Analysis
-
max time kernel
126s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
18-06-2024 14:16
Static task
static1
Behavioral task
behavioral1
Sample
4fa5128c463f6062a8e73260808344e0_NeikiAnalytics.exe
Resource
win7-20240419-en
General
-
Target
4fa5128c463f6062a8e73260808344e0_NeikiAnalytics.exe
-
Size
100KB
-
MD5
4fa5128c463f6062a8e73260808344e0
-
SHA1
2bf4a7ddca9e05852307af1c679f0ff7e2aca463
-
SHA256
e726dcb3945fdf2f8b114fcba5e83cf319556c68f79f8fc629a55d6c8df19991
-
SHA512
b67f875092015e563c4c0604cbbab111e2f280d5af77f7b63086557467ea9ca17d1f889c3c73febfd86f0761cdb30dc96fd4fad5d9826b331685728c61f8e937
-
SSDEEP
3072:qXrWehmBMCXdVCrOoQmk8IJYhJjm8n4pH+XqA:cWehmltZKGYhlm+4pm1
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
http://www.klkjwre9fqwieluoi.info/
http://kukutrustnet777888.info/
Signatures
-
Modifies firewall policy service 3 TTPs 3 IoCs
Processes:
4fa5128c463f6062a8e73260808344e0_NeikiAnalytics.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "1" 4fa5128c463f6062a8e73260808344e0_NeikiAnalytics.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" 4fa5128c463f6062a8e73260808344e0_NeikiAnalytics.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" 4fa5128c463f6062a8e73260808344e0_NeikiAnalytics.exe -
Processes:
4fa5128c463f6062a8e73260808344e0_NeikiAnalytics.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 4fa5128c463f6062a8e73260808344e0_NeikiAnalytics.exe -
Processes:
4fa5128c463f6062a8e73260808344e0_NeikiAnalytics.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" 4fa5128c463f6062a8e73260808344e0_NeikiAnalytics.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" 4fa5128c463f6062a8e73260808344e0_NeikiAnalytics.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" 4fa5128c463f6062a8e73260808344e0_NeikiAnalytics.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" 4fa5128c463f6062a8e73260808344e0_NeikiAnalytics.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" 4fa5128c463f6062a8e73260808344e0_NeikiAnalytics.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" 4fa5128c463f6062a8e73260808344e0_NeikiAnalytics.exe -
Processes:
resource yara_rule behavioral1/memory/1752-3-0x0000000001CE0000-0x0000000002D6E000-memory.dmp upx behavioral1/memory/1752-5-0x0000000001CE0000-0x0000000002D6E000-memory.dmp upx behavioral1/memory/1752-9-0x0000000001CE0000-0x0000000002D6E000-memory.dmp upx behavioral1/memory/1752-4-0x0000000001CE0000-0x0000000002D6E000-memory.dmp upx behavioral1/memory/1752-6-0x0000000001CE0000-0x0000000002D6E000-memory.dmp upx behavioral1/memory/1752-7-0x0000000001CE0000-0x0000000002D6E000-memory.dmp upx behavioral1/memory/1752-10-0x0000000001CE0000-0x0000000002D6E000-memory.dmp upx behavioral1/memory/1752-11-0x0000000001CE0000-0x0000000002D6E000-memory.dmp upx behavioral1/memory/1752-8-0x0000000001CE0000-0x0000000002D6E000-memory.dmp upx behavioral1/memory/1752-27-0x0000000001CE0000-0x0000000002D6E000-memory.dmp upx behavioral1/memory/1752-28-0x0000000001CE0000-0x0000000002D6E000-memory.dmp upx behavioral1/memory/1752-29-0x0000000001CE0000-0x0000000002D6E000-memory.dmp upx behavioral1/memory/1752-30-0x0000000001CE0000-0x0000000002D6E000-memory.dmp upx behavioral1/memory/1752-31-0x0000000001CE0000-0x0000000002D6E000-memory.dmp upx behavioral1/memory/1752-33-0x0000000001CE0000-0x0000000002D6E000-memory.dmp upx behavioral1/memory/1752-34-0x0000000001CE0000-0x0000000002D6E000-memory.dmp upx behavioral1/memory/1752-35-0x0000000001CE0000-0x0000000002D6E000-memory.dmp upx behavioral1/memory/1752-37-0x0000000001CE0000-0x0000000002D6E000-memory.dmp upx behavioral1/memory/1752-39-0x0000000001CE0000-0x0000000002D6E000-memory.dmp upx behavioral1/memory/1752-47-0x0000000001CE0000-0x0000000002D6E000-memory.dmp upx