Analysis
-
max time kernel
150s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
17/06/2024, 02:29
Static task
static1
Behavioral task
behavioral1
Sample
3737f5ec040b2beb023256e23f621c30_NeikiAnalytics.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
3737f5ec040b2beb023256e23f621c30_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
3737f5ec040b2beb023256e23f621c30_NeikiAnalytics.exe
-
Size
66KB
-
MD5
3737f5ec040b2beb023256e23f621c30
-
SHA1
3a2dcc1f0755172f916e4f97e2bd83a26de81df7
-
SHA256
25c4ef606891510b36fe99d74aa56033bdcff40a9316d4f02b518bdeb7a03d16
-
SHA512
6977bb44b370829d4dd873df18451bcb28214f0a48297ec41159be6ecbd505156e2999c6e4e7e4f16e332efbb778d49040663c1b7a19957709257890b3668e87
-
SSDEEP
1536:EHfetdklPp+07gDSrB8Xru2zGeJxgawTzpXzrDJrXif:IeklMMYJhqezw/pXzH9if
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" explorer.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" svchost.exe -
Modifies Installed Components in the registry 2 TTPs 8 IoCs
description ioc Process Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999} svchost.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" explorer.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999} svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" svchost.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} svchost.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" svchost.exe -
Executes dropped EXE 4 IoCs
pid Process 2716 explorer.exe 2736 spoolsv.exe 2504 svchost.exe 2480 spoolsv.exe -
Loads dropped DLL 8 IoCs
pid Process 2908 3737f5ec040b2beb023256e23f621c30_NeikiAnalytics.exe 2908 3737f5ec040b2beb023256e23f621c30_NeikiAnalytics.exe 2716 explorer.exe 2716 explorer.exe 2736 spoolsv.exe 2736 spoolsv.exe 2504 svchost.exe 2504 svchost.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" explorer.exe -
Drops file in Windows directory 6 IoCs
description ioc Process File opened for modification \??\c:\windows\system\explorer.exe explorer.exe File opened for modification \??\c:\windows\system\svchost.exe svchost.exe File opened for modification C:\Windows\system\udsys.exe explorer.exe File opened for modification \??\c:\windows\system\explorer.exe 3737f5ec040b2beb023256e23f621c30_NeikiAnalytics.exe File opened for modification \??\c:\windows\system\spoolsv.exe explorer.exe File opened for modification \??\c:\windows\system\svchost.exe spoolsv.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2908 3737f5ec040b2beb023256e23f621c30_NeikiAnalytics.exe 2716 explorer.exe 2716 explorer.exe 2716 explorer.exe 2504 svchost.exe 2504 svchost.exe 2716 explorer.exe 2504 svchost.exe 2716 explorer.exe 2504 svchost.exe 2716 explorer.exe 2504 svchost.exe 2716 explorer.exe 2504 svchost.exe 2716 explorer.exe 2504 svchost.exe 2716 explorer.exe 2504 svchost.exe 2716 explorer.exe 2504 svchost.exe 2716 explorer.exe 2504 svchost.exe 2716 explorer.exe 2504 svchost.exe 2716 explorer.exe 2504 svchost.exe 2716 explorer.exe 2504 svchost.exe 2716 explorer.exe 2504 svchost.exe 2716 explorer.exe 2504 svchost.exe 2716 explorer.exe 2504 svchost.exe 2716 explorer.exe 2504 svchost.exe 2716 explorer.exe 2504 svchost.exe 2716 explorer.exe 2504 svchost.exe 2716 explorer.exe 2504 svchost.exe 2716 explorer.exe 2504 svchost.exe 2716 explorer.exe 2504 svchost.exe 2716 explorer.exe 2504 svchost.exe 2716 explorer.exe 2504 svchost.exe 2716 explorer.exe 2504 svchost.exe 2716 explorer.exe 2504 svchost.exe 2716 explorer.exe 2504 svchost.exe 2716 explorer.exe 2504 svchost.exe 2716 explorer.exe 2504 svchost.exe 2716 explorer.exe 2504 svchost.exe 2716 explorer.exe 2504 svchost.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 2716 explorer.exe 2504 svchost.