Analysis

  • max time kernel
    125s
  • max time network
    127s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240611-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system
  • submitted
    16/06/2024, 03:50

General

  • Target

    d3384cf6237ec8a696e5324009ae84e0_NeikiAnalytics.exe

  • Size

    91KB

  • MD5

    d3384cf6237ec8a696e5324009ae84e0

  • SHA1

    59d03d3207e5a16f7851a1163057e24f65f6be40

  • SHA256

    9f9eac48cef9394d1da1051f9d426e2c58b829beb87f5db9f3130b4831f5fa9c

  • SHA512

    71523b14d0dd8f1b0f86d45abc007a3c0f15ea3db55a014bc439ba0faa6bb5a105ee3929c78d6bb75b72fbec209bcdaf1c417220480d40a4960d190bcb715b42

  • SSDEEP

    768:E3gRYjXbUeHORIC4ZxBMldNKm8Mxm8I+IxrjPfAQ4o3ImuT3gRYjXbUeHORIC4ZG:uT3OA3+KQsxfS4iT3OA3+KQsxfS4mV

Score
10/10

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 2 IoCs
  • Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Disables RegEdit via registry modification 2 IoCs
  • Disables use of System Restore points 1 TTPs
  • Executes dropped EXE 7 IoCs
  • Modifies system executable filetype association 2 TTPs 13 IoCs
  • Adds Run key to start application 2 TTPs 5 IoCs
  • Drops file in System32 directory 6 IoCs
  • Drops file in Windows directory 2 IoCs
  • Modifies Control Panel 4 IoCs
  • Modifies registry class 15 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs
  • System policy modification 1 TTPs 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d3384cf6237ec8a696e5324009ae84e0_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\d3384cf6237ec8a696e5324009ae84e0_NeikiAnalytics.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Modifies visibility of file extensions in Explorer
    • Modifies visiblity of hidden/system files in Explorer
    • Disables RegEdit via registry modification
    • Modifies system executable filetype association
    • Adds Run key to start application
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies Control Panel
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    • System policy modification
    PID:4268
    • C:\Windows\xk.exe
      C:\Windows\xk.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:3432
    • C:\Windows\SysWOW64\IExplorer.exe
      C:\Windows\system32\IExplorer.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:4896
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:2528
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:3596
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:5076
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:3484
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:4428
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4160,i,3595107284059830391,18018199024659337217,262144 --variations-seed-version --mojo-platform-channel-handle=4064 /prefetch:8
    1⤵
      PID:3888

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\WINDOWS\CSRSS.EXE

      Filesize

      91KB

      MD5

      895050d863dd54493155943d30cb3d99

      SHA1

      0df150d4fb4f6adafc282c337f5484972dc45d20

      SHA256

      28c11dfb0089fe02652c802a983634eb3fd4f69b10e524f2346716e49482d6e8

      SHA512

      22cf177cea592db56bd1a6ae1ade40ced583c92fe203b262cc8b59146f5519e0a39cc040c55688204fbc03ee09142e096cc57b69051318b6bf9b248773f769d9

    • C:\Users\Admin\AppData\Local\WINDOWS\LSASS.EXE

      Filesize

      91KB

      MD5

      5fcee384f195076d48e43988a11d700d

      SHA1

      638429a9089826712269a597e06b18e072b819e6

      SHA256

      5e97a0925d5a48752d1eb5b083b07979f3694e712f0e0a241f4cc3b7ceb83147

      SHA512

      bcfa01dbb7b76d67536f4fbd374c16f23da43339552f2ca83f866c2454878eb2304b47d2d023659acc83dc51971802fc25e270ffb63b75148d0e2ad12986c2c6

    • C:\Users\Admin\AppData\Local\WINDOWS\SERVICES.EXE

      Filesize

      91KB

      MD5

      24fbfa6ac8e0513fe2913cd10e5e9d42

      SHA1

      76d55e1fe00bc474e9fea6482903fc1903a03e2b

      SHA256

      ab92aeec369709d18d5b1e6d1412e575d686ab1e8ab7cb62396648e349811a4d

      SHA512

      3b7a5d70c31b1986a43c109acbe0b660c1332e8baf8d1d6bce59175463eba0b4e2802ff6eb572b871ec82b9b0839038a2613147339fe537421032856b1cb0f96

    • C:\Users\Admin\AppData\Local\WINDOWS\SMSS.EXE

      Filesize

      91KB

      MD5

      00125d30d094caef42d32f184410d17b

      SHA1

      ded8fedb7630812a20c68e586c5974fdfc84235a

      SHA256

      6b7ec5da2b7801e674db4e7fb169541b56aff929620db7da4e3334f8f571371f

      SHA512

      df101c50dd09c56258cd24417483574fbcc2f3c839cbcfdbf56eee047d8e2a7747fae33bf3e699ef1d1c79ad812b59b994cecac1eeeaf607c073dba35cee2db6

    • C:\Users\Admin\AppData\Local\WINDOWS\WINLOGON.EXE

      Filesize

      91KB

      MD5

      582d6eb7ef47110c3ed5638f49e4ae5c

      SHA1

      9ba35a16b9b6fdd006eb7726b844f2f9ff30ced0

      SHA256

      d9417f5af1a1850e1e2c69c0e98d345773510b98cb564db870f4435d8123ecf9

      SHA512

      ce0338b26c8be1b175d555077c5f461eef7ef05e766d5b046fb10539efa456375632c5a7b90aaeb951af3ed44bb2d6097170b090e5ab0b51a5ea6133b00349fe