behavioral1/memory/1752-49-0x0000000001CE0000-0x0000000002D6E000-memory.dmp upx behavioral1/memory/1752-50-0x0000000001CE0000-0x0000000002D6E000-memory.dmp upx behavioral1/memory/1752-54-0x0000000001CE0000-0x0000000002D6E000-memory.dmp upx behavioral1/memory/1752-55-0x0000000001CE0000-0x0000000002D6E000-memory.dmp upx behavioral1/memory/1752-57-0x0000000001CE0000-0x0000000002D6E000-memory.dmp upx behavioral1/memory/1752-58-0x0000000001CE0000-0x0000000002D6E000-memory.dmp upx behavioral1/memory/1752-61-0x0000000001CE0000-0x0000000002D6E000-memory.dmp upx behavioral1/memory/1752-62-0x0000000001CE0000-0x0000000002D6E000-memory.dmp upx behavioral1/memory/1752-70-0x0000000001CE0000-0x0000000002D6E000-memory.dmp upx behavioral1/memory/1752-71-0x0000000001CE0000-0x0000000002D6E000-memory.dmp upx -
Processes:
4fa5128c463f6062a8e73260808344e0_NeikiAnalytics.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" 4fa5128c463f6062a8e73260808344e0_NeikiAnalytics.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" 4fa5128c463f6062a8e73260808344e0_NeikiAnalytics.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" 4fa5128c463f6062a8e73260808344e0_NeikiAnalytics.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" 4fa5128c463f6062a8e73260808344e0_NeikiAnalytics.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" 4fa5128c463f6062a8e73260808344e0_NeikiAnalytics.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" 4fa5128c463f6062a8e73260808344e0_NeikiAnalytics.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\Svc 4fa5128c463f6062a8e73260808344e0_NeikiAnalytics.exe -
Processes:
4fa5128c463f6062a8e73260808344e0_NeikiAnalytics.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 4fa5128c463f6062a8e73260808344e0_NeikiAnalytics.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
4fa5128c463f6062a8e73260808344e0_NeikiAnalytics.exedescription ioc process File opened (read-only) \??\E: 4fa5128c463f6062a8e73260808344e0_NeikiAnalytics.exe File opened (read-only) \??\I: 4fa5128c463f6062a8e73260808344e0_NeikiAnalytics.exe File opened (read-only) \??\Q: 4fa5128c463f6062a8e73260808344e0_NeikiAnalytics.exe File opened (read-only) \??\U: 4fa5128c463f6062a8e73260808344e0_NeikiAnalytics.exe File opened (read-only) \??\W: 4fa5128c463f6062a8e73260808344e0_NeikiAnalytics.exe File opened (read-only) \??\M: 4fa5128c463f6062a8e73260808344e0_NeikiAnalytics.exe File opened (read-only) \??\N: 4fa5128c463f6062a8e73260808344e0_NeikiAnalytics.exe File opened (read-only) \??\P: 4fa5128c463f6062a8e73260808344e0_NeikiAnalytics.exe File opened (read-only) \??\R: 4fa5128c463f6062a8e73260808344e0_NeikiAnalytics.exe File opened (read-only) \??\V: 4fa5128c463f6062a8e73260808344e0_NeikiAnalytics.exe File opened (read-only) \??\G: 4fa5128c463f6062a8e73260808344e0_NeikiAnalytics.exe File opened (read-only) \??\J: 4fa5128c463f6062a8e73260808344e0_NeikiAnalytics.exe File opened (read-only) \??\K: 4fa5128c463f6062a8e73260808344e0_NeikiAnalytics.exe File opened (read-only) \??\T: 4fa5128c463f6062a8e73260808344e0_NeikiAnalytics.exe File opened (read-only) \??\X: 4fa5128c463f6062a8e73260808344e0_NeikiAnalytics.exe File opened (read-only) \??\H: 4fa5128c463f6062a8e73260808344e0_NeikiAnalytics.exe File opened (read-only) \??\L: 4fa5128c463f6062a8e73260808344e0_NeikiAnalytics.exe File opened (read-only) \??\O: 4fa5128c463f6062a8e73260808344e0_NeikiAnalytics.exe File opened (read-only) \??\S: 4fa5128c463f6062a8e73260808344e0_NeikiAnalytics.exe File opened (read-only) \??\Y: 4fa5128c463f6062a8e73260808344e0_NeikiAnalytics.exe File opened (read-only) \??\Z: 4fa5128c463f6062a8e73260808344e0_NeikiAnalytics.exe -
Drops autorun.inf file 1 TTPs 2 IoCs
Malware can abuse Windows Autorun to spread further via attached volumes.
