Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
51s -
max time network
51s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
20/06/2024, 00:01
Behavioral task
behavioral1
Sample
1afe4c5827b8578259a78ff48d2349c59bf478a4936e55e53d4ac5e89f4b4a12_NeikiAnalytics.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
1afe4c5827b8578259a78ff48d2349c59bf478a4936e55e53d4ac5e89f4b4a12_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
1afe4c5827b8578259a78ff48d2349c59bf478a4936e55e53d4ac5e89f4b4a12_NeikiAnalytics.exe
-
Size
90KB
-
MD5
c7c08910097d82602c345146ce16afd0
-
SHA1
b4904411974aaf7bd3eb2b18d2f2bbda157a62b3
-
SHA256
1afe4c5827b8578259a78ff48d2349c59bf478a4936e55e53d4ac5e89f4b4a12
-
SHA512
7fe8a2a4856338dcb1bf3cdb397e4434bcabf31cd01b4e36ad3e93e6a2a622dc8dc7cba3f7d3e4a405f9650acce37094c4ea79b730a91167825b0caec303ed1a
-
SSDEEP
1536:XJRtlEnBHHIgabuYotV/JbJCX5SBiCJRtlEnBHHIgabuYotV/JbJCX5SBi:XvtYxOuYotvYQICvtYxOuYotvYQI
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe \"C:\\Windows\\system32\\IExplorer.exe\"" 1afe4c5827b8578259a78ff48d2349c59bf478a4936e55e53d4ac5e89f4b4a12_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\IExplorer.exe" 1afe4c5827b8578259a78ff48d2349c59bf478a4936e55e53d4ac5e89f4b4a12_NeikiAnalytics.exe -
Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" 1afe4c5827b8578259a78ff48d2349c59bf478a4936e55e53d4ac5e89f4b4a12_NeikiAnalytics.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 1afe4c5827b8578259a78ff48d2349c59bf478a4936e55e53d4ac5e89f4b4a12_NeikiAnalytics.exe -
Disables RegEdit via registry modification 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" 1afe4c5827b8578259a78ff48d2349c59bf478a4936e55e53d4ac5e89f4b4a12_NeikiAnalytics.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" 1afe4c5827b8578259a78ff48d2349c59bf478a4936e55e53d4ac5e89f4b4a12_NeikiAnalytics.exe -
Disables use of System Restore points 1 TTPs
-
Executes dropped EXE 7 IoCs
pid Process 2280 xk.exe 4616 IExplorer.exe 1424 WINLOGON.EXE 4776 CSRSS.EXE 1936 SERVICES.EXE 3016 LSASS.EXE 1932 SMSS.EXE -
Modifies system executable filetype association 2 TTPs 13 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open 1afe4c5827b8578259a78ff48d2349c59bf478a4936e55e53d4ac5e89f4b4a12_NeikiAnalytics.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command 1afe4c5827b8578259a78ff48d2349c59bf478a4936e55e53d4ac5e89f4b4a12_NeikiAnalytics.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command 1afe4c5827b8578259a78ff48d2349c59bf478a4936e55e53d4ac5e89f4b4a12_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 1afe4c5827b8578259a78ff48d2349c59bf478a4936e55e53d4ac5e89f4b4a12_NeikiAnalytics.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command 1afe4c5827b8578259a78ff48d2349c59bf478a4936e55e53d4ac5e89f4b4a12_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\ = "File Folder" 1afe4c5827b8578259a78ff48d2349c59bf478a4936e55e53d4ac5e89f4b4a12_NeikiAnalytics.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command 1afe4c5827b8578259a78ff48d2349c59bf478a4936e55e53d4ac5e89f4b4a12_NeikiAnalytics.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell 1afe4c5827b8578259a78ff48d2349c59bf478a4936e55e53d4ac5e89f4b4a12_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 1afe4c5827b8578259a78ff48d2349c59bf478a4936e55e53d4ac5e89f4b4a12_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 1afe4c5827b8578259a78ff48d2349c59bf478a4936e55e53d4ac5e89f4b4a12_NeikiAnalytics.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command 1afe4c5827b8578259a78ff48d2349c59bf478a4936e55e53d4ac5e89f4b4a12_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 1afe4c5827b8578259a78ff48d2349c59bf478a4936e55e53d4ac5e89f4b4a12_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 1afe4c5827b8578259a78ff48d2349c59bf478a4936e55e53d4ac5e89f4b4a12_NeikiAnalytics.exe -
