Analysis
-
max time kernel
150s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
13/06/2024, 06:36
Static task
static1
Behavioral task
behavioral1
Sample
663aff420066f660104e1c5981b8b970_NeikiAnalytics.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
663aff420066f660104e1c5981b8b970_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
663aff420066f660104e1c5981b8b970_NeikiAnalytics.exe
-
Size
65KB
-
MD5
663aff420066f660104e1c5981b8b970
-
SHA1
4e62c216d4c375c28d6cb7727179df2adad1a9a5
-
SHA256
138e7770a2ed04e277b683d74089cee64a5795047dbad79ec0deffec66f77560
-
SHA512
940b5fbc15d8e798fe922399092f5850b74db935859afbfd98a39d74d08f5db68fe40067df87b58c70e5eeb0557a674a0dd7b227afa2d2988b502c9192026754
-
SSDEEP
1536:ECq3yRuqrI01eArdW/O7JnI2e13XiLij40MkTUVqa/Oud:7WNqkOJWmo1HpM0MkTUmud
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" svchost.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" svchost.exe -
Modifies Installed Components in the registry 2 TTPs 8 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" explorer.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999} svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" svchost.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} svchost.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" svchost.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999} svchost.exe -
Executes dropped EXE 4 IoCs
pid Process 2352 explorer.exe 2708 spoolsv.exe 2736 svchost.exe 2564 spoolsv.exe -
Loads dropped DLL 8 IoCs
pid Process 2108 663aff420066f660104e1c5981b8b970_NeikiAnalytics.exe 2108 663aff420066f660104e1c5981b8b970_NeikiAnalytics.exe 2352 explorer.exe 2352 explorer.exe 2708 spoolsv.exe 2708 spoolsv.exe 2736 svchost.exe 2736 svchost.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" explorer.exe -
Drops file in Windows directory 6 IoCs
description ioc Process File opened for modification \??\c:\windows\system\spoolsv.exe explorer.exe File opened for modification \??\c:\windows\system\svchost.exe spoolsv.exe File opened for modification \??\c:\windows\system\explorer.exe explorer.exe File opened for modification \??\c:\windows\system\svchost.exe svchost.exe File opened for modification C:\Windows\system\udsys.exe explorer.exe File opened for modification \??\c:\windows\system\explorer.exe 663aff420066f660104e1c5981b8b970_NeikiAnalytics.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2108 663aff420066f660104e1c5981b8b970_NeikiAnalytics.exe 2352 explorer.exe 2352 explorer.exe 2352 explorer.exe 2352 explorer.exe 2736 svchost.exe 2736 svchost.exe 2352 explorer.exe 2736 svchost.exe 2352 explorer.exe 2736 svchost.exe 2352 explorer.exe 2736 svchost.exe 2352 explorer.exe 2736 svchost.exe 2352 explorer.exe 2736 svchost.exe 2352 explorer.exe 2736 svchost.exe 2352 explorer.exe 2736 svchost.exe 2352 explorer.exe 2736 svchost.exe 2352 explorer.exe 2736 svchost.exe 2352 explorer.exe 2736 svchost.exe 2352 explorer.exe 2736 svchost.exe 2352 explorer.exe 2736 svchost.exe 2352 explorer.exe 2736 svchost.exe 2352 explorer.exe 2736 svchost.exe 2352 explorer.exe 2736 svchost.exe 2352 explorer.exe 2736 svchost.exe 2352 explorer.exe 2736 svchost.exe 2352 explorer.exe 2736 svchost.exe 2352 explorer.exe 2736 svchost.exe 2352 explorer.exe 2736 svchost.exe 2352 explorer.exe 2736 svchost.exe 2352 explorer.exe 2736 svchost.exe 2352 explorer.exe 2736 svchost.exe 2352 explorer.exe 2736 svchost.exe 2352 explorer.exe 2736 svchost.exe 2352 explorer.exe 2736 svchost.exe 2352 explorer.exe 2736 svchost.exe 2352 explorer.exe 2736 svchost.exe 2352 explorer.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 2352 explorer.exe 2736 svchost.