Processes:
4fa5128c463f6062a8e73260808344e0_NeikiAnalytics.exedescription ioc process File opened for modification C:\autorun.inf 4fa5128c463f6062a8e73260808344e0_NeikiAnalytics.exe File opened for modification F:\autorun.inf 4fa5128c463f6062a8e73260808344e0_NeikiAnalytics.exe -
Drops file in Program Files directory 5 IoCs
Processes:
4fa5128c463f6062a8e73260808344e0_NeikiAnalytics.exedescription ioc process File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\BCSSync.exe 4fa5128c463f6062a8e73260808344e0_NeikiAnalytics.exe File opened for modification C:\PROGRAM FILES\7-ZIP\7z.exe 4fa5128c463f6062a8e73260808344e0_NeikiAnalytics.exe File opened for modification C:\PROGRAM FILES\7-ZIP\7zFM.exe 4fa5128c463f6062a8e73260808344e0_NeikiAnalytics.exe File opened for modification C:\PROGRAM FILES\7-ZIP\7zG.exe 4fa5128c463f6062a8e73260808344e0_NeikiAnalytics.exe File opened for modification C:\PROGRAM FILES\7-ZIP\Uninstall.exe 4fa5128c463f6062a8e73260808344e0_NeikiAnalytics.exe -
Drops file in Windows directory 1 IoCs
Processes:
4fa5128c463f6062a8e73260808344e0_NeikiAnalytics.exedescription ioc process File opened for modification C:\Windows\SYSTEM.INI 4fa5128c463f6062a8e73260808344e0_NeikiAnalytics.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 13 IoCs
Processes:
4fa5128c463f6062a8e73260808344e0_NeikiAnalytics.exepid process 1752 4fa5128c463f6062a8e73260808344e0_NeikiAnalytics.exe 1752 4fa5128c463f6062a8e73260808344e0_NeikiAnalytics.exe 1752 4fa5128c463f6062a8e73260808344e0_NeikiAnalytics.exe 1752 4fa5128c463f6062a8e73260808344e0_NeikiAnalytics.exe 1752 4fa5128c463f6062a8e73260808344e0_NeikiAnalytics.exe 1752 4fa5128c463f6062a8e73260808344e0_NeikiAnalytics.exe 1752 4fa5128c463f6062a8e73260808344e0_NeikiAnalytics.exe 1752 4fa5128c463f6062a8e73260808344e0_NeikiAnalytics.exe 1752 4fa5128c463f6062a8e73260808344e0_NeikiAnalytics.exe 1752 4fa5128c463f6062a8e73260808344e0_NeikiAnalytics.exe 1752 4fa5128c463f6062a8e73260808344e0_NeikiAnalytics.exe 1752 4fa5128c463f6062a8e73260808344e0_NeikiAnalytics.exe 1752 4fa5128c463f6062a8e73260808344e0_NeikiAnalytics.exe -
Suspicious use of AdjustPrivilegeToken 33 IoCs
Processes:
4fa5128c463f6062a8e73260808344e0_NeikiAnalytics.exedescription pid process Token: SeDebugPrivilege 1752 4fa5128c463f6062a8e73260808344e0_NeikiAnalytics.exe Token: SeDebugPrivilege 1752 4fa5128c463f6062a8e73260808344e0_NeikiAnalytics.exe Token: SeDebugPrivilege 1752 4fa5128c463f6062a8e73260808344e0_NeikiAnalytics.exe Token: SeDebugPrivilege 1752 4fa5128c463f6062a8e73260808344e0_NeikiAnalytics.exe