Analysis
-
max time kernel
150s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
14-06-2024 03:13
Static task
static1
Behavioral task
behavioral1
Sample
9dcb6d48ac9e9d78af6cd6818951f180_NeikiAnalytics.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
9dcb6d48ac9e9d78af6cd6818951f180_NeikiAnalytics.exe
Resource
win10v2004-20240611-en
General
-
Target
9dcb6d48ac9e9d78af6cd6818951f180_NeikiAnalytics.exe
-
Size
65KB
-
MD5
9dcb6d48ac9e9d78af6cd6818951f180
-
SHA1
0cd44b249fb9b48da51e464e6ddf07b8cf32d175
-
SHA256
7bfa16f4687747816f1e6c6e08404e8cdab82f13c9daa99e8d0c390f43b545de
-
SHA512
c0dc7d217219905cebd6561fda3be1ef56c29c7f472bd1207c8c93825f8cbc4a0b8e982137150548d224bf36d23d73cf59eddbe090bfced799b5c1623a95578a
-
SSDEEP
1536:ECq3yRuqrI01eArdW/O7JnI2e13XiLij40MkTUVqa/Ouf:7WNqkOJWmo1HpM0MkTUmuf
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" svchost.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" svchost.exe -
Modifies Installed Components in the registry 2 TTPs 8 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" explorer.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999} svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" svchost.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} svchost.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" svchost.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999} svchost.exe -
Executes dropped EXE 4 IoCs
pid Process 2164 explorer.exe 2204 spoolsv.exe 2880 svchost.exe 2784 spoolsv.exe -
Loads dropped DLL 8 IoCs
pid Process 2196 9dcb6d48ac9e9d78af6cd6818951f180_NeikiAnalytics.exe 2196 9dcb6d48ac9e9d78af6cd6818951f180_NeikiAnalytics.exe 2164 explorer.exe 2164 explorer.exe 2204 spoolsv.exe 2204 spoolsv.exe 2880 svchost.exe 2880 svchost.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" explorer.exe -
Drops file in Windows directory 6 IoCs
description ioc Process File opened for modification \??\c:\windows\system\explorer.exe 9dcb6d48ac9e9d78af6cd6818951f180_NeikiAnalytics.exe File opened for modification \??\c:\windows\system\spoolsv.exe explorer.exe File opened for modification \??\c:\windows\system\svchost.exe spoolsv.exe File opened for modification \??\c:\windows\system\explorer.exe explorer.exe File opened for modification \??\c:\windows\system\svchost.exe svchost.exe File opened for modification C:\Windows\system\udsys.exe explorer.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2196 9dcb6d48ac9e9d78af6cd6818951f180_NeikiAnalytics.exe 2164 explorer.exe 2164 explorer.exe 2164 explorer.exe 2880 svchost.exe 2880 svchost.exe 2164 explorer.exe 2880 svchost.exe 2164 explorer.exe 2880 svchost.exe 2164 explorer.exe 2880 svchost.exe 2164 explorer.exe 2880 svchost.exe 2164 explorer.exe 2880 svchost.exe 2164 explorer.exe 2880 svchost.exe 2164 explorer.exe 2880 svchost.exe 2164 explorer.exe 2880 svchost.exe 2164 explorer.exe 2880 svchost.exe 2164 explorer.exe 2880 svchost.exe 2164 explorer.exe 2880 svchost.exe 2164 explorer.exe 2880 svchost.exe 2164 explorer.exe 2880 svchost.exe 2164 explorer.exe 2880 svchost.exe 2164 explorer.exe 2880 svchost.exe 2164 explorer.exe 2880 svchost.exe 2164 explorer.exe 2880 svchost.exe 2164 explorer.exe 2880 svchost.exe 2164 explorer.exe 2880 svchost.exe 2164 explorer.exe 2880 svchost.exe 2164 explorer.exe 2880 svchost.exe 2164 explorer.exe 2880 svchost.exe 2164 explorer.exe 2880 svchost.exe 2164 explorer.exe 2880 svchost.exe 2164 explorer.exe 2880 svchost.exe 2164 explorer.exe 2880 svchost.exe 2164 explorer.exe 2880 svchost.exe 2164 explorer.exe 2880 svchost.exe 2164 explorer.exe 2880 svchost.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 2164 explorer.exe 2880 svchost.