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 2108 663aff420066f660104e1c5981b8b970_NeikiAnalytics.exe 2108 663aff420066f660104e1c5981b8b970_NeikiAnalytics.exe 2352 explorer.exe 2352 explorer.exe 2708 spoolsv.exe 2708 spoolsv.exe 2736 svchost.exe 2736 svchost.exe 2564 spoolsv.exe 2564 spoolsv.exe 2352 explorer.exe 2352 explorer.exe -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 2108 wrote to memory of 2352 2108 663aff420066f660104e1c5981b8b970_NeikiAnalytics.exe 28 PID 2108 wrote to memory of 2352 2108 663aff420066f660104e1c5981b8b970_NeikiAnalytics.exe 28 PID 2108 wrote to memory of 2352 2108 663aff420066f660104e1c5981b8b970_NeikiAnalytics.exe 28 PID 2108 wrote to memory of 2352 2108 663aff420066f660104e1c5981b8b970_NeikiAnalytics.exe 28 PID 2352 wrote to memory of 2708 2352 explorer.exe 29 PID 2352 wrote to memory of 2708 2352 explorer.exe 29 PID 2352 wrote to memory of 2708 2352 explorer.exe 29 PID 2352 wrote to memory of 2708 2352 explorer.exe 29 PID 2708 wrote to memory of 2736 2708 spoolsv.exe 30 PID 2708 wrote to memory of 2736 2708 spoolsv.exe 30 PID 2708 wrote to memory of 2736 2708 spoolsv.exe 30 PID 2708 wrote to memory of 2736 2708 spoolsv.exe 30 PID 2736 wrote to memory of 2564 2736 svchost.exe 31 PID 2736 wrote to memory of 2564 2736 svchost.exe 31 PID 2736 wrote to memory of 2564 2736 svchost.exe 31 PID 2736 wrote to memory of 2564 2736 svchost.exe 31 PID 2736 wrote to memory of 836 2736 svchost.exe 32 PID 2736 wrote to memory of 836 2736 svchost.exe 32 PID 2736 wrote to memory of 836 2736 svchost.exe 32 PID 2736 wrote to memory of 836 2736 svchost.exe 32 PID 2736 wrote to memory of 1520 2736 svchost.exe 36 PID 2736 wrote to memory of 1520 2736 svchost.exe 36 PID 2736 wrote to memory of 1520 2736 svchost.exe 36 PID 2736 wrote to memory of 1520 2736 svchost.exe 36 PID 2736 wrote to memory of 1280 2736 svchost.exe 38 PID 2736 wrote to memory of 1280 2736 svchost.exe 38 PID 2736 wrote to memory of 1280 2736 svchost.exe 38 PID 2736 wrote to memory of 1280 2736 svchost.exe 38
Processes
-
C:\Users\Admin\AppData\Local\Temp\663aff420066f660104e1c5981b8b970_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\663aff420066f660104e1c5981b8b970_NeikiAnalytics.exe"1⤵
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2108 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe2⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Modifies Installed Components in the registry
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2352 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2708 -
\??\c:\windows\system\svchost.exec:\windows\system\svchost.exe4⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Modifies Installed Components in the registry
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2736 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe PR5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2564
-
-
C:\Windows\SysWOW64\at.exeat 06:38 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe5⤵PID:836
-
-
C:\Windows\SysWOW64\at.exeat 06:39 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe5⤵PID:1520
-
-
C:\Windows\SysWOW64\at.exeat 06:40 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe5⤵PID:1280
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
65KB
MD5761c78ca2c94c32b85c190f25b89e10d
SHA1dc1cb413f871fb950913f6c8c297a27133b56108
SHA256a9fa9b0075970f4d8abcb13511dd14bb60c91571f107731bf861017085282fcc
SHA5126ff19cf134606b84aac7fc04398540ef05e551e303b8863251ecf96400e3421dd168f563e70ca1b5a7247509df716f8cd2a478820958ba1cb689cd6ad80066b6
-
Filesize
65KB
MD54472d46ec6fa443957da330df9d8e778
SHA1cd26fc556a89f6ef6132458404fe40807c524cec
SHA256c6ee952286aab272bf9835e30359e2f32cd7d5c70e200e7c404c03a71487984b
SHA512adbde6b5d4df6d8dc22d02703efb5f4743a64245d95686361444e2b57ac0da9c7c8d2d8c46328f13b11895a69abe48f5d4d63f1b151249cb95de228c9b79d84f
-
Filesize
65KB
MD51578cb88e4480829ccd5c0ffdff86415
SHA1463323857abce4a5b38bf9fd514cee464095a5db
SHA25606e07a1aafc10c0b749748f0f783c415903c310269b59b5d3e01c26454ee5917
SHA512efdcdc783cdb78f5ec984bad140122af1b7d3d585a7eb543ef0942061f1ec7f00e4219b278bc47ac7d2a269e3a36a538b5516df54bf8d36e110cd5d7a598b22a
-
Filesize
65KB
MD5cbcd724a28ffd5786a047c05249c29a1
SHA1b2e2f8671a40d3c1376b89f2ff3095011013e4bd
SHA25634ef97700892d1796937ba12f330d49c4b2b7a2bab53c3fdb6b35f37f3ec1c8e
SHA512d5e8810f3d5e8b67ceb6adf1f99a6e5a0a35482f47876e4e0a1b8be83407840f7f883c5e3d4bdd200a740d17fe3c0ba2d68e0bb4690098ed0b12db350a57d867