Token: SeDebugPrivilege 1752 4fa5128c463f6062a8e73260808344e0_NeikiAnalytics.exe Token: SeDebugPrivilege 1752 4fa5128c463f6062a8e73260808344e0_NeikiAnalytics.exe Token: SeDebugPrivilege 1752 4fa5128c463f6062a8e73260808344e0_NeikiAnalytics.exe Token: SeDebugPrivilege 1752 4fa5128c463f6062a8e73260808344e0_NeikiAnalytics.exe Token: SeDebugPrivilege 1752 4fa5128c463f6062a8e73260808344e0_NeikiAnalytics.exe Token: SeDebugPrivilege 1752 4fa5128c463f6062a8e73260808344e0_NeikiAnalytics.exe Token: SeDebugPrivilege 1752 4fa5128c463f6062a8e73260808344e0_NeikiAnalytics.exe Token: SeDebugPrivilege 1752 4fa5128c463f6062a8e73260808344e0_NeikiAnalytics.exe Token: SeDebugPrivilege 1752 4fa5128c463f6062a8e73260808344e0_NeikiAnalytics.exe Token: SeDebugPrivilege 1752 4fa5128c463f6062a8e73260808344e0_NeikiAnalytics.exe Token: SeDebugPrivilege 1752 4fa5128c463f6062a8e73260808344e0_NeikiAnalytics.exe Token: SeDebugPrivilege 1752 4fa5128c463f6062a8e73260808344e0_NeikiAnalytics.exe Token: SeDebugPrivilege 1752 4fa5128c463f6062a8e73260808344e0_NeikiAnalytics.exe Token: SeDebugPrivilege 1752 4fa5128c463f6062a8e73260808344e0_NeikiAnalytics.exe Token: SeDebugPrivilege 1752 4fa5128c463f6062a8e73260808344e0_NeikiAnalytics.exe Token: SeDebugPrivilege 1752 4fa5128c463f6062a8e73260808344e0_NeikiAnalytics.exe Token: SeDebugPrivilege 1752 4fa5128c463f6062a8e73260808344e0_NeikiAnalytics.exe Token: SeDebugPrivilege 1752 4fa5128c463f6062a8e73260808344e0_NeikiAnalytics.exe Token: SeDebugPrivilege 1752 4fa5128c463f6062a8e73260808344e0_NeikiAnalytics.exe Token: SeDebugPrivilege 1752 4fa5128c463f6062a8e73260808344e0_NeikiAnalytics.exe Token: SeDebugPrivilege 1752 4fa5128c463f6062a8e73260808344e0_NeikiAnalytics.exe Token: SeDebugPrivilege 1752 4fa5128c463f6062a8e73260808344e0_NeikiAnalytics.exe Token: SeDebugPrivilege 1752 4fa5128c463f6062a8e73260808344e0_NeikiAnalytics.exe Token: SeDebugPrivilege 1752 4fa5128c463f6062a8e73260808344e0_NeikiAnalytics.exe Token: SeDebugPrivilege 1752 4fa5128c463f6062a8e73260808344e0_NeikiAnalytics.exe Token: SeDebugPrivilege 1752 4fa5128c463f6062a8e73260808344e0_NeikiAnalytics.exe Token: SeDebugPrivilege 1752 4fa5128c463f6062a8e73260808344e0_NeikiAnalytics.exe Token: SeDebugPrivilege 1752 4fa5128c463f6062a8e73260808344e0_NeikiAnalytics.exe Token: SeDebugPrivilege 1752 4fa5128c463f6062a8e73260808344e0_NeikiAnalytics.exe -
Suspicious use of WriteProcessMemory 40 IoCs
Processes:
4fa5128c463f6062a8e73260808344e0_NeikiAnalytics.exedescription pid process target process PID 1752 wrote to memory of 1112 1752 4fa5128c463f6062a8e73260808344e0_NeikiAnalytics.exe taskhost.exe PID 1752 wrote to memory of 1172 1752 4fa5128c463f6062a8e73260808344e0_NeikiAnalytics.exe Dwm.exe PID 1752 wrote to memory of 1212 1752 4fa5128c463f6062a8e73260808344e0_NeikiAnalytics.exe Explorer.EXE PID 1752 wrote to memory of 1760 1752 4fa5128c463f6062a8e73260808344e0_NeikiAnalytics.exe DllHost.exe PID 1752 wrote to memory of 1112 1752 4fa5128c463f6062a8e73260808344e0_NeikiAnalytics.exe taskhost.exe PID 1752 wrote to memory of 1172 1752 4fa5128c463f6062a8e73260808344e0_NeikiAnalytics.exe Dwm.exe PID 1752 wrote to memory of 1212 1752 4fa5128c463f6062a8e73260808344e0_NeikiAnalytics.exe Explorer.EXE PID 1752 wrote to memory of 1112 1752 4fa5128c463f6062a8e73260808344e0_NeikiAnalytics.exe taskhost.exe PID 1752 wrote to memory of 1172 1752 4fa5128c463f6062a8e73260808344e0_NeikiAnalytics.exe Dwm.exe PID 1752 wrote to memory of 1212 1752 4fa5128c463f6062a8e73260808344e0_NeikiAnalytics.exe Explorer.EXE PID 1752 wrote to memory of 1112 1752 4fa5128c463f6062a8e73260808344e0_NeikiAnalytics.exe taskhost.exe PID 1752 wrote to memory of 1172 1752 4fa5128c463f6062a8e73260808344e0_NeikiAnalytics.exe Dwm.exe PID 1752 wrote to memory of 1212 1752 4fa5128c463f6062a8e73260808344e0_NeikiAnalytics.exe Explorer.EXE PID 1752 wrote to memory of 1112 1752 4fa5128c463f6062a8e73260808344e0_NeikiAnalytics.exe taskhost.exe PID 1752 wrote to memory of 1172 1752 4fa5128c463f6062a8e73260808344e0_NeikiAnalytics.exe Dwm.exe PID 1752 wrote to memory of 1212 1752 4fa5128c463f6062a8e73260808344e0_NeikiAnalytics.exe Explorer.EXE PID 1752 wrote to memory of 1112 1752 4fa5128c463f6062a8e73260808344e0_NeikiAnalytics.exe taskhost.exe PID 1752 wrote to memory of 1172 1752 4fa5128c463f6062a8e73260808344e0_NeikiAnalytics.exe Dwm.exe PID 1752 wrote to memory of 1212 1752 4fa5128c463f6062a8e73260808344e0_NeikiAnalytics.exe Explorer.EXE PID 1752 wrote to memory of 1112 1752 4fa5128c463f6062a8e73260808344e0_NeikiAnalytics.exe taskhost.exe PID 1752 wrote to memory of 1172 1752 4fa5128c463f6062a8e73260808344e0_NeikiAnalytics.exe Dwm.exe PID 1752 wrote to memory of 1212 1752 4fa5128c463f6062a8e73260808344e0_NeikiAnalytics.exe Explorer.EXE PID 1752 wrote to memory of 1112 1752 4fa5128c463f6062a8e73260808344e0_NeikiAnalytics.exe taskhost.exe PID 1752 wrote to memory of 1172 1752 4fa5128c463f6062a8e73260808344e0_NeikiAnalytics.exe Dwm.exe PID 1752 wrote to memory of 1212 1752 4fa5128c463f6062a8e73260808344e0_NeikiAnalytics.exe Explorer.EXE PID 1752 wrote to memory