Analysis
-
max time kernel
150s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
13/06/2024, 02:27
Static task
static1
Behavioral task
behavioral1
Sample
5705fac196d3cbd91c3b90fb1321f5c0_NeikiAnalytics.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
5705fac196d3cbd91c3b90fb1321f5c0_NeikiAnalytics.exe
Resource
win10v2004-20240611-en
General
-
Target
5705fac196d3cbd91c3b90fb1321f5c0_NeikiAnalytics.exe
-
Size
66KB
-
MD5
5705fac196d3cbd91c3b90fb1321f5c0
-
SHA1
5607bc8cdda9ab02594e2a134d0abc440eebbb01
-
SHA256
6fff8ef0b05c90fa26600b071f14f4b2e60caf2e72698f71f3bae263e28e979b
-
SHA512
80a3fe2b42c982d10bb088fdf01bb68ce08a53f8c78d2b458b9a1a8ec875109e3f8a034519a4776aebc46524fab9172921a990799ada0e74c4a9a6bc8a1d90a7
-
SSDEEP
1536:EHfetdklPp+07gDSrB8Xru2zGeJxgawTzpXzrDJrXi9:IeklMMYJhqezw/pXzH9i9
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" svchost.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" svchost.exe -
Modifies Installed Components in the registry 2 TTPs 8 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" explorer.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999} svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" svchost.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} svchost.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" svchost.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999} svchost.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} explorer.exe -
Executes dropped EXE 4 IoCs
pid Process 2976 explorer.exe 2640 spoolsv.exe 2588 svchost.exe 2540 spoolsv.exe -
Loads dropped DLL 8 IoCs
pid Process 2084 5705fac196d3cbd91c3b90fb1321f5c0_NeikiAnalytics.exe 2084 5705fac196d3cbd91c3b90fb1321f5c0_NeikiAnalytics.exe 2976 explorer.exe 2976 explorer.exe 2640 spoolsv.exe 2640 spoolsv.exe 2588 svchost.exe 2588 svchost.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" svchost.exe -
Drops file in Windows directory 6 IoCs
description ioc Process File opened for modification \??\c:\windows\system\svchost.exe spoolsv.exe File opened for modification \??\c:\windows\system\explorer.exe explorer.exe File opened for modification \??\c:\windows\system\svchost.exe svchost.exe File opened for modification C:\Windows\system\udsys.exe explorer.exe File opened for modification \??\c:\windows\system\explorer.exe 5705fac196d3cbd91c3b90fb1321f5c0_NeikiAnalytics.exe File opened for modification \??\c:\windows\system\spoolsv.exe explorer.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2084 5705fac196d3cbd91c3b90fb1321f5c0_NeikiAnalytics.exe 2976 explorer.exe 2976 explorer.exe 2976 explorer.exe 2976 explorer.exe 2976 explorer.exe 2976 explorer.exe 2588 svchost.exe 2588 svchost.exe 2976 explorer.exe 2588 svchost.exe 2976 explorer.exe 2588 svchost.exe 2976 explorer.exe 2588 svchost.exe 2976 explorer.exe 2588 svchost.exe 2976 explorer.exe 2588 svchost.exe 2976 explorer.exe 2588 svchost.exe 2976 explorer.exe 2588 svchost.exe 2976 explorer.exe 2588 svchost.exe 2976 explorer.exe 2588 svchost.exe 2976 explorer.exe 2588 svchost.exe 2976 explorer.exe 2588 svchost.exe 2976 explorer.exe 2588 svchost.exe 2976 explorer.exe 2588 svchost.exe 2976 explorer.exe 2588 svchost.exe 2976 explorer.exe 2588 svchost.exe 2976 explorer.exe 2588 svchost.exe 2976 explorer.exe 2588 svchost.exe 2976 explorer.exe 2588 svchost.exe 2976 explorer.exe 2588 svchost.exe 2976 explorer.exe 2588 svchost.exe 2976 explorer.exe 2588 svchost.exe 2976 explorer.exe 2588 svchost.exe 2976 explorer.exe 2588 svchost.exe 2976 explorer.exe 2588 svchost.exe 2976 explorer.exe 2588 svchost.exe 2976 explorer.exe 2588 svchost.exe 2976 explorer.exe 2588 svchost.exe 2976 explorer.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 2976 explorer.exe 2588 svchost.