Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
13/06/2024, 13:28
Static task
static1
Behavioral task
behavioral1
Sample
8038c05f9ff14c1b2f0df91a4c6ec070_NeikiAnalytics.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
8038c05f9ff14c1b2f0df91a4c6ec070_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
8038c05f9ff14c1b2f0df91a4c6ec070_NeikiAnalytics.exe
-
Size
218KB
-
MD5
8038c05f9ff14c1b2f0df91a4c6ec070
-
SHA1
e7f0e08d50b43ca9c66f78e7045a08abf8091c28
-
SHA256
06f4bb371fe6c04372c39c5a93d4859c0bc006f0bdbfa19eacc4c9af0339751e
-
SHA512
10acc4dd04db63cc8d0a36fb09991d977fa507709a4cbd1cf041e7d975addcb58451e73bf3bb60a686955cdb34a8d64614c93a19ada33c4db378011277ef7e76
-
SSDEEP
3072:Nvm4SZsQrNzPrl6rjGMjp39d4u8iqddCxMIJOb2o5DsBPjim6hwM2H6:B1SyAJp6rjn1gOObn4b6h9h
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\apppatch\\svchost.exe," svchost.exe -
Executes dropped EXE 1 IoCs
pid Process 2728 svchost.exe -
Loads dropped DLL 2 IoCs
pid Process 832 8038c05f9ff14c1b2f0df91a4c6ec070_NeikiAnalytics.exe 832 8038c05f9ff14c1b2f0df91a4c6ec070_NeikiAnalytics.exe -
Modifies WinLogon 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\b025bf3a = "C‹\x12Vj$2d¢\bŠLµCzW*ZnìÅV\x02Ú\u0081\rò˜ì¦°\"-&…\x06ËþR2~£úY0\u008d°¶\x03`C.á\x06`âÎ\x0eJ.\u0081nZŽÖ\x06º\x11ñ~v\x16.øâåú\x16ž^~•\x0e\x12õ–Ž\x0eP>\bŽ\x116\x1eªn\x16¶žs¾ÓUÎ+[a¦sÖîò˜)™žöé\bÆ\x18vÊÖµžÊÓ…[¦ÕîÖÃÞ½ÆAñvžeÉCιÞ^Ú0Íq)]HB™!Z¥Þ¢ó\x11¢¦NŽ-h‚ÙH^Á=žž°\x16èSBÎR1nN“^Æez>\u00a0Ê\x0ežÞÛ\x16¾5\vsqvþ\"ŽE¦\tF\x19n\x1a¾2*e^Hfž‰Hzeö;VøÑ¡\x02;ö!6Î\x02Àa\"~\x1aÑ\x16önvî¦v^S" 8038c05f9ff14c1b2f0df91a4c6ec070_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\b025bf3a = "C‹\x12Vj$2d¢\bŠLµCzW*ZnìÅV\x02Ú\u0081\rò˜ì¦°\"-&…\x06ËþR2~£úY0\u008d°¶\x03`C.á\x06`âÎ\x0eJ.\u0081nZŽÖ\x06º\x11ñ~v\x16.øâåú\x16ž^~•\x0e\x12õ–Ž\x0eP>\bŽ\x116\x1eªn\x16¶žs¾ÓUÎ+[a¦sÖîò˜)™žöé\bÆ\x18vÊÖµžÊÓ…[¦ÕîÖÃÞ½ÆAñvžeÉCιÞ^Ú0Íq)]HB™!Z¥Þ¢ó\x11¢¦NŽ-h‚ÙH^Á=žž°\x16èSBÎR1nN“^Æez>\u00a0Ê\x0ežÞÛ\x16¾5\vsqvþ\"ŽE¦\tF\x19n\x1a¾2*e^Hfž‰Hzeö;VøÑ¡\x02;ö!6Î\x02Àa\"~\x1aÑ\x16önvî¦v^S" svchost.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\apppatch\svchost.exe 8038c05f9ff14c1b2f0df91a4c6ec070_NeikiAnalytics.exe File opened for modification C:\Windows\apppatch\svchost.exe 8038c05f9ff14c1b2f0df91a4c6ec070_NeikiAnalytics.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8 svchost.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8\Blob = 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 svchost.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13 svchost.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13\Blob = 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 svchost.