Analysis

  • max time kernel
    92s
  • max time network
    94s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240611-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13/06/2024, 07:25

General

  • Target

    693bad3183098db3806caec884dd5170_NeikiAnalytics.exe

  • Size

    91KB

  • MD5

    693bad3183098db3806caec884dd5170

  • SHA1

    0482612ac3ff27137d95e3d9f6fc6db2a98f516f

  • SHA256

    3fd648fbfae214851ce8a7293a30c02807096b18fc3c9e2b79194ee3002a5aa1

  • SHA512

    0874eafc0720dfc46b7f05e47621e62a5f759395c800c5f755b2218a5fdfc3857fa9d052a4be4d4852f43fac4279d209201851419b43cbf8c3185822be8129e5

  • SSDEEP

    1536:kRsjd3GR2Dxy387Lnouy8VTSRsjd3GR2Dxy387Lnouy8VTb:kOgUXoutNSOgUXoutNb

Score
10/10

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 2 IoCs
  • Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Disables RegEdit via registry modification 2 IoCs
  • Disables use of System Restore points 1 TTPs
  • Executes dropped EXE 7 IoCs
  • Modifies system executable filetype association 2 TTPs 13 IoCs
  • UPX packed file 18 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 5 IoCs
  • Drops file in System32 directory 6 IoCs
  • Drops file in Windows directory 2 IoCs
  • Modifies Control Panel 4 IoCs
  • Modifies registry class 15 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs
  • System policy modification 1 TTPs 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\693bad3183098db3806caec884dd5170_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\693bad3183098db3806caec884dd5170_NeikiAnalytics.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Modifies visibility of file extensions in Explorer
    • Modifies visiblity of hidden/system files in Explorer
    • Disables RegEdit via registry modification
    • Modifies system executable filetype association
    • Adds Run key to start application
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies Control Panel
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    • System policy modification
    PID:1472
    • C:\Windows\xk.exe
      C:\Windows\xk.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:2496
    • C:\Windows\SysWOW64\IExplorer.exe
      C:\Windows\system32\IExplorer.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:3520
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:1432
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:3140
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:4408
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:1060
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:540

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\WINDOWS\CSRSS.EXE

    Filesize

    91KB

    MD5

    06f64771b5154fe0c790a9b51f975bba

    SHA1

    47770b2df2e3eec75db4f4981b1b8c5a9bda1ddc

    SHA256

    3d11110362b091344e90683c577fcb25ac830cd795b991b55b26a0b96a13aee9

    SHA512

    db89f99b0174c23468cf73ee1b7f12b1c65017aaf1fb76efe526b5e9f189e5da79838f268be57c65476265a0cdc349199b23bb919d43815956f416464e52f81f

  • C:\Users\Admin\AppData\Local\WINDOWS\LSASS.EXE

    Filesize

    91KB

    MD5

    817e9c167a9c2df68d86e89f8942fc66

    SHA1

    3dfcbbcb5b9cd238fa20d73da71099d485f106ef

    SHA256

    457bf302aa7bf0bd979aad0cdadc9a416985d2c0b2cab3e35a9c056c66523b61

    SHA512

    f9050baa41ff360aac9ac5ffccf8f896439cfe1d5359086b0851aa737921d47a912584823d620d3f6ae537bf490c0e43fefc6f09fe12fe4cfe7a96e83d0b0d07

  • C:\Users\Admin\AppData\Local\WINDOWS\SERVICES.EXE

    Filesize

    91KB

    MD5

    d33d271b395bb7b4fdc6d00cfb5ece20

    SHA1

    0bfb1d921879bd5c270f46df970db39ed9fc22c3

    SHA256

    260b06ef225b69197b2c20ff6381a2cc218f14a8202f91cce6728a7c55122e0d

    SHA512

    81968ff0beaf262602deded53d6c8899515c0310df387a40fa2d51f6acc3909fc4442b0f1443eee77ba52dec809b439dc7ce9dc82c8c7d4d6b0d9996959944f8

  • C:\Users\Admin\AppData\Local\WINDOWS\SMSS.EXE

    Filesize

    91KB

    MD5

    5d9bead946619d6393b8ddab2b481391

    SHA1

    bda759c64d436baa19371b12bb1d59ee30d98169

    SHA256

    7b197bacbed2d606b8149c8c74af2eced7a7db7386edd778b172c30ccf5b4d4d

    SHA512

    2133e846cf13f57e20f559facd4b3bfdea6382d5848cb0f622d1b29807aa58fa9387be684e36e57133baf126af30d4678eaa648311343c2e6e316fef2599b966

  • C:\Users\Admin\AppData\Local\WINDOWS\WINLOGON.EXE

    Filesize

    91KB

    MD5

    4b1c0a7ebac8274eecde0bca0b34382c

    SHA1

    d479979e8f2eeecb9cc44de0f4e3ac7dd85ce571

    SHA256

    8618e10f9ea4e0e7ee98971e5c0d7ddcefb392983012ca09ba09035129263e34

    SHA512

    6754c98362f74aa8bff237892b21cf4d29226d777e0a4ceb648dccf4c33c367c1d99d209f46a0633dcf8e346ecb38719d0cd3f9d05d8b0721918e5a51c00f28a

  • C:\Users\Admin\AppData\Local\winlogon.exe

    Filesize

    91KB

    MD5

    693bad3183098db3806caec884dd5170

    SHA1

    0482612ac3ff27137d95e3d9f6fc6db2a98f516f

    SHA256

    3fd648fbfae214851ce8a7293a30c02807096b18fc3c9e2b79194ee3002a5aa1

    SHA512

    0874eafc0720dfc46b7f05e47621e62a5f759395c800c5f755b2218a5fdfc3857fa9d052a4be4d4852f43fac4279d209201851419b43cbf8c3185822be8129e5

  • C:\Windows\xk.exe

    Filesize

    91KB

    MD5

    28be59642850d9595e37d34965958100

    SHA1

    d03aba5247e8997fd975f659773bbbfd5d0d2fe6

    SHA256

    cbdbc1b31686acd069b769fcf1e618d2effc3d04c636479f50e787b06fe5c9f3

    SHA512

    1259c6f71bb03e64154b9f9c9e1e156a3d63b339e0d33dec36b176138f92eca56f0078a1632db459c28a66ab3710bb82e18402e3025c734410ede002d854e288

  • memory/540-150-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/540-146-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/1060-139-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/1060-142-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/1432-125-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/1472-0-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/1472-152-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/2496-112-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/3140-129-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/3520-116-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/4408-135-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB