Analysis
-
max time kernel
126s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
19-06-2024 01:59
Static task
static1
Behavioral task
behavioral1
Sample
77da93699a35376456421b2ed5e6ce90_NeikiAnalytics.exe
Resource
win7-20240611-en
General
-
Target
77da93699a35376456421b2ed5e6ce90_NeikiAnalytics.exe
-
Size
999KB
-
MD5
77da93699a35376456421b2ed5e6ce90
-
SHA1
7100f453d4c6e82cf714e9f131074135aa80df6e
-
SHA256
63aabe74b886ff7819f632fe8e901f54635925210d5cb097fed975d61eccef12
-
SHA512
8957ca1400bba55df453996ea995ead32ae768112a8e62503b3209cc982f230cb1965e819df48bc7bfcfe7305fd3c8c27facb4f06d9121c418e952a143d29ed9
-
SSDEEP
24576:S1chJKBPsXhk1Ve18QW5J3i+Z18i/SC/tROyfo/yA5ZSHwKziWijIVj:Phk1Ve18QWJ3i+fB6C/bOD6AeHhiW0Oj
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
http://www.klkjwre9fqwieluoi.info/
http://kukutrustnet777888.info/
Signatures
-
Modifies firewall policy service 3 TTPs 3 IoCs
Processes:
77da93699a35376456421b2ed5e6ce90_NeikiAnalytics.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" 77da93699a35376456421b2ed5e6ce90_NeikiAnalytics.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" 77da93699a35376456421b2ed5e6ce90_NeikiAnalytics.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "1" 77da93699a35376456421b2ed5e6ce90_NeikiAnalytics.exe -
Processes:
77da93699a35376456421b2ed5e6ce90_NeikiAnalytics.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 77da93699a35376456421b2ed5e6ce90_NeikiAnalytics.exe -
Processes:
77da93699a35376456421b2ed5e6ce90_NeikiAnalytics.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" 77da93699a35376456421b2ed5e6ce90_NeikiAnalytics.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" 77da93699a35376456421b2ed5e6ce90_NeikiAnalytics.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" 77da93699a35376456421b2ed5e6ce90_NeikiAnalytics.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" 77da93699a35376456421b2ed5e6ce90_NeikiAnalytics.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" 77da93699a35376456421b2ed5e6ce90_NeikiAnalytics.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" 77da93699a35376456421b2ed5e6ce90_NeikiAnalytics.exe -
Processes:
resource yara_rule behavioral1/memory/1916-5-0x0000000002140000-0x00000000031CE000-memory.dmp upx behavioral1/memory/1916-3-0x0000000002140000-0x00000000031CE000-memory.dmp upx behavioral1/memory/1916-6-0x0000000002140000-0x00000000031CE000-memory.dmp upx behavioral1/memory/1916-7-0x0000000002140000-0x00000000031CE000-memory.dmp upx behavioral1/memory/1916-10-0x0000000002140000-0x00000000031CE000-memory.dmp upx behavioral1/memory/1916-11-0x0000000002140000-0x00000000031CE000-memory.dmp upx behavioral1/memory/1916-4-0x0000000002140000-0x00000000031CE000-memory.dmp upx behavioral1/memory/1916-12-0x0000000002140000-0x00000000031CE000-memory.dmp upx behavioral1/memory/1916-9-0x0000000002140000-0x00000000031CE000-memory.dmp upx behavioral1/memory/1916-13-0x0000000002140000-0x00000000031CE000-memory.dmp upx behavioral1/memory/1916-8-0x0000000002140000-0x00000000031CE000-memory.dmp upx behavioral1/memory/1916-27-0x0000000002140000-0x00000000031CE000-memory.dmp upx behavioral1/memory/1916-28-0x0000000002140000-0x00000000031CE000-memory.dmp upx behavioral1/memory/1916-29-0x0000000002140000-0x00000000031CE000-memory.dmp upx behavioral1/memory/1916-31-0x0000000002140000-0x00000000031CE000-memory.dmp upx behavioral1/memory/1916-32-0x0000000002140000-0x00000000031CE000-memory.dmp upx behavioral1/memory/1916-33-0x0000000002140000-0x00000000031CE000-memory.dmp upx behavioral1/memory/1916-35-0x0000000002140000-0x00000000031CE000-memory.dmp upx behavioral1/memory/1916-42-0x0000000002140000-0x00000000031CE000-memory.dmp upx behavioral1/memory/1916-43-0x0000000002140000-0x00000000031CE000-memory.dmp