of 1112 1752 4fa5128c463f6062a8e73260808344e0_NeikiAnalytics.exe taskhost.exe PID 1752 wrote to memory of 1172 1752 4fa5128c463f6062a8e73260808344e0_NeikiAnalytics.exe Dwm.exe PID 1752 wrote to memory of 1212 1752 4fa5128c463f6062a8e73260808344e0_NeikiAnalytics.exe Explorer.EXE PID 1752 wrote to memory of 1112 1752 4fa5128c463f6062a8e73260808344e0_NeikiAnalytics.exe taskhost.exe PID 1752 wrote to memory of 1172 1752 4fa5128c463f6062a8e73260808344e0_NeikiAnalytics.exe Dwm.exe PID 1752 wrote to memory of 1212 1752 4fa5128c463f6062a8e73260808344e0_NeikiAnalytics.exe Explorer.EXE PID 1752 wrote to memory of 1112 1752 4fa5128c463f6062a8e73260808344e0_NeikiAnalytics.exe taskhost.exe PID 1752 wrote to memory of 1172 1752 4fa5128c463f6062a8e73260808344e0_NeikiAnalytics.exe Dwm.exe PID 1752 wrote to memory of 1212 1752 4fa5128c463f6062a8e73260808344e0_NeikiAnalytics.exe Explorer.EXE PID 1752 wrote to memory of 1112 1752 4fa5128c463f6062a8e73260808344e0_NeikiAnalytics.exe taskhost.exe PID 1752 wrote to memory of 1172 1752 4fa5128c463f6062a8e73260808344e0_NeikiAnalytics.exe Dwm.exe PID 1752 wrote to memory of 1212 1752 4fa5128c463f6062a8e73260808344e0_NeikiAnalytics.exe Explorer.EXE PID 1752 wrote to memory of 1112 1752 4fa5128c463f6062a8e73260808344e0_NeikiAnalytics.exe taskhost.exe PID 1752 wrote to memory of 1172 1752 4fa5128c463f6062a8e73260808344e0_NeikiAnalytics.exe Dwm.exe PID 1752 wrote to memory of 1212 1752 4fa5128c463f6062a8e73260808344e0_NeikiAnalytics.exe Explorer.EXE -
System policy modification 1 TTPs 1 IoCs
Processes:
4fa5128c463f6062a8e73260808344e0_NeikiAnalytics.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 4fa5128c463f6062a8e73260808344e0_NeikiAnalytics.exe
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
-
C:\Users\Admin\AppData\Local\Temp\4fa5128c463f6062a8e73260808344e0_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\4fa5128c463f6062a8e73260808344e0_NeikiAnalytics.exe"2⤵
- Modifies firewall policy service
- UAC bypass
- Windows security bypass
- Windows security modification
- Checks whether UAC is enabled
- Enumerates connected drives
- Drops autorun.inf file
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Privilege Escalation
Create or Modify System Process
1Windows Service
1Abuse Elevation Control Mechanism
1Bypass User Account Control
1Defense Evasion
Modify Registry
5Impair Defenses
4Disable or Modify Tools
3Disable or Modify System Firewall
1Abuse Elevation Control Mechanism
1Bypass User Account Control
1Replay Monitor
Loading Replay Monitor...