resource yara_rule behavioral2/memory/548-0-0x0000000000400000-0x000000000042F000-memory.dmp upx behavioral2/files/0x0007000000023414-8.dat upx behavioral2/files/0x0007000000023418-106.dat upx behavioral2/memory/2280-108-0x0000000000400000-0x000000000042F000-memory.dmp upx behavioral2/memory/2280-113-0x0000000000400000-0x000000000042F000-memory.dmp upx behavioral2/files/0x000700000002341c-112.dat upx behavioral2/memory/4616-115-0x0000000000400000-0x000000000042F000-memory.dmp upx behavioral2/files/0x000700000002341e-121.dat upx behavioral2/memory/4616-120-0x0000000000400000-0x000000000042F000-memory.dmp upx behavioral2/memory/1424-128-0x0000000000400000-0x000000000042F000-memory.dmp upx behavioral2/files/0x000700000002341f-127.dat upx behavioral2/memory/4776-134-0x0000000000400000-0x000000000042F000-memory.dmp upx behavioral2/files/0x0007000000023420-135.dat upx behavioral2/memory/1936-137-0x0000000000400000-0x000000000042F000-memory.dmp upx behavioral2/files/0x0007000000023421-141.dat upx behavioral2/memory/1936-142-0x0000000000400000-0x000000000042F000-memory.dmp upx behavioral2/files/0x0007000000023423-150.dat upx behavioral2/memory/3016-147-0x0000000000400000-0x000000000042F000-memory.dmp upx behavioral2/memory/1932-154-0x0000000000400000-0x000000000042F000-memory.dmp upx behavioral2/memory/548-156-0x0000000000400000-0x000000000042F000-memory.dmp upx -
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\System Monitoring = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\LSASS.EXE" 1afe4c5827b8578259a78ff48d2349c59bf478a4936e55e53d4ac5e89f4b4a12_NeikiAnalytics.exe Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xk = "C:\\Windows\\xk.exe" 1afe4c5827b8578259a78ff48d2349c59bf478a4936e55e53d4ac5e89f4b4a12_NeikiAnalytics.exe Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MSMSGS = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\WINLOGON.EXE" 1afe4c5827b8578259a78ff48d2349c59bf478a4936e55e53d4ac5e89f4b4a12_NeikiAnalytics.exe Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ServiceAdmin = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\SERVICES.EXE" 1afe4c5827b8578259a78ff48d2349c59bf478a4936e55e53d4ac5e89f4b4a12_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\LogonAdmin = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\CSRSS.EXE" 1afe4c5827b8578259a78ff48d2349c59bf478a4936e55e53d4ac5e89f4b4a12_NeikiAnalytics.exe -
Drops file in System32 directory 6 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\shell.exe 1afe4c5827b8578259a78ff48d2349c59bf478a4936e55e53d4ac5e89f4b4a12_NeikiAnalytics.exe File created C:\Windows\SysWOW64\shell.exe 1afe4c5827b8578259a78ff48d2349c59bf478a4936e55e53d4ac5e89f4b4a12_NeikiAnalytics.exe File created C:\Windows\SysWOW64\Mig2.scr 1afe4c5827b8578259a78ff48d2349c59bf478a4936e55e53d4ac5e89f4b4a12_NeikiAnalytics.exe File created C:\Windows\SysWOW64\IExplorer.exe 1afe4c5827b8578259a78ff48d2349c59bf478a4936e55e53d4ac5e89f4b4a12_NeikiAnalytics.exe File opened for modification C:\Windows\SysWOW64\IExplorer.exe 1afe4c5827b8578259a78ff48d2349c59bf478a4936e55e53d4ac5e89f4b4a12_NeikiAnalytics.exe File opened for modification C:\Windows\SysWOW64\Mig2.scr 1afe4c5827b8578259a78ff48d2349c59bf478a4936e55e53d4ac5e89f4b4a12_NeikiAnalytics.