Analysis
-
max time kernel
150s -
max time network
51s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
17-06-2024 02:29
Static task
static1
Behavioral task
behavioral1
Sample
3737f5ec040b2beb023256e23f621c30_NeikiAnalytics.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
3737f5ec040b2beb023256e23f621c30_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
3737f5ec040b2beb023256e23f621c30_NeikiAnalytics.exe
-
Size
66KB
-
MD5
3737f5ec040b2beb023256e23f621c30
-
SHA1
3a2dcc1f0755172f916e4f97e2bd83a26de81df7
-
SHA256
25c4ef606891510b36fe99d74aa56033bdcff40a9316d4f02b518bdeb7a03d16
-
SHA512
6977bb44b370829d4dd873df18451bcb28214f0a48297ec41159be6ecbd505156e2999c6e4e7e4f16e332efbb778d49040663c1b7a19957709257890b3668e87
-
SSDEEP
1536:EHfetdklPp+07gDSrB8Xru2zGeJxgawTzpXzrDJrXif:IeklMMYJhqezw/pXzH9if
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" svchost.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" svchost.exe -
Modifies Installed Components in the registry 2 TTPs 8 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" svchost.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999} svchost.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" explorer.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999} svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" svchost.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} svchost.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} svchost.exe -
Executes dropped EXE 4 IoCs
pid Process 1120 explorer.exe 1556 spoolsv.exe 2004 svchost.exe 1816 spoolsv.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" svchost.exe -
Drops file in Windows directory 6 IoCs
description ioc Process File opened for modification \??\c:\windows\system\explorer.exe 3737f5ec040b2beb023256e23f621c30_NeikiAnalytics.exe File opened for modification \??\c:\windows\system\spoolsv.exe explorer.exe File opened for modification \??\c:\windows\system\svchost.exe spoolsv.exe File opened for modification \??\c:\windows\system\explorer.exe explorer.exe File opened for modification \??\c:\windows\system\svchost.exe svchost.exe File opened for modification C:\Windows\system\udsys.exe explorer.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3052 3737f5ec040b2beb023256e23f621c30_NeikiAnalytics.exe 3052 3737f5ec040b2beb023256e23f621c30_NeikiAnalytics.exe 1120 explorer.exe 1120 explorer.exe 1120 explorer.exe 1120 explorer.exe 1120 explorer.exe 1120 explorer.exe 1120 explorer.exe 2004 svchost.exe 1120 explorer.exe 2004 svchost.exe 2004 svchost.exe 2004 svchost.exe 1120 explorer.exe 2004 svchost.exe 1120 explorer.exe 2004 svchost.exe 2004 svchost.exe 1120 explorer.exe 1120 explorer.exe 2004 svchost.exe 1120 explorer.exe 1120 explorer.exe 2004 svchost.exe 2004 svchost.exe 1120 explorer.exe 2004 svchost.exe 1120 explorer.exe 2004 svchost.exe 2004 svchost.exe 1120 explorer.exe 1120 explorer.exe 2004 svchost.exe 2004 svchost.exe 1120 explorer.exe 1120 explorer.exe 2004 svchost.exe 2004 svchost.exe 2004 svchost.exe 1120 explorer.exe 1120 explorer.exe 1120 explorer.exe 2004 svchost.exe 1120 explorer.exe 2004 svchost.exe 2004 svchost.exe 1120 explorer.exe 1120 explorer.exe 2004 svchost.exe 1120 explorer.exe 2004 svchost.exe 1120 explorer.exe 2004 svchost.exe 2004 svchost.exe 2004 svchost.exe 1120 explorer.exe 1120 explorer.exe 2004 svchost.exe 1120 explorer.exe 1120 explorer.exe 2004 svchost.exe 1120 explorer.exe 2004 svchost.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 1120 explorer.exe 2004 svchost.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 3052 3737f5ec040b2beb023256e23f621c30_NeikiAnalytics.exe 3052 3737f5ec040b2beb023256e23f621c30_NeikiAnalytics.exe 1120 explorer.exe 1120 explorer.exe 1556 spoolsv.exe 1556 spoolsv.exe 2004 svchost.exe 2004 svchost.exe 1816 spoolsv.exe 1816 spoolsv.exe 1120 explorer.exe 1120 explorer.