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 832 8038c05f9ff14c1b2f0df91a4c6ec070_NeikiAnalytics.exe 832 8038c05f9ff14c1b2f0df91a4c6ec070_NeikiAnalytics.exe 832 8038c05f9ff14c1b2f0df91a4c6ec070_NeikiAnalytics.exe 832 8038c05f9ff14c1b2f0df91a4c6ec070_NeikiAnalytics.exe 2728 svchost.exe 2728 svchost.exe 2728 svchost.exe 2728 svchost.exe 2728 svchost.exe 2728 svchost.exe 2728 svchost.exe 2728 svchost.exe 2728 svchost.exe 2728 svchost.exe 2728 svchost.exe 2728 svchost.exe 2728 svchost.exe 2728 svchost.exe 2728 svchost.exe 2728 svchost.exe 2728 svchost.exe 2728 svchost.exe 2728 svchost.exe 2728 svchost.exe 2728 svchost.exe 2728 svchost.exe 2728 svchost.exe 2728 svchost.exe 2728 svchost.exe 2728 svchost.exe 2728 svchost.exe 2728 svchost.exe 2728 svchost.exe 2728 svchost.exe 2728 svchost.exe 2728 svchost.exe 2728 svchost.exe 2728 svchost.exe 2728 svchost.exe 2728 svchost.exe 2728 svchost.exe 2728 svchost.exe 2728 svchost.exe 2728 svchost.exe 2728 svchost.exe 2728 svchost.exe 2728 svchost.exe 2728 svchost.exe 2728 svchost.exe 2728 svchost.exe 2728 svchost.exe 2728 svchost.exe 2728 svchost.exe 2728 svchost.exe 2728 svchost.exe 2728 svchost.exe 2728 svchost.exe 2728 svchost.exe 2728 svchost.exe 2728 svchost.exe 2728 svchost.exe 2728 svchost.exe 2728 svchost.exe 2728 svchost.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 832 8038c05f9ff14c1b2f0df91a4c6ec070_NeikiAnalytics.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 832 wrote to memory of 2728 832 8038c05f9ff14c1b2f0df91a4c6ec070_NeikiAnalytics.exe 28 PID 832 wrote to memory of 2728 832 8038c05f9ff14c1b2f0df91a4c6ec070_NeikiAnalytics.exe 28 PID 832 wrote to memory of 2728 832 8038c05f9ff14c1b2f0df91a4c6ec070_NeikiAnalytics.exe 28 PID 832 wrote to memory of 2728 832 8038c05f9ff14c1b2f0df91a4c6ec070_NeikiAnalytics.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\8038c05f9ff14c1b2f0df91a4c6ec070_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\8038c05f9ff14c1b2f0df91a4c6ec070_NeikiAnalytics.exe"1⤵
- Loads dropped DLL
- Modifies WinLogon
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:832 -
C:\Windows\apppatch\svchost.exe"C:\Windows\apppatch\svchost.exe"2⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Modifies WinLogon
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
PID:2728
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57db6f4f7350c3b30f5cff2338462e9c1
SHA192a5a0de88147c99ca628ee5ce460b62c46562f8
SHA256f0120083c1b2b2795ab44e68c9411bfc4c179748412af253675d444c0eb430d9
SHA5125d8adf3713371a4993f00e8e8e4d3d7ee3c22e066b25b544bd43c2b7eebfffa6334a8daea5b12596a5c8323bca18eff6db074ea147daf269d0ae6c95dbf202a9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5da29e0fd97321d4cb902e17911a9a52e
SHA1d57e81e121195a0693019be3ea6b94345f31482e
SHA2568193abc74c99da4b4e0cec9bd918c5f4372b15776ea4793f3a6ec319118735b9
SHA5120738a846270e5ae76b1e1e8656a5b813574dd70cfc532ea901fc51837193d7f42db2c413681d37d0f67d367e5251d957517339efd6be87b72e16b191b8b4c205
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD50b0a4fd9676577d03723c96ac9f4ef0c