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\xk.exe 1afe4c5827b8578259a78ff48d2349c59bf478a4936e55e53d4ac5e89f4b4a12_NeikiAnalytics.exe File created C:\Windows\xk.exe 1afe4c5827b8578259a78ff48d2349c59bf478a4936e55e53d4ac5e89f4b4a12_NeikiAnalytics.exe -
Modifies Control Panel 4 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\Desktop\ 1afe4c5827b8578259a78ff48d2349c59bf478a4936e55e53d4ac5e89f4b4a12_NeikiAnalytics.exe Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\Desktop\SCRNSAVE.EXE = "C:\\Windows\\system32\\Mig~mig.SCR" 1afe4c5827b8578259a78ff48d2349c59bf478a4936e55e53d4ac5e89f4b4a12_NeikiAnalytics.exe Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\Desktop\ScreenSaverIsSecure = "0" 1afe4c5827b8578259a78ff48d2349c59bf478a4936e55e53d4ac5e89f4b4a12_NeikiAnalytics.exe Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\Desktop\ScreenSaveTimeOut = "600" 1afe4c5827b8578259a78ff48d2349c59bf478a4936e55e53d4ac5e89f4b4a12_NeikiAnalytics.exe -
Modifies registry class 15 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile 1afe4c5827b8578259a78ff48d2349c59bf478a4936e55e53d4ac5e89f4b4a12_NeikiAnalytics.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command 1afe4c5827b8578259a78ff48d2349c59bf478a4936e55e53d4ac5e89f4b4a12_NeikiAnalytics.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command 1afe4c5827b8578259a78ff48d2349c59bf478a4936e55e53d4ac5e89f4b4a12_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 1afe4c5827b8578259a78ff48d2349c59bf478a4936e55e53d4ac5e89f4b4a12_NeikiAnalytics.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command 1afe4c5827b8578259a78ff48d2349c59bf478a4936e55e53d4ac5e89f4b4a12_NeikiAnalytics.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command 1afe4c5827b8578259a78ff48d2349c59bf478a4936e55e53d4ac5e89f4b4a12_NeikiAnalytics.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell 1afe4c5827b8578259a78ff48d2349c59bf478a4936e55e53d4ac5e89f4b4a12_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 1afe4c5827b8578259a78ff48d2349c59bf478a4936e55e53d4ac5e89f4b4a12_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\ = "File Folder" 1afe4c5827b8578259a78ff48d2349c59bf478a4936e55e53d4ac5e89f4b4a12_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 1afe4c5827b8578259a78ff48d2349c59bf478a4936e55e53d4ac5e89f4b4a12_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 1afe4c5827b8578259a78ff48d2349c59bf478a4936e55e53d4ac5e89f4b4a12_NeikiAnalytics.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile 1afe4c5827b8578259a78ff48d2349c59bf478a4936e55e53d4ac5e89f4b4a12_NeikiAnalytics.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open 1afe4c5827b8578259a78ff48d2349c59bf478a4936e55e53d4ac5e89f4b4a12_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 1afe4c5827b8578259a78ff48d2349c59bf478a4936e55e53d4ac5e89f4b4a12_NeikiAnalytics.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command 1afe4c5827b8578259a78ff48d2349c59bf478a4936e55e53d4ac5e89f4b4a12_NeikiAnalytics.