Downloads
-
F:\sidvs.pifFilesize
100KB
MD565511925e64c8ed51fcc7c3d069b6950
SHA1c7c6e157d795ac736796299aa318ab6691fcbbd0
SHA256a5c4bfc44fbd1a262ffe71d50338665f8300707b930ba7749946bfef3a42a653
SHA512f7f168183af5f5659e86f34bc3c383f0e6594aa143ed420ea77cb30cc7640c7c29fddb65c92af43231b33c823c9db8ac71eaa309d76e6fc1577aa57adac31ac8
-
memory/1112-12-0x00000000001A0000-0x00000000001A2000-memory.dmpFilesize
8KB
-
memory/1752-29-0x0000000001CE0000-0x0000000002D6E000-memory.dmpFilesize
16.6MB
-
memory/1752-81-0x0000000002E40000-0x0000000002E42000-memory.dmpFilesize
8KB
-
memory/1752-4-0x0000000001CE0000-0x0000000002D6E000-memory.dmpFilesize
16.6MB
-
memory/1752-31-0x0000000001CE0000-0x0000000002D6E000-memory.dmpFilesize
16.6MB
-
memory/1752-26-0x0000000002E40000-0x0000000002E42000-memory.dmpFilesize
8KB
-
memory/1752-7-0x0000000001CE0000-0x0000000002D6E000-memory.dmpFilesize
16.6MB
-
memory/1752-10-0x0000000001CE0000-0x0000000002D6E000-memory.dmpFilesize
16.6MB
-
memory/1752-11-0x0000000001CE0000-0x0000000002D6E000-memory.dmpFilesize
16.6MB
-
memory/1752-8-0x0000000001CE0000-0x0000000002D6E000-memory.dmpFilesize
16.6MB
-
memory/1752-25-0x0000000002E40000-0x0000000002E42000-memory.dmpFilesize
8KB
-
memory/1752-24-0x0000000004C00000-0x0000000004C01000-memory.dmpFilesize
4KB
-
memory/1752-22-0x0000000004C00000-0x0000000004C01000-memory.dmpFilesize
4KB
-
memory/1752-21-0x0000000002E40000-0x0000000002E42000-memory.dmpFilesize
8KB
-
memory/1752-5-0x0000000001CE0000-0x0000000002D6E000-memory.dmpFilesize
16.6MB
-
memory/1752-27-0x0000000001CE0000-0x0000000002D6E000-memory.dmpFilesize
16.6MB
-
memory/1752-28-0x0000000001CE0000-0x0000000002D6E000-memory.dmpFilesize
16.6MB
-
memory/1752-0-0x0000000000400000-0x0000000000414000-memory.dmpFilesize
80KB
-
memory/1752-30-0x0000000001CE0000-0x0000000002D6E000-memory.dmpFilesize
16.6MB
-
memory/1752-6-0x0000000001CE0000-0x0000000002D6E000-memory.dmpFilesize
16.6MB
-
memory/1752-9-0x0000000001CE0000-0x0000000002D6E000-memory.dmpFilesize
16.6MB
-
memory/1752-35-0x0000000001CE0000-0x0000000002D6E000-memory.dmpFilesize
16.6MB
-
memory/1752-34-0x0000000001CE0000-0x0000000002D6E000-memory.dmpFilesize
16.6MB
-
memory/1752-37-0x0000000001CE0000-0x0000000002D6E000-memory.dmpFilesize
16.6MB
-
memory/1752-39-0x0000000001CE0000-0x0000000002D6E000-memory.dmpFilesize
16.6MB
-
memory/1752-47-0x0000000001CE0000-0x0000000002D6E000-memory.dmpFilesize
16.6MB
-
memory/1752-49-0x0000000001CE0000-0x0000000002D6E000-memory.dmpFilesize
16.6MB
-
memory/1752-50-0x0000000001CE0000-0x0000000002D6E000-memory.dmpFilesize
16.6MB
-
memory/1752-54-0x0000000001CE0000-0x0000000002D6E000-memory.dmpFilesize
16.6MB
-
memory/1752-55-0x0000000001CE0000-0x0000000002D6E000-memory.dmpFilesize
16.6MB
-
memory/1752-57-0x0000000001CE0000-0x0000000002D6E000-memory.dmpFilesize
16.6MB
-
memory/1752-58-0x0000000001CE0000-0x0000000002D6E000-memory.dmpFilesize
16.6MB
-
memory/1752-61-0x0000000001CE0000-0x0000000002D6E000-memory.dmpFilesize
16.6MB
-
memory/1752-62-0x0000000001CE0000-0x0000000002D6E000-memory.dmpFilesize
16.6MB
-
memory/1752-70-0x0000000001CE0000-0x0000000002D6E000-memory.dmpFilesize
16.6MB
-
memory/1752-71-0x0000000001CE0000-0x0000000002D6E000-memory.dmpFilesize
16.6MB
-
memory/1752-33-0x0000000001CE0000-0x0000000002D6E000-memory.dmpFilesize
16.6MB
-
memory/1752-3-0x0000000001CE0000-0x0000000002D6E000-memory.dmpFilesize
16.6MB