SHA1d3b6b78aca8fd1b36d82533930c74b725eed34c1
SHA25652c95368baa2466323d2df25b44c68534bb24a19dd600eeb39d85a66130f89e9
SHA5123eef50e04195229bc8a12c841f7d73d22a7ae5d75bd1296b44e8d6203fd63d9ea26ed6e37ba832797eff500eb2f829a8489af58b27a41bf2a0a51bedd628b811
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\8ADCJI8Z\login[1].htm
Filesize168B
MD5d57e3a550060f85d44a175139ea23021
SHA12c5cb3428a322c9709a34d04dd86fe7628f8f0a6
SHA25643edf068d34276e8ade4113d4d7207de19fc98a2ae1c07298e593edae2a8774c
SHA5120364fe6a010fce7a3f4a6344c84468c64b20fd131f3160fc649db78f1075ba52d8a1c4496e50dbe27c357e01ee52e94cdcda8f7927cba28d5f2f45b9da690063
-
Filesize
2KB
MD580a32dd5f5dbeb4656a306541e2dd67d
SHA13fe452f4e41370deacebbab2fa5de960ee0ebff8
SHA256f20c0c39ed02a1bbaf58a8876e89e0f07d72a64602ddaab81df3279d1b903d3e
SHA51242c815b3c25b7b266a176137b8218959cdeace5a5f5ca3dfd571ce3a4746a81a9f691564cb06f19e55cd35ee2488f632f6bff4f532d07726485f7b16e7c9f2da
-
Filesize
42KB
MD502b8575662f641adf54acb7222855b23
SHA17e1401dcee26895cf07243d39f2bf9eb9f8b77ab
SHA25640b4bb03fd16975d54b4f85c7940b245f0aecf4b18625442bea86c0238af2904
SHA512e2a01c3b1397fd4a6b462db5148189381a74697f227da22cf4559ef6d953b9eb70c77310c1102747398005d9b6ffe0b922363489460737139ac77c444d62a9ef
-
Filesize
481B
MD56fd72416abeaf6cc36aab899c3536914
SHA1fd9c88000ad9c4f8b95949d9518ddb443f2b6a11
SHA2566fe1ddb36593e6020cce7c240e1eafd098141c7573242793492ee78281b8eb73
SHA51233191989e4b7a1598e5fcb881cb225240b9e241307fb0813b631fc39734b8129db4fdcbbe9f1c37654643f994d4a4463970bad3dfaf689110932ea5911ed9b30
-
Filesize
1KB
MD57b1c84529b0ba0f9a9ecdfed068d8575
SHA16b44e7b22530d18485c6e2d0034620a10b196b89
SHA2560aec0abd942a67532fdf7b32dd6a4a3d4662e7b818b42e85c86fe8ebbc3f3114
SHA512e4abb3c1d9a11ee7313f2fc2efe54cd39bfe044ca8764d3d539b8aabedea87d670b7b96e79323b2cfd3c3655cfea763b7b26618fd263d68306a2540914320e45
-
Filesize
593B
MD5926512864979bc27cf187f1de3f57aff
SHA1acdeb9d6187932613c7fa08eaf28f0cd8116f4b5
SHA256b3e893a653ec06c05ee90f2f6e98cc052a92f6616d7cca8c416420e178dcc73f
SHA512f6f9fd3ca9305bec879cfcd38e64111a18e65e30d25c49e9f2cd546cbab9b2dcd03eca81952f6b77c0eaab20192ef7bef0d8d434f6f371811929e75f8620633b
-
Filesize
457B
MD5531ec87a0b2f9477a52d88b111d0d46a
SHA150a72e5752075309f91c062e0282a7e7cd1e751e
SHA2564875b451859b1eb8d0d3b040b1bb8d654d212edb6d9c721cf0f4372129579385
SHA51207994963fd76b31ef0ba2c7f418dcb3ee0290f6baca2d8ec63a6e6b861557b13fbc20d2f0a10a66f35c4d72d4d2c1920ac88b96174604f2f8856868912327da1
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
218KB
MD5cb35403c0a30352a53311687dbacaf24
SHA125271c8bc3a656c30a07fa599ad7af7f3896a3f3
SHA256daeb3b908540fe4076d855677d00be4dd936ff9bce21c20e9147b8e4e3ca3ae7
SHA51260c7eefa9400a70a1f90bea5bfcbc71071a23a62db9ff04d09e2f0741ebc10807709f4bf58e2f1fd2a9b5988deaa8034275fc9190e794bb65a5d108c19f7ca3e