    • C:\Users\Admin\AppData\Local\winlogon.exe

      Filesize

      91KB

      MD5

      d3384cf6237ec8a696e5324009ae84e0

      SHA1

      59d03d3207e5a16f7851a1163057e24f65f6be40

      SHA256

      9f9eac48cef9394d1da1051f9d426e2c58b829beb87f5db9f3130b4831f5fa9c

      SHA512

      71523b14d0dd8f1b0f86d45abc007a3c0f15ea3db55a014bc439ba0faa6bb5a105ee3929c78d6bb75b72fbec209bcdaf1c417220480d40a4960d190bcb715b42

    • C:\Windows\SysWOW64\IExplorer.exe

      Filesize

      91KB

      MD5

      da241acd24ccfa3132cb4665794a0ad2

      SHA1

      2ab9ae4957d5c02c68f344bcd980b1bf92cb57e4

      SHA256

      028b89cbc38617930b5353bd8ce1a8d1d920e0d02ca352ac4486ced185dd80a1

      SHA512

      3f9d2b693d0791efca7e0ccf43a1673d7bff27cd48d2bd3b1be959c641053f1bc7ae7827a209956a0704530a4897319b6478b51653055b609c4ddac75e158cf0

    • C:\Windows\xk.exe

      Filesize

      91KB

      MD5

      f1a87aa84ae7abc096768391df670cb7

      SHA1

      d0334ad236de6c6a8036c39cfdd7d49e760aa96f

      SHA256

      b18ce28fd4eeb11756aae7507a8f93f77cb9d612de0e134d986ef8cbaecf8fa8

      SHA512

      7f5ee0901c55f551a78f1b3e35a824ea7e4b9f79a4b35356fa8c7ecb4a345a4a2f123a06f965bbc963e34650b2ac8e4a48d9b2ba8dc0e31cce47421c9ac46e2f

    • memory/2528-139-0x0000000000400000-0x000000000042C000-memory.dmp

      Filesize

      176KB

    • memory/2528-136-0x0000000000400000-0x000000000042C000-memory.dmp

      Filesize

      176KB

    • memory/2528-132-0x0000000075200000-0x000000007535D000-memory.dmp

      Filesize

      1.4MB

    • memory/3432-118-0x0000000000400000-0x000000000042C000-memory.dmp

      Filesize

      176KB

    • memory/3432-116-0x0000000000400000-0x000000000042C000-memory.dmp

      Filesize

      176KB

    • memory/3432-113-0x0000000075200000-0x000000007535D000-memory.dmp

      Filesize

      1.4MB

    • memory/3432-112-0x0000000000400000-0x000000000042C000-memory.dmp

      Filesize

      176KB

    • memory/3484-161-0x0000000000400000-0x000000000042C000-memory.dmp

      Filesize

      176KB

    • memory/3484-162-0x0000000075200000-0x000000007535D000-memory.dmp

      Filesize

      1.4MB

    • memory/3484-167-0x0000000000400000-0x000000000042C000-memory.dmp

      Filesize

      176KB

    • memory/3596-149-0x0000000000400000-0x000000000042C000-memory.dmp

      Filesize

      176KB

    • memory/3596-141-0x0000000075200000-0x000000007535D000-memory.dmp

      Filesize

      1.4MB

    • memory/4268-0-0x0000000000400000-0x000000000042C000-memory.dmp

      Filesize

      176KB

    • memory/4268-4-0x0000000000401000-0x0000000000427000-memory.dmp

      Filesize

      152KB

    • memory/4268-3-0x0000000000400000-0x000000000042C000-memory.dmp

      Filesize

      176KB

    • memory/4268-178-0x0000000000400000-0x000000000042C000-memory.dmp

      Filesize

      176KB

    • memory/4268-179-0x0000000000401000-0x0000000000427000-memory.dmp

      Filesize

      152KB

    • memory/4268-2-0x0000000075200000-0x000000007535D000-memory.dmp

      Filesize

      1.4MB

    • memory/4268-143-0x0000000000401000-0x0000000000427000-memory.dmp

      Filesize

      152KB

    • memory/4268-1-0x00000000001C0000-0x00000000001C4000-memory.dmp

      Filesize

      16KB

    • memory/4428-171-0x0000000075200000-0x000000007535D000-memory.dmp

      Filesize

      1.4MB

    • memory/4428-176-0x0000000000400000-0x000000000042C000-memory.dmp

      Filesize

      176KB

    • memory/4896-123-0x0000000075200000-0x000000007535D000-memory.dmp

      Filesize

      1.4MB

    • memory/4896-122-0x0000000000400000-0x000000000042C000-memory.dmp

      Filesize

      176KB

    • memory/4896-128-0x0000000000400000-0x000000000042C000-memory.dmp

      Filesize

      176KB

    • memory/5076-157-0x0000000000400000-0x000000000042C000-memory.dmp

      Filesize

      176KB

    • memory/5076-155-0x0000000000400000-0x000000000042C000-memory.dmp

      Filesize

      176KB

    • memory/5076-151-0x0000000075200000-0x000000007535D000-memory.dmp

      Filesize

      1.4MB