upx behavioral1/memory/1916-46-0x0000000002140000-0x00000000031CE000-memory.dmp upx behavioral1/memory/1916-47-0x0000000002140000-0x00000000031CE000-memory.dmp upx behavioral1/memory/1916-50-0x0000000002140000-0x00000000031CE000-memory.dmp upx behavioral1/memory/1916-51-0x0000000002140000-0x00000000031CE000-memory.dmp upx behavioral1/memory/1916-54-0x0000000002140000-0x00000000031CE000-memory.dmp upx behavioral1/memory/1916-55-0x0000000002140000-0x00000000031CE000-memory.dmp upx behavioral1/memory/1916-58-0x0000000002140000-0x00000000031CE000-memory.dmp upx behavioral1/memory/1916-59-0x0000000002140000-0x00000000031CE000-memory.dmp upx behavioral1/memory/1916-66-0x0000000002140000-0x00000000031CE000-memory.dmp upx behavioral1/memory/1916-67-0x0000000002140000-0x00000000031CE000-memory.dmp upx -
Processes:
77da93699a35376456421b2ed5e6ce90_NeikiAnalytics.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" 77da93699a35376456421b2ed5e6ce90_NeikiAnalytics.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" 77da93699a35376456421b2ed5e6ce90_NeikiAnalytics.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" 77da93699a35376456421b2ed5e6ce90_NeikiAnalytics.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\Svc 77da93699a35376456421b2ed5e6ce90_NeikiAnalytics.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" 77da93699a35376456421b2ed5e6ce90_NeikiAnalytics.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" 77da93699a35376456421b2ed5e6ce90_NeikiAnalytics.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" 77da93699a35376456421b2ed5e6ce90_NeikiAnalytics.exe -
Processes:
77da93699a35376456421b2ed5e6ce90_NeikiAnalytics.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 77da93699a35376456421b2ed5e6ce90_NeikiAnalytics.exe -
Enumerates connected drives 3 TTPs 20 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
77da93699a35376456421b2ed5e6ce90_NeikiAnalytics.exedescription ioc process File opened (read-only) \??\E: 77da93699a35376456421b2ed5e6ce90_NeikiAnalytics.exe File opened (read-only) \??\Q: 77da93699a35376456421b2ed5e6ce90_NeikiAnalytics.exe File opened (read-only) \??\U: 77da93699a35376456421b2ed5e6ce90_NeikiAnalytics.exe File opened (read-only) \??\Z: 77da93699a35376456421b2ed5e6ce90_NeikiAnalytics.exe File opened (read-only) \??\M: 77da93699a35376456421b2ed5e6ce90_NeikiAnalytics.exe File opened (read-only) \??\O: 77da93699a35376456421b2ed5e6ce90_NeikiAnalytics.exe File opened (read-only) \??\R: 77da93699a35376456421b2ed5e6ce90_NeikiAnalytics.exe File opened (read-only) \??\W: 77da93699a35376456421b2ed5e6ce90_NeikiAnalytics.exe File opened (read-only) \??\H: 77da93699a35376456421b2ed5e6ce90_NeikiAnalytics.exe File opened (read-only) \??\I: 77da93699a35376456421b2ed5e6ce90_NeikiAnalytics.exe File opened (read-only) \??\K: 77da93699a35376456421b2ed5e6ce90_NeikiAnalytics.exe File opened (read-only) \??\L: 77da93699a35376456421b2ed5e6ce90_NeikiAnalytics.exe File opened (read-only) \??\X: 77da93699a35376456421b2ed5e6ce90_NeikiAnalytics.exe File opened (read-only) \??\J: 77da93699a35376456421b2ed5e6ce90_NeikiAnalytics.exe File opened (read-only) \??\P: 77da93699a35376456421b2ed5e6ce90_NeikiAnalytics.exe File opened (read-only) \??\V: 77da93699a35376456421b2ed5e6ce90_NeikiAnalytics.exe File opened (read-only) \??\G: 77da93699a35376456421b2ed5e6ce90_NeikiAnalytics.exe File opened (read-only) \??\N: 77da93699a35376456421b2ed5e6ce90_NeikiAnalytics.exe File opened (read-only) \??\S: 77da93699a35376456421b2ed5e6ce90_NeikiAnalytics.exe File opened (read-only) \??\T: 77da93699a35376456421b2ed5e6ce90_NeikiAnalytics.exe -
Drops autorun.inf file 1 TTPs 2 IoCs
Malware can abuse Windows Autorun to spread further via attached volumes.