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 2908 3737f5ec040b2beb023256e23f621c30_NeikiAnalytics.exe 2908 3737f5ec040b2beb023256e23f621c30_NeikiAnalytics.exe 2716 explorer.exe 2716 explorer.exe 2736 spoolsv.exe 2736 spoolsv.exe 2504 svchost.exe 2504 svchost.exe 2480 spoolsv.exe 2480 spoolsv.exe 2716 explorer.exe 2716 explorer.exe -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 2908 wrote to memory of 2716 2908 3737f5ec040b2beb023256e23f621c30_NeikiAnalytics.exe 28 PID 2908 wrote to memory of 2716 2908 3737f5ec040b2beb023256e23f621c30_NeikiAnalytics.exe 28 PID 2908 wrote to memory of 2716 2908 3737f5ec040b2beb023256e23f621c30_NeikiAnalytics.exe 28 PID 2908 wrote to memory of 2716 2908 3737f5ec040b2beb023256e23f621c30_NeikiAnalytics.exe 28 PID 2716 wrote to memory of 2736 2716 explorer.exe 29 PID 2716 wrote to memory of 2736 2716 explorer.exe 29 PID 2716 wrote to memory of 2736 2716 explorer.exe 29 PID 2716 wrote to memory of 2736 2716 explorer.exe 29 PID 2736 wrote to memory of 2504 2736 spoolsv.exe 30 PID 2736 wrote to memory of 2504 2736 spoolsv.exe 30 PID 2736 wrote to memory of 2504 2736 spoolsv.exe 30 PID 2736 wrote to memory of 2504 2736 spoolsv.exe 30 PID 2504 wrote to memory of 2480 2504 svchost.exe 31 PID 2504 wrote to memory of 2480 2504 svchost.exe 31 PID 2504 wrote to memory of 2480 2504 svchost.exe 31 PID 2504 wrote to memory of 2480 2504 svchost.exe 31 PID 2504 wrote to memory of 2004 2504 svchost.exe 32 PID 2504 wrote to memory of 2004 2504 svchost.exe 32 PID 2504 wrote to memory of 2004 2504 svchost.exe 32 PID 2504 wrote to memory of 2004 2504 svchost.exe 32 PID 2504 wrote to memory of 1280 2504 svchost.exe 36 PID 2504 wrote to memory of 1280 2504 svchost.exe 36 PID 2504 wrote to memory of 1280 2504 svchost.exe 36 PID 2504 wrote to memory of 1280 2504 svchost.exe 36 PID 2504 wrote to memory of 2364 2504 svchost.exe 38 PID 2504 wrote to memory of 2364 2504 svchost.exe 38 PID 2504 wrote to memory of 2364 2504 svchost.exe 38 PID 2504 wrote to memory of 2364 2504 svchost.exe 38
Processes
-
C:\Users\Admin\AppData\Local\Temp\3737f5ec040b2beb023256e23f621c30_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\3737f5ec040b2beb023256e23f621c30_NeikiAnalytics.exe"1⤵
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2908 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe2⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Modifies Installed Components in the registry
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2716 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2736 -
\??\c:\windows\system\svchost.exec:\windows\system\svchost.exe4⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Modifies Installed Components in the registry
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2504 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe PR5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2480
-
-
C:\Windows\SysWOW64\at.exeat 02:32 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe5⤵PID:2004
-
-
C:\Windows\SysWOW64\at.exeat 02:33 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe5⤵PID:1280
-
-
C:\Windows\SysWOW64\at.exeat 02:34 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe5⤵PID:2364
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
66KB
MD5ce101febe6b2d9128be309732fecf22d
SHA1604d24b9b485ab9b9cf944fb61c95601e3c4cb41
SHA256e73fe62908734281b1fce1e8b18e09a17b66a2e565e30286428ad52115caa736
SHA5124258a8de179605d77fd132df21ef681c0f2b1bc9237d2f58061bc2b4e59eb2d26404242d256f2e1d4a21642007623e5628fc85bd9e6877372e70660111b495c3
-
Filesize
66KB
MD5ab5c6ae4885e1d3ad3d912bb9d05d74a
SHA1249caef41f690befa72d8b21146fa8ae701050c6
SHA2562ef77f03004dbc1713b7d0deffad75effef89f75d3809c0b1c24588af6100c9d
SHA512b52acfaee8b4ae539a3eee5501a06a506d1a1a227c51d33d7d786c91460197cbf4c733c490256c94a5eb928c31f73ffb14c0e63a0b1281c40dd0670e9a5909f0
-
Filesize
66KB
MD5eedcf51e104aced305581302a7603ad8
SHA1fe2d373a86be4eb46b3b07a22c43f8fa684e3640
SHA25624ac412f24fa8dd08db65b20dde08b8a4b600f4f18cc4df3e68a5a7ea0f3ea8b
SHA512c5ff1536d9e9a95a8ca756538922d51bf17febd8408ca4703902d3414354f2e86e3808b0ac20badaca3a6035faa1ef12c04760b7e1975775274905cb16426d96
-
Filesize
66KB
MD5ee74de1b23814ddf7be502eb5c407b90
SHA151ddc37cae39cce01db77bb26334e9ba150bda56
SHA2569f79eccc6cdc669378b254c9d3a1081e83abec5e08cd1ffcb3a3646777770907
SHA512ae280cb130230be3f739058e22fb378a0615989b974fa4524f20c69a621fd5cbd84cccc39c016bb31498522ca3fc558dd2ee4f248eb48877eefd13e123e2081b