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 3052 wrote to memory of 1120 3052 3737f5ec040b2beb023256e23f621c30_NeikiAnalytics.exe 81 PID 3052 wrote to memory of 1120 3052 3737f5ec040b2beb023256e23f621c30_NeikiAnalytics.exe 81 PID 3052 wrote to memory of 1120 3052 3737f5ec040b2beb023256e23f621c30_NeikiAnalytics.exe 81 PID 1120 wrote to memory of 1556 1120 explorer.exe 84 PID 1120 wrote to memory of 1556 1120 explorer.exe 84 PID 1120 wrote to memory of 1556 1120 explorer.exe 84 PID 1556 wrote to memory of 2004 1556 spoolsv.exe 85 PID 1556 wrote to memory of 2004 1556 spoolsv.exe 85 PID 1556 wrote to memory of 2004 1556 spoolsv.exe 85 PID 2004 wrote to memory of 1816 2004 svchost.exe 86 PID 2004 wrote to memory of 1816 2004 svchost.exe 86 PID 2004 wrote to memory of 1816 2004 svchost.exe 86 PID 2004 wrote to memory of 4580 2004 svchost.exe 88 PID 2004 wrote to memory of 4580 2004 svchost.exe 88 PID 2004 wrote to memory of 4580 2004 svchost.exe 88 PID 2004 wrote to memory of 4332 2004 svchost.exe 98 PID 2004 wrote to memory of 4332 2004 svchost.exe 98 PID 2004 wrote to memory of 4332 2004 svchost.exe 98 PID 2004 wrote to memory of 4772 2004 svchost.exe 100 PID 2004 wrote to memory of 4772 2004 svchost.exe 100 PID 2004 wrote to memory of 4772 2004 svchost.exe 100
Processes
-
C:\Users\Admin\AppData\Local\Temp\3737f5ec040b2beb023256e23f621c30_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\3737f5ec040b2beb023256e23f621c30_NeikiAnalytics.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3052 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe2⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Modifies Installed Components in the registry
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1120 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE3⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1556 -
\??\c:\windows\system\svchost.exec:\windows\system\svchost.exe4⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Modifies Installed Components in the registry
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2004 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe PR5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1816
-
-
C:\Windows\SysWOW64\at.exeat 02:31 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe5⤵PID:4580
-
-
C:\Windows\SysWOW64\at.exeat 02:32 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe5⤵PID:4332
-
-
C:\Windows\SysWOW64\at.exeat 02:33 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe5⤵PID:4772
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
66KB
MD5d7dda78f58ca67314a27ccd0120c58aa
SHA1e2320b937614a74a237649df9c1c5d9475f428f9
SHA256ca8e04bd39e92e439f8e27e82e395ef9e5d7af5147bd58e5798ef3c59dd65b56
SHA512261339c1322d59d947c48ea0bd5764b8721c0a267744d46bee3ae8ce22b8a293000c41ab53dcd4d2e8a536cc4ad06cbb9d919f2df60e617d63f216eda994f4b8
-
Filesize
66KB
MD53a1f08295e7f16ce2893143ce380dd37
SHA14fa023b8c165224e4bdceca76fccb62e36bac834
SHA25694612e38625f4a5522ef3fe32c78f3592c8489549ac0142003e00cfcc588b0a2
SHA5124a760997364c2276ad04c20d7d54d1dc2ae226802185e8a19fd66d8efe22ed1d99a847dcbae7bf943d8c263f9d78c1e61b0ef8acec5416c35665b8ef1283587b
-
Filesize
66KB
MD5072e772fa9f311028b97624e9e5e05bf
SHA1ca478f07d82f9d45f3d7dccfc6c9d1e3bbf6e880
SHA25642d3afd2389d0f9c9b07c11d7bcd6d4f43b0ce09e1227cb782a5329b79c13fe8
SHA5128e938d93d265cd1ee5c035b3801d83e6bca7864c0b20066c0a292b2bea8fe7071573c8ce9ebbb50921f18f0580a7bdfb01f512b73f1a260fe02498acd01c9b1e
-
Filesize
66KB
MD53cdc34ee2b2c1217902c030d810a1778
SHA1e64bc044c2797240555ffb1073094eae97f76c8a
SHA256a95b2bae560b57cb006add79111e9f2aaa5e1aace2f30b9f39602b6f6b181c4a
SHA512e69f548c5153d130f1b6bafab230b2d3c03a0a4adaf0f0aa0baf9c6fa3d3a533767ee01f01daae57f69222d019caabf60f57efe3457942b5dbc5c9e208e4c695