Processes:
77da93699a35376456421b2ed5e6ce90_NeikiAnalytics.exedescription ioc process File opened for modification C:\autorun.inf 77da93699a35376456421b2ed5e6ce90_NeikiAnalytics.exe File opened for modification F:\autorun.inf 77da93699a35376456421b2ed5e6ce90_NeikiAnalytics.exe -
Drops file in Program Files directory 5 IoCs
Processes:
77da93699a35376456421b2ed5e6ce90_NeikiAnalytics.exedescription ioc process File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\BCSSync.exe 77da93699a35376456421b2ed5e6ce90_NeikiAnalytics.exe File opened for modification C:\PROGRAM FILES\7-ZIP\7z.exe 77da93699a35376456421b2ed5e6ce90_NeikiAnalytics.exe File opened for modification C:\PROGRAM FILES\7-ZIP\7zFM.exe 77da93699a35376456421b2ed5e6ce90_NeikiAnalytics.exe File opened for modification C:\PROGRAM FILES\7-ZIP\7zG.exe 77da93699a35376456421b2ed5e6ce90_NeikiAnalytics.exe File opened for modification C:\PROGRAM FILES\7-ZIP\Uninstall.exe 77da93699a35376456421b2ed5e6ce90_NeikiAnalytics.exe -
Drops file in Windows directory 1 IoCs
Processes:
77da93699a35376456421b2ed5e6ce90_NeikiAnalytics.exedescription ioc process File opened for modification C:\Windows\SYSTEM.INI 77da93699a35376456421b2ed5e6ce90_NeikiAnalytics.exe -
Suspicious behavior: EnumeratesProcesses 13 IoCs
Processes:
77da93699a35376456421b2ed5e6ce90_NeikiAnalytics.exepid process 1916 77da93699a35376456421b2ed5e6ce90_NeikiAnalytics.exe 1916 77da93699a35376456421b2ed5e6ce90_NeikiAnalytics.exe 1916 77da93699a35376456421b2ed5e6ce90_NeikiAnalytics.exe 1916 77da93699a35376456421b2ed5e6ce90_NeikiAnalytics.exe 1916 77da93699a35376456421b2ed5e6ce90_NeikiAnalytics.exe 1916 77da93699a35376456421b2ed5e6ce90_NeikiAnalytics.exe 1916 77da93699a35376456421b2ed5e6ce90_NeikiAnalytics.exe 1916 77da93699a35376456421b2ed5e6ce90_NeikiAnalytics.exe 1916 77da93699a35376456421b2ed5e6ce90_NeikiAnalytics.exe 1916 77da93699a35376456421b2ed5e6ce90_NeikiAnalytics.exe 1916 77da93699a35376456421b2ed5e6ce90_NeikiAnalytics.exe 1916 77da93699a35376456421b2ed5e6ce90_NeikiAnalytics.exe 1916 77da93699a35376456421b2ed5e6ce90_NeikiAnalytics.exe -
Suspicious use of AdjustPrivilegeToken 32 IoCs
Processes:
77da93699a35376456421b2ed5e6ce90_NeikiAnalytics.exedescription pid process Token: SeDebugPrivilege 1916 77da93699a35376456421b2ed5e6ce90_NeikiAnalytics.exe Token: SeDebugPrivilege 1916 77da93699a35376456421b2ed5e6ce90_NeikiAnalytics.exe Token: SeDebugPrivilege 1916 77da93699a35376456421b2ed5e6ce90_NeikiAnalytics.exe Token: SeDebugPrivilege 1916 77da93699a35376456421b2ed5e6ce90_NeikiAnalytics.exe Token: SeDebugPrivilege 1916 77da93699a35376456421b2ed5e6ce90_NeikiAnalytics.exe Token: SeDebugPrivilege 1916 77da93699a35376456421b2ed5e6ce90_NeikiAnalytics.exe Token: SeDebugPrivilege 1916 77da93699a35376456421b2ed5e6ce90_NeikiAnalytics.exe Token: SeDebugPrivilege 1916 77da93699a35376456421b2ed5e6ce90_NeikiAnalytics.exe Token: SeDebugPrivilege 1916 77da93699a35376456421b2ed5e6ce90_NeikiAnalytics.exe Token: SeDebugPrivilege 1916 77da93699a35376456421b2ed5e6ce90_NeikiAnalytics.exe Token: SeDebugPrivilege 1916 77da93699a35376456421b2ed5e6ce90_NeikiAnalytics.exe Token: SeDebugPrivilege 1916 77da93699a35376456421b2ed5e6ce90_NeikiAnalytics.exe Token: SeDebugPrivilege 1916 77da93699a35376456421b2ed5e6ce90_NeikiAnalytics.exe Token: SeDebugPrivilege 1916 77da93699a35376456421b2ed5e6ce90_NeikiAnalytics.exe Token: SeDebugPrivilege 1916 77da93699a35376456421b2ed5e6ce90_NeikiAnalytics.exe Token: SeDebugPrivilege 1916 77da93699a35376456421b2ed5e6ce90_NeikiAnalytics.exe Token: SeDebugPrivilege 1916 77da93699a35376456421b2ed5e6ce90_NeikiAnalytics.exe Token: SeDebugPrivilege 1916 77da93699a35376456421b2ed5e6ce90_NeikiAnalytics.exe Token: SeDebugPrivilege 1916 77da93699a35376456421b2ed5e6ce90_NeikiAnalytics.exe Token: SeDebugPrivilege 1916 77da93699a35376456421b2ed5e6ce90_NeikiAnalytics.exe Token: SeDebugPrivilege 1916 77da93699a35376456421b2ed5e6ce90_NeikiAnalytics.exe Token: SeDebugPrivilege 1916 77da93699a35376456421b2ed5e6ce90_NeikiAnalytics.exe Token: SeDebugPrivilege 1916 77da93699a35376456421b2ed5e6ce90_NeikiAnalytics.exe Token: SeDebugPrivilege 1916 77da93699a35376456421b2ed5e6ce90_NeikiAnalytics.exe Token: SeDebugPrivilege 1916 77da93699a35376456421b2ed5e6ce90_NeikiAnalytics.exe Token: SeDebugPrivilege 1916 77da93699a35376456421b2ed5e6ce90_NeikiAnalytics.exe Token: SeDebugPrivilege 1916 77da93699a35376456421b2ed5e6ce90_NeikiAnalytics.exe Token: SeDebugPrivilege 1916 77da93699a35376456421b2ed5e6ce90_NeikiAnalytics.exe Token: SeDebugPrivilege 1916 77da93699a35376456421b2ed5e6ce90_NeikiAnalytics.exe Token: SeDebugPrivilege 1916 77da93699a35376456421b2ed5e6ce90_NeikiAnalytics.exe Token: SeDebugPrivilege 1916 77da93699a35376456421b2ed5e6ce90_NeikiAnalytics.exe Token: SeDebugPrivilege 1916 77da93699a35376456421b2ed5e6ce90_NeikiAnalytics.exe -
Suspicious use of WriteProcessMemory 40 IoCs
Processes:
77da93699a35376456421b2ed5e6ce90_NeikiAnalytics.exedescription pid process target process PID 1916 wrote to memory of 1288 1916 77da93699a35376456421b2ed5e6ce90_NeikiAnalytics.exe taskhost.exe PID 1916 wrote to memory of 1352 1916 77da93699a35376456421b2ed5e6ce90_NeikiAnalytics.exe Dwm.exe PID 1916 wrote to memory of 1380 1916 77da93699a35376456421b2ed5e6ce90_NeikiAnalytics.exe Explorer.EXE PID 1916 wrote to memory of 2208 1916 77da93699a35376456421b2ed5e6ce90_NeikiAnalytics.exe DllHost.exe PID 1916 wrote to memory of 1288 1916 77da93699a35376456421b2ed5e6ce90_NeikiAnalytics.exe taskhost.exe PID 1916 wrote to memory of 1352 1916 77da93699a35376456421b2ed5e6ce90_NeikiAnalytics.exe Dwm.exe PID 1916 wrote to memory of 1380 1916 77da93699a35376456421b2ed5e6ce90_NeikiAnalytics.exe Explorer.EXE PID 1916 wrote to memory of 1288 1916 77da93699a35376456421b2ed5e6ce90_NeikiAnalytics.exe taskhost.exe PID 1916 wrote to memory of 1352 1916 77da93699a35376456421b2ed5e6ce90_NeikiAnalytics.exe Dwm.exe PID 1916 wrote to memory of 1380 1916 77da93699a35376456421b2ed5e6ce90_NeikiAnalytics.exe Explorer.EXE PID 1916 wrote to memory of 1288 1916 77da93699a35376456421b2ed5e6ce90_NeikiAnalytics.exe taskhost.exe PID 1916 wrote to memory of 1352 1916 77da93699a35376456421b2ed5e6ce90_NeikiAnalytics.exe Dwm.exe PID 1916 wrote to memory of 1380 1916 77da93699a35376456421b2ed5e6ce90_NeikiAnalytics.exe Explorer.EXE PID 1916 wrote to memory of 1288 1916 77da93699a35376456421b2ed5e6ce90_NeikiAnalytics.exe taskhost.exe PID 1916 wrote to memory of 1352 1916 77da93699a35376456421b2ed5e6ce90_NeikiAnalytics.exe Dwm.exe PID 1916 wrote to memory of 1380 1916 77da93699a35376456421b2ed5e6ce90_NeikiAnalytics.exe Explorer.EXE PID 1916 wrote to memory of 1288 1916 77da93699a35376456421b2ed5e6ce90_NeikiAnalytics.exe taskhost.exe PID 1916 wrote to memory of 1352 1916 77da93699a35376456421b2ed5e6ce90_NeikiAnalytics.exe Dwm.exe PID 1916 wrote to memory of 1380 1916 77da93699a35376456421b2ed5e6ce90_NeikiAnalytics.exe Explorer.EXE PID 1916 wrote to memory of 1288 1916 77da93699a35376456421b2ed5e6ce90_NeikiAnalytics.exe taskhost.exe PID 1916 wrote to memory of 1352 1916 77da93699a35376456421b2ed5e6ce90_NeikiAnalytics.exe Dwm.exe PID 1916 wrote to memory of 1380 1916 77da93699a35376456421b2ed5e6ce90_NeikiAnalytics.exe Explorer.EXE PID 1916 wrote to memory of 1288 1916 77da93699a35376456421b2ed5e6ce90_NeikiAnalytics.exe taskhost.exe PID 1916 wrote to memory of 1352 1916 77da93699a35376456421b2ed5e6ce90_NeikiAnalytics.exe Dwm.exe PID 1916 wrote to memory of 1380 1916 77da93699a35376456421b2ed5e6ce90_NeikiAnalytics.exe Explorer.EXE PID 1916 wrote to memory of 1288 1916 77da93699a35376456421b2ed5e6ce90_NeikiAnalytics.exe taskhost.exe PID 1916 wrote to memory of 1352 1916 77da93699a35376456421b2ed5e6ce90_NeikiAnalytics.exe Dwm.exe PID 1916 wrote to memory of 1380 1916 77da93699a35376456421b2ed5e6ce90_NeikiAnalytics.exe Explorer.EXE PID 1916 wrote to memory of 1288 1916 77da93699a35376456421b2ed5e6ce90_NeikiAnalytics.exe taskhost.exe PID 1916 wrote to memory of 1352 1916 77da93699a35376456421b2ed5e6ce90_NeikiAnalytics.exe Dwm.exe PID 1916 wrote to memory of 1380 1916 77da93699a35376456421b2ed5e6ce90_NeikiAnalytics.exe Explorer.EXE PID 1916 wrote to memory of 1288 1916 77da93699a35376456421b2ed5e6ce90_NeikiAnalytics.exe taskhost.exe PID 1916 wrote to memory of 1352 1916 77da93699a35376456421b2ed5e6ce90_NeikiAnalytics.exe Dwm.exe PID 1916 wrote to memory of 1380 1916 77da93699a35376456421b2ed5e6ce90_NeikiAnalytics.exe Explorer.EXE PID 1916 wrote to memory of 1288 1916 77da93699a35376456421b2ed5e6ce90_NeikiAnalytics.exe taskhost.exe PID 1916 wrote to memory of 1352 1916 77da93699a35376456421b2ed5e6ce90_NeikiAnalytics.exe Dwm.exe PID 1916 wrote to memory of 1380 1916 77da93699a35376456421b2ed5e6ce90_NeikiAnalytics.exe Explorer.EXE PID 1916 wrote to memory of 1288 1916 77da93699a35376456421b2ed5e6ce90_NeikiAnalytics.exe taskhost.exe PID 1916 wrote to memory of 1352 1916 77da93699a35376456421b2ed5e6ce90_NeikiAnalytics.exe Dwm.exe PID 1916 wrote to memory of 1380 1916 77da93699a35376456421b2ed5e6ce90_NeikiAnalytics.exe Explorer.EXE -
System policy modification 1 TTPs 1 IoCs
Processes:
77da93699a35376456421b2ed5e6ce90_NeikiAnalytics.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 77da93699a35376456421b2ed5e6ce90_NeikiAnalytics.exe
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
-
C:\Users\Admin\AppData\Local\Temp\77da93699a35376456421b2ed5e6ce90_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\77da93699a35376456421b2ed5e6ce90_NeikiAnalytics.exe"2⤵
- Modifies firewall policy service
- UAC bypass
- Windows security bypass
- Windows security modification
- Checks whether UAC is enabled
- Enumerates connected drives
- Drops autorun.inf file
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Privilege Escalation
Create or Modify System Process
1Windows Service
1Abuse Elevation Control Mechanism
1Bypass User Account Control
1Defense Evasion
Modify Registry
5Impair Defenses
4Disable or Modify Tools
3Disable or Modify System Firewall
1Abuse Elevation Control Mechanism
1Bypass User Account Control
1Replay Monitor
Loading Replay Monitor...