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 548 1afe4c5827b8578259a78ff48d2349c59bf478a4936e55e53d4ac5e89f4b4a12_NeikiAnalytics.exe 548 1afe4c5827b8578259a78ff48d2349c59bf478a4936e55e53d4ac5e89f4b4a12_NeikiAnalytics.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 548 1afe4c5827b8578259a78ff48d2349c59bf478a4936e55e53d4ac5e89f4b4a12_NeikiAnalytics.exe 2280 xk.exe 4616 IExplorer.exe 1424 WINLOGON.EXE 4776 CSRSS.EXE 1936 SERVICES.EXE 3016 LSASS.EXE 1932 SMSS.EXE -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 548 wrote to memory of 2280 548 1afe4c5827b8578259a78ff48d2349c59bf478a4936e55e53d4ac5e89f4b4a12_NeikiAnalytics.exe 81 PID 548 wrote to memory of 2280 548 1afe4c5827b8578259a78ff48d2349c59bf478a4936e55e53d4ac5e89f4b4a12_NeikiAnalytics.exe 81 PID 548 wrote to memory of 2280 548 1afe4c5827b8578259a78ff48d2349c59bf478a4936e55e53d4ac5e89f4b4a12_NeikiAnalytics.exe 81 PID 548 wrote to memory of 4616 548 1afe4c5827b8578259a78ff48d2349c59bf478a4936e55e53d4ac5e89f4b4a12_NeikiAnalytics.exe 82 PID 548 wrote to memory of 4616 548 1afe4c5827b8578259a78ff48d2349c59bf478a4936e55e53d4ac5e89f4b4a12_NeikiAnalytics.exe 82 PID 548 wrote to memory of 4616 548 1afe4c5827b8578259a78ff48d2349c59bf478a4936e55e53d4ac5e89f4b4a12_NeikiAnalytics.exe 82 PID 548 wrote to memory of 1424 548 1afe4c5827b8578259a78ff48d2349c59bf478a4936e55e53d4ac5e89f4b4a12_NeikiAnalytics.exe 83 PID 548 wrote to memory of 1424 548 1afe4c5827b8578259a78ff48d2349c59bf478a4936e55e53d4ac5e89f4b4a12_NeikiAnalytics.exe 83 PID 548 wrote to memory of 1424 548 1afe4c5827b8578259a78ff48d2349c59bf478a4936e55e53d4ac5e89f4b4a12_NeikiAnalytics.exe 83 PID 548 wrote to memory of 4776 548 1afe4c5827b8578259a78ff48d2349c59bf478a4936e55e53d4ac5e89f4b4a12_NeikiAnalytics.exe 84 PID 548 wrote to memory of 4776 548 1afe4c5827b8578259a78ff48d2349c59bf478a4936e55e53d4ac5e89f4b4a12_NeikiAnalytics.exe 84 PID 548 wrote to memory of 4776 548 1afe4c5827b8578259a78ff48d2349c59bf478a4936e55e53d4ac5e89f4b4a12_NeikiAnalytics.exe 84 PID 548 wrote to memory of 1936 548 1afe4c5827b8578259a78ff48d2349c59bf478a4936e55e53d4ac5e89f4b4a12_NeikiAnalytics.exe 86 PID 548 wrote to memory of 1936 548 1afe4c5827b8578259a78ff48d2349c59bf478a4936e55e53d4ac5e89f4b4a12_NeikiAnalytics.exe 86 PID 548 wrote to memory of 1936 548 1afe4c5827b8578259a78ff48d2349c59bf478a4936e55e53d4ac5e89f4b4a12_NeikiAnalytics.exe 86 PID 548 wrote to memory of 3016 548 1afe4c5827b8578259a78ff48d2349c59bf478a4936e55e53d4ac5e89f4b4a12_NeikiAnalytics.exe 87 PID 548 wrote to memory of 3016 548 1afe4c5827b8578259a78ff48d2349c59bf478a4936e55e53d4ac5e89f4b4a12_NeikiAnalytics.exe 87 PID 548 wrote to memory of 3016 548 1afe4c5827b8578259a78ff48d2349c59bf478a4936e55e53d4ac5e89f4b4a12_NeikiAnalytics.exe 87 PID 548 wrote to memory of 1932 548 1afe4c5827b8578259a78ff48d2349c59bf478a4936e55e53d4ac5e89f4b4a12_NeikiAnalytics.exe 88 PID 548 wrote to memory of 1932 548 1afe4c5827b8578259a78ff48d2349c59bf478a4936e55e53d4ac5e89f4b4a12_NeikiAnalytics.exe 88 PID 548 wrote to memory of 1932 548 1afe4c5827b8578259a78ff48d2349c59bf478a4936e55e53d4ac5e89f4b4a12_NeikiAnalytics.exe 88 -