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 2196 9dcb6d48ac9e9d78af6cd6818951f180_NeikiAnalytics.exe 2196 9dcb6d48ac9e9d78af6cd6818951f180_NeikiAnalytics.exe 2164 explorer.exe 2164 explorer.exe 2204 spoolsv.exe 2204 spoolsv.exe 2880 svchost.exe 2880 svchost.exe 2784 spoolsv.exe 2784 spoolsv.exe 2164 explorer.exe 2164 explorer.exe -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 2196 wrote to memory of 2164 2196 9dcb6d48ac9e9d78af6cd6818951f180_NeikiAnalytics.exe 28 PID 2196 wrote to memory of 2164 2196 9dcb6d48ac9e9d78af6cd6818951f180_NeikiAnalytics.exe 28 PID 2196 wrote to memory of 2164 2196 9dcb6d48ac9e9d78af6cd6818951f180_NeikiAnalytics.exe 28 PID 2196 wrote to memory of 2164 2196 9dcb6d48ac9e9d78af6cd6818951f180_NeikiAnalytics.exe 28 PID 2164 wrote to memory of 2204 2164 explorer.exe 29 PID 2164 wrote to memory of 2204 2164 explorer.exe 29 PID 2164 wrote to memory of 2204 2164 explorer.exe 29 PID 2164 wrote to memory of 2204 2164 explorer.exe 29 PID 2204 wrote to memory of 2880 2204 spoolsv.exe 30 PID 2204 wrote to memory of 2880 2204 spoolsv.exe 30 PID 2204 wrote to memory of 2880 2204 spoolsv.exe 30 PID 2204 wrote to memory of 2880 2204 spoolsv.exe 30 PID 2880 wrote to memory of 2784 2880 svchost.exe 31 PID 2880 wrote to memory of 2784 2880 svchost.exe 31 PID 2880 wrote to memory of 2784 2880 svchost.exe 31 PID 2880 wrote to memory of 2784 2880 svchost.exe 31 PID 2880 wrote to memory of 2960 2880 svchost.exe 32 PID 2880 wrote to memory of 2960 2880 svchost.exe 32 PID 2880 wrote to memory of 2960 2880 svchost.exe 32 PID 2880 wrote to memory of 2960 2880 svchost.exe 32 PID 2880 wrote to memory of 2812 2880 svchost.exe 36 PID 2880 wrote to memory of 2812 2880 svchost.exe 36 PID 2880 wrote to memory of 2812 2880 svchost.exe 36 PID 2880 wrote to memory of 2812 2880 svchost.exe 36 PID 2880 wrote to memory of 1012 2880 svchost.exe 38 PID 2880 wrote to memory of 1012 2880 svchost.exe 38 PID 2880 wrote to memory of 1012 2880 svchost.exe 38 PID 2880 wrote to memory of 1012 2880 svchost.exe 38
Processes
-
C:\Users\Admin\AppData\Local\Temp\9dcb6d48ac9e9d78af6cd6818951f180_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\9dcb6d48ac9e9d78af6cd6818951f180_NeikiAnalytics.exe"1⤵
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2196 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe2⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Modifies Installed Components in the registry
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2164 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2204 -
\??\c:\windows\system\svchost.exec:\windows\system\svchost.exe4⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Modifies Installed Components in the registry
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2880 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe PR5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2784
-
-
C:\Windows\SysWOW64\at.exeat 03:15 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe5⤵PID:2960
-
-
C:\Windows\SysWOW64\at.exeat 03:16 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe5⤵PID:2812
-
-
C:\Windows\SysWOW64\at.exeat 03:17 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe5⤵PID:1012
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
65KB
MD50f709b24022905dff868fb491e581b09
SHA1f4e1e42ff1694480aa7a76e1e7eeb579590724a6
SHA2569235af4236e9d54a5b71b44aa04e5c2944f17b6c354f2f3ce937f69660bf250f
SHA51234b5e739e225aa1c4ba9da916171edfaa257f476965e65af8c6bc7c7b568151e3bfad093fdb2f98e7a9f33be5de9e1ede87a122f51024e60e8aaa99b0f1fb2f0
-
Filesize
65KB
MD515dcdf7fcf0a091ba8fdc06508f2407b
SHA1a4e9062976f685d30e35e017d2a550162076f6b3
SHA256a1bb9f8a3d4e7b6324d607aef144c16a309c77d49b185a4d23298a149c9e9555
SHA5123a789fd3c669c40e16b3afc23f307673a445efcd0ec06e953f40c7685a61010b92e3dec93816368fcd80dc007f81f4d0f971bcd3fd25a691fffa1a1e903089af
-
Filesize
65KB
MD548b81c519354ba77fbf16a896a11572b
SHA1c36b024c11c44f0df9e862494ffa843351277f6b
SHA25630ef6c4059e4ab6e0567475e7d5c9a2a2599ef57de04b41f29dee3f9426bf1eb
SHA51266e630c26427adf4016ce4f9e5efa5a52944733b5d5f155210f9fa22070e20f0a2c477561e3876bf1b9feb346738cb5825f94b65c4d612fbd798f8c2330fb54c
-
Filesize
65KB
MD50cab11b593b9cd97ef93d6fc966fc12e
SHA14277dfc68d3f04c7fc3120bfa3d0d462c70e2c25
SHA2560d95ca0751bad437043efcb3a0c6a1f62276641e0dc4f81441b0e3dd31788873
SHA512812a2fd4c7adb76e34ae599b2de7b68953d1bf6adadc5a60526fdf95dc268d53635111885515e6b2c481e3f8e855aa87b1a32f0f07a73a7520f6fb93d71cb2e5