Downloads
-
F:\fkun.exeFilesize
100KB
MD507165868a4772702169f5e2abf78d479
SHA1b32fac4710ab0d60c869096f9032a53049bb9ddd
SHA256a632695d908b12d03bd9af6730de4a69dd05db333e3419fbdbef34f0ed3326ca
SHA51252e89c5b174b81e6d0b6062c362d19340740026bcd599c0a3c3243dfcd05f9c1efc746384f9e9239b07e2ffb03f4b540467729bd7aad98d2ded0e36033d95e2b
-
memory/1288-14-0x00000000020F0000-0x00000000020F2000-memory.dmpFilesize
8KB
-
memory/1916-29-0x0000000002140000-0x00000000031CE000-memory.dmpFilesize
16.6MB
-
memory/1916-69-0x0000000004D70000-0x0000000004D72000-memory.dmpFilesize
8KB
-
memory/1916-7-0x0000000002140000-0x00000000031CE000-memory.dmpFilesize
16.6MB
-
memory/1916-10-0x0000000002140000-0x00000000031CE000-memory.dmpFilesize
16.6MB
-
memory/1916-11-0x0000000002140000-0x00000000031CE000-memory.dmpFilesize
16.6MB
-
memory/1916-4-0x0000000002140000-0x00000000031CE000-memory.dmpFilesize
16.6MB
-
memory/1916-3-0x0000000002140000-0x00000000031CE000-memory.dmpFilesize
16.6MB
-
memory/1916-12-0x0000000002140000-0x00000000031CE000-memory.dmpFilesize
16.6MB
-
memory/1916-0-0x0000000000400000-0x000000000045E000-memory.dmpFilesize
376KB
-
memory/1916-25-0x0000000004D70000-0x0000000004D72000-memory.dmpFilesize
8KB
-
memory/1916-24-0x0000000004DC0000-0x0000000004DC1000-memory.dmpFilesize
4KB
-
memory/1916-22-0x0000000004DC0000-0x0000000004DC1000-memory.dmpFilesize
4KB
-
memory/1916-21-0x0000000004D70000-0x0000000004D72000-memory.dmpFilesize
8KB
-
memory/1916-9-0x0000000002140000-0x00000000031CE000-memory.dmpFilesize
16.6MB
-
memory/1916-13-0x0000000002140000-0x00000000031CE000-memory.dmpFilesize
16.6MB
-
memory/1916-8-0x0000000002140000-0x00000000031CE000-memory.dmpFilesize
16.6MB
-
memory/1916-27-0x0000000002140000-0x00000000031CE000-memory.dmpFilesize
16.6MB
-
memory/1916-28-0x0000000002140000-0x00000000031CE000-memory.dmpFilesize
16.6MB
-
memory/1916-26-0x0000000004D70000-0x0000000004D72000-memory.dmpFilesize
8KB
-
memory/1916-6-0x0000000002140000-0x00000000031CE000-memory.dmpFilesize
16.6MB
-
memory/1916-45-0x0000000000400000-0x000000000045E000-memory.dmpFilesize
376KB
-
memory/1916-33-0x0000000002140000-0x00000000031CE000-memory.dmpFilesize
16.6MB
-
memory/1916-35-0x0000000002140000-0x00000000031CE000-memory.dmpFilesize
16.6MB
-
memory/1916-42-0x0000000002140000-0x00000000031CE000-memory.dmpFilesize
16.6MB
-
memory/1916-43-0x0000000002140000-0x00000000031CE000-memory.dmpFilesize
16.6MB
-
memory/1916-32-0x0000000002140000-0x00000000031CE000-memory.dmpFilesize
16.6MB
-
memory/1916-46-0x0000000002140000-0x00000000031CE000-memory.dmpFilesize
16.6MB
-
memory/1916-47-0x0000000002140000-0x00000000031CE000-memory.dmpFilesize
16.6MB
-
memory/1916-50-0x0000000002140000-0x00000000031CE000-memory.dmpFilesize
16.6MB
-
memory/1916-51-0x0000000002140000-0x00000000031CE000-memory.dmpFilesize
16.6MB
-
memory/1916-54-0x0000000002140000-0x00000000031CE000-memory.dmpFilesize
16.6MB
-
memory/1916-55-0x0000000002140000-0x00000000031CE000-memory.dmpFilesize
16.6MB
-
memory/1916-58-0x0000000002140000-0x00000000031CE000-memory.dmpFilesize
16.6MB
-
memory/1916-59-0x0000000002140000-0x00000000031CE000-memory.dmpFilesize
16.6MB
-
memory/1916-66-0x0000000002140000-0x00000000031CE000-memory.dmpFilesize
16.6MB
-
memory/1916-67-0x0000000002140000-0x00000000031CE000-memory.dmpFilesize
16.6MB
-
memory/1916-31-0x0000000002140000-0x00000000031CE000-memory.dmpFilesize
16.6MB
-
memory/1916-5-0x0000000002140000-0x00000000031CE000-memory.dmpFilesize
16.6MB