Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
16/06/2024, 21:06
Static task
static1
Behavioral task
behavioral1
Sample
09230f578281679a9ad3f2cfabb5a2a0_NeikiAnalytics.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
09230f578281679a9ad3f2cfabb5a2a0_NeikiAnalytics.exe
Resource
win10v2004-20240611-en
General
-
Target
09230f578281679a9ad3f2cfabb5a2a0_NeikiAnalytics.exe
-
Size
349KB
-
MD5
09230f578281679a9ad3f2cfabb5a2a0
-
SHA1
b88ef94c8c18e08a1a66eeec7bc62e02e3e7f91b
-
SHA256
b1da6aa045c82bc993a5d81f6c723f7565b8209e7a3439a69786d8fde775de2d
-
SHA512
333e9b8e42213bb3fd0b535b7d731764095fabc2f9450237e9cfdaa833315abe036115d5ac0e67fa3e4899bb4c5dab09c0e2077a1f1651d01b3e967bde0830c5
-
SSDEEP
6144:1VTQTSiexKAK4y6UvcZSeNH49qQQOH+ym4LLIoTqHSMaxzL:2SiOK4yjNQOGzoTCSMG
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\apppatch\\svchost.exe," svchost.exe -
Executes dropped EXE 1 IoCs
pid Process 1560 svchost.exe -
Loads dropped DLL 5 IoCs
pid Process 292 09230f578281679a9ad3f2cfabb5a2a0_NeikiAnalytics.exe 292 09230f578281679a9ad3f2cfabb5a2a0_NeikiAnalytics.exe 2456 WerFault.exe 2456 WerFault.exe 2456 WerFault.exe -
Modifies WinLogon 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\f6b7e4b2 = "C:\\Windows\\apppatch\\svchost.exe" 09230f578281679a9ad3f2cfabb5a2a0_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\f6b7e4b2 = "C:\\Windows\\apppatch\\svchost.exe" svchost.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\apppatch\svchost.exe 09230f578281679a9ad3f2cfabb5a2a0_NeikiAnalytics.exe File opened for modification C:\Windows\apppatch\svchost.exe 09230f578281679a9ad3f2cfabb5a2a0_NeikiAnalytics.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2456 1560 WerFault.exe 28 -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1560 svchost.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 292 09230f578281679a9ad3f2cfabb5a2a0_NeikiAnalytics.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 292 wrote to memory of 1560 292 09230f578281679a9ad3f2cfabb5a2a0_NeikiAnalytics.exe 28 PID 292 wrote to memory of 1560 292 09230f578281679a9ad3f2cfabb5a2a0_NeikiAnalytics.exe 28 PID 292 wrote to memory of 1560 292 09230f578281679a9ad3f2cfabb5a2a0_NeikiAnalytics.exe 28 PID 292 wrote to memory of 1560 292 09230f578281679a9ad3f2cfabb5a2a0_NeikiAnalytics.exe 28 PID 1560 wrote to memory of 2456 1560 svchost.exe 29 PID 1560 wrote to memory of 2456 1560 svchost.exe 29 PID 1560 wrote to memory of 2456 1560 svchost.exe 29 PID 1560 wrote to memory of 2456 1560 svchost.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\09230f578281679a9ad3f2cfabb5a2a0_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\09230f578281679a9ad3f2cfabb5a2a0_NeikiAnalytics.exe"1⤵
- Loads dropped DLL
- Modifies WinLogon
- Drops file in Windows directory
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:292 -
C:\Windows\apppatch\svchost.exe"C:\Windows\apppatch\svchost.exe"2⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Modifies WinLogon
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1560 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1560 -s 5043⤵
- Loads dropped DLL
- Program crash
PID:2456
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
349KB
MD588dc4329464d5f3109820945047830d3
SHA1da30399d15e17b46ad8176ea39c0cccc69c50f23
SHA2568bbf72c23492cb94303c894be3116bd24773fb9d68ec051e03c45d4500838144
SHA512a60f9973b76080affb2bee90df99ef9e8cb7d405d68cb50745fb18c0c3aa67bc60273927eb6f928f8b5257d538666af367ab7601937aad2ea19e1ec3bfa90b85