Analysis
-
max time kernel
120s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
16/06/2024, 21:24
Static task
static1
Behavioral task
behavioral1
Sample
0bad0e993d61eb191bca91b12995fe70_NeikiAnalytics.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
0bad0e993d61eb191bca91b12995fe70_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
0bad0e993d61eb191bca91b12995fe70_NeikiAnalytics.exe
-
Size
349KB
-
MD5
0bad0e993d61eb191bca91b12995fe70
-
SHA1
10b57818169332689ba90c73ed544dab34e3a9fa
-
SHA256
5997340d387df4e1a6e276e5132bf193a31e736bbb3e0a4a44f0546c148ef1ad
-
SHA512
9236bf693b74528abc6bebfe424e29b0df66bf3dcc818b14eff6074fe81e28a4245282b1c038a48d190d27506496fa6cb730206d536e1b0a22cedbddce245ca1
-
SSDEEP
6144:DVTQSSiexKAK4y6UvcZSeNH49qQQOH+ym4LLIoTqHSMaxzL:VSiOK4yjNQOGzoTCSMG
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\apppatch\\svchost.exe," svchost.exe -
Executes dropped EXE 1 IoCs
pid Process 1708 svchost.exe -
Loads dropped DLL 5 IoCs
pid Process 1520 0bad0e993d61eb191bca91b12995fe70_NeikiAnalytics.exe 1520 0bad0e993d61eb191bca91b12995fe70_NeikiAnalytics.exe 2540 WerFault.exe 2540 WerFault.exe 2540 WerFault.exe -
Modifies WinLogon 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\475190fc = "C:\\Windows\\apppatch\\svchost.exe" 0bad0e993d61eb191bca91b12995fe70_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\475190fc = "C:\\Windows\\apppatch\\svchost.exe" svchost.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\apppatch\svchost.exe 0bad0e993d61eb191bca91b12995fe70_NeikiAnalytics.exe File opened for modification C:\Windows\apppatch\svchost.exe 0bad0e993d61eb191bca91b12995fe70_NeikiAnalytics.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2540 1708 WerFault.exe 28 -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1708 svchost.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1520 0bad0e993d61eb191bca91b12995fe70_NeikiAnalytics.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1520 wrote to memory of 1708 1520 0bad0e993d61eb191bca91b12995fe70_NeikiAnalytics.exe 28 PID 1520 wrote to memory of 1708 1520 0bad0e993d61eb191bca91b12995fe70_NeikiAnalytics.exe 28 PID 1520 wrote to memory of 1708 1520 0bad0e993d61eb191bca91b12995fe70_NeikiAnalytics.exe 28 PID 1520 wrote to memory of 1708 1520 0bad0e993d61eb191bca91b12995fe70_NeikiAnalytics.exe 28 PID 1708 wrote to memory of 2540 1708 svchost.exe 29 PID 1708 wrote to memory of 2540 1708 svchost.exe 29 PID 1708 wrote to memory of 2540 1708 svchost.exe 29 PID 1708 wrote to memory of 2540 1708 svchost.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\0bad0e993d61eb191bca91b12995fe70_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\0bad0e993d61eb191bca91b12995fe70_NeikiAnalytics.exe"1⤵
- Loads dropped DLL
- Modifies WinLogon
- Drops file in Windows directory
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:1520 -
C:\Windows\apppatch\svchost.exe"C:\Windows\apppatch\svchost.exe"2⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Modifies WinLogon
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1708 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1708 -s 5603⤵
- Loads dropped DLL
- Program crash
PID:2540
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
349KB
MD500286fb6d1f60c4796c8c5e334b5f1dc
SHA174735058378e8b7ccf2b563ad8946a0f949b09aa
SHA25608d7b88f0e6a159e27c4e8d90e270b52b62d235b4ab7983a911b96d241cd90b6
SHA5125ab8011e1c1b6fc85618e25cab7dfb854a4bb198384b3b49f91a224873f3bf0eae5137e667e2e7192d3cb07bb6e68fe3da95861ea15ba91249b4aa46f65e6ba0