a169dd5b868c652e420109fc358c7697d1bec94eff5
SHA5122ea12fb0f723e88f7a704153a830c3223a0533314697fd11a06bcc0e6ca9c939823856774a61dff2011580cbcadbd7edcba89ce6bf2e7b4f0bb6f1f05250918e
-
Filesize
216KB
MD5d0a44dea401bc50cd06032e762a58203
SHA104c73950488132ae2127642bb4c8ae431f738026
SHA2568aeff12620a15b44b94dfa5515b8e0d298b0b1090ada8fa9b4a4b689de8d090e
SHA512303410afd9e7ba9bfdf46747a2ade62fe67128e2ca08b960139137f01a3c3151866347fc14c16b04c7074c2e4fef4d8c15b1e6e746612e5e11185e1003f6f632