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 2084 5705fac196d3cbd91c3b90fb1321f5c0_NeikiAnalytics.exe 2084 5705fac196d3cbd91c3b90fb1321f5c0_NeikiAnalytics.exe 2976 explorer.exe 2976 explorer.exe 2640 spoolsv.exe 2640 spoolsv.exe 2588 svchost.exe 2588 svchost.exe 2540 spoolsv.exe 2540 spoolsv.exe 2976 explorer.exe 2976 explorer.exe -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 2084 wrote to memory of 2976 2084 5705fac196d3cbd91c3b90fb1321f5c0_NeikiAnalytics.exe 28 PID 2084 wrote to memory of 2976 2084 5705fac196d3cbd91c3b90fb1321f5c0_NeikiAnalytics.exe 28 PID 2084 wrote to memory of 2976 2084 5705fac196d3cbd91c3b90fb1321f5c0_NeikiAnalytics.exe 28 PID 2084 wrote to memory of 2976 2084 5705fac196d3cbd91c3b90fb1321f5c0_NeikiAnalytics.exe 28 PID 2976 wrote to memory of 2640 2976 explorer.exe 29 PID 2976 wrote to memory of 2640 2976 explorer.exe 29 PID 2976 wrote to memory of 2640 2976 explorer.exe 29 PID 2976 wrote to memory of 2640 2976 explorer.exe 29 PID 2640 wrote to memory of 2588 2640 spoolsv.exe 30 PID 2640 wrote to memory of 2588 2640 spoolsv.exe 30 PID 2640 wrote to memory of 2588 2640 spoolsv.exe 30 PID 2640 wrote to memory of 2588 2640 spoolsv.exe 30 PID 2588 wrote to memory of 2540 2588 svchost.exe 31 PID 2588 wrote to memory of 2540 2588 svchost.exe 31 PID 2588 wrote to memory of 2540 2588 svchost.exe 31 PID 2588 wrote to memory of 2540 2588 svchost.exe 31 PID 2588 wrote to memory of 804 2588 svchost.exe 32 PID 2588 wrote to memory of 804 2588 svchost.exe 32 PID 2588 wrote to memory of 804 2588 svchost.exe 32 PID 2588 wrote to memory of 804 2588 svchost.exe 32 PID 2588 wrote to memory of 1792 2588 svchost.exe 36 PID 2588 wrote to memory of 1792 2588 svchost.exe 36 PID 2588 wrote to memory of 1792 2588 svchost.exe 36 PID 2588 wrote to memory of 1792 2588 svchost.exe 36 PID 2588 wrote to memory of 1568 2588 svchost.exe 38 PID 2588 wrote to memory of 1568 2588 svchost.exe 38 PID 2588 wrote to memory of 1568 2588 svchost.exe 38 PID 2588 wrote to memory of 1568 2588 svchost.exe 38
Processes
-
C:\Users\Admin\AppData\Local\Temp\5705fac196d3cbd91c3b90fb1321f5c0_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\5705fac196d3cbd91c3b90fb1321f5c0_NeikiAnalytics.exe"1⤵
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2084 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe2⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Modifies Installed Components in the registry
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2976 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2640 -
\??\c:\windows\system\svchost.exec:\windows\system\svchost.exe4⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Modifies Installed Components in the registry
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2588 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe PR5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2540
-
-
C:\Windows\SysWOW64\at.exeat 02:29 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe5⤵PID:804
-
-
C:\Windows\SysWOW64\at.exeat 02:30 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe5⤵PID:1792
-
-
C:\Windows\SysWOW64\at.exeat 02:31 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe5⤵PID:1568
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
66KB
MD5f06faad5c765d0fbd861c2938ec8b95b
SHA19bd7a80b2f0994b244e7bcf0851eb3f2b0bb0459
SHA2569b521d7bab65ca77f968e5be413d1191d1720ebd5317adc0de51862d8f9ba382
SHA512de46254eab0d25ffb11921afdb1590530da226ff934cd9d63a0b66f3515e8569fe7484ffc855afdd22ac4890294f60b3c9a3b81ed8684d8991a6cea985a1617f
-
Filesize
66KB
MD50db9274770940f767c890c738a9061c3
SHA1190cd20ef9fd2fd4968ecb901fcb9181cf85c449
SHA256ca9eb3d5bfc196e9cd52e3ca2f992255bf190d6ba9577d9c3dbaa2e767d324fa
SHA5122ec8656c69508ece60567e338fead35e0170caa7e141e3d24440aec26b626152ed446c5d6daef900faccda1e4ce12dadf234395aeb1bc6bccec52ea7de7f6670
-
Filesize
66KB
MD5f6dfa5a86e5fe8ced874df0f05180e2c
SHA1b36001e509a1a19e77a77f961c36defd30f1ffd8
SHA2569d7fb6f1734ab8861648828e1f0961e363e9d544b0c6700ed5612eed97bc2ca9
SHA512029e0b33584a4e6dfedab9ef265b0b8415b79c652cc2f0eec675028d1f86e18d8d7f8e690ed3517bf240d71e3ffc3b5eff1746b5ad164df0fc9054841dcbd18c
-
Filesize
66KB
MD561d4f17cdd9a89d8746be1ab1728e309
SHA18833deb6d56403520b9f93d1d3776507b75e8e9f
SHA25670f80ca719e06d5ccb57de5d9ace0e94065b774851d946e54440de4286227e3d
SHA512bdd3c6f683cf4cec72d86108ff5f9efee7092972171899b0f83828fc012649bc73534ae3c6a7f9da2c1ed17ea8f535a8a57fab3f9b59553169faa8a1042ede9d