System policy modification 1 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer 1afe4c5827b8578259a78ff48d2349c59bf478a4936e55e53d4ac5e89f4b4a12_NeikiAnalytics.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" 1afe4c5827b8578259a78ff48d2349c59bf478a4936e55e53d4ac5e89f4b4a12_NeikiAnalytics.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System 1afe4c5827b8578259a78ff48d2349c59bf478a4936e55e53d4ac5e89f4b4a12_NeikiAnalytics.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" 1afe4c5827b8578259a78ff48d2349c59bf478a4936e55e53d4ac5e89f4b4a12_NeikiAnalytics.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\1afe4c5827b8578259a78ff48d2349c59bf478a4936e55e53d4ac5e89f4b4a12_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\1afe4c5827b8578259a78ff48d2349c59bf478a4936e55e53d4ac5e89f4b4a12_NeikiAnalytics.exe"1⤵
- Modifies WinLogon for persistence
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Disables RegEdit via registry modification
- Modifies system executable filetype association
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies Control Panel
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:548 -
C:\Windows\xk.exeC:\Windows\xk.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2280
-
-
C:\Windows\SysWOW64\IExplorer.exeC:\Windows\system32\IExplorer.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4616
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1424
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4776
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1936
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3016
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1932
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Event Triggered Execution
1Change Default File Association
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Event Triggered Execution
1Change Default File Association
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
90KB
MD5057ddda5cf2ac52312628ad297f60191
SHA153f9e77cd59b663adee515126cbc2a7b69b77f04
SHA2562f24b6d5b8975158dfe0799b6fdb6ff982294a02c420df28773974c86ddaf12c
SHA5121ab63e629b2981f58c7ed04119681c7b79c2be78ac67b9ffbe80f935668e387be5f804cf3760ad634ea6ca1a85053a379ab268aab0a5eb8046fa488373e668d9
-
Filesize
90KB
MD537c53a91685e3ca7e4182773886cecb8
SHA1f98cf3ca4c927998bfe4555be25e1e0edd55474c
SHA25659b9c523428c04054ce156e6c733d8dfda9912bf41ba164a813a6b54f82db19c
SHA5124b4331d00cee2e5e9cfbb23f39be42decddb5970b74147703f0acbcb58bc3b5a3d7f568e95f1b46241b1e998c9c96318bdf08fbcc0b14f692eacf7ece809f72d
-
Filesize
90KB
MD54880f5a9b977a0ee17c7d3c188970298
SHA143eb95b4ef1e33d56b90cd48891dd33eeab53dca
SHA25671bde26c85283fbfda40f0ae3a909c265f9689a5f1e8e93fda80483cd2d03f33
SHA512ffa93ff71b374fbc88089bec39982acfe22838f3269fb44e5bab36917e71f885f00a4fbcc0373739d24236e24b18687aaa3679aaee54e803a7ad34b3d16060ef
-
Filesize
90KB
MD53ded00f62d2d8e2106a965035d338128
SHA113296d8159d2741952ebb82ce6c964bf24a6b8a5
SHA256cdcee5ec232d6e2c39de5b0f934ad16e831daf3145a9ac681829fd0b4aa44386
SHA5121a61c492e6ef009ad4a6457042b4d83dd46c27ea9aea44349e523acaa1575ecbb6730eda591f5934fa16d391d1c16bf508c56682b84472c18434101b089b5a06
-
Filesize
90KB
MD5c7c08910097d82602c345146ce16afd0
SHA1b4904411974aaf7bd3eb2b18d2f2bbda157a62b3
SHA2561afe4c5827b8578259a78ff48d2349c59bf478a4936e55e53d4ac5e89f4b4a12
SHA5127fe8a2a4856338dcb1bf3cdb397e4434bcabf31cd01b4e36ad3e93e6a2a622dc8dc7cba3f7d3e4a405f9650acce37094c4ea79b730a91167825b0caec303ed1a
-
Filesize
90KB
MD5b2bb779f710af6c6083ec70a903f15a0
SHA169458b39c25b5ce630e00004452d2e289d69b020
SHA256f969b88e8cd06799be34f1b7517134c3a6750f7b777448619bd8bfe23fbf1cc0
SHA512d80b5093ef9ba75c27e286cfefa7a6d62dfced88392fd1faa46a436e9672d3b88aa46b480f92e7e17e94668fc57c27f09f7544d471032225017dba530e9099dd
-
Filesize
90KB
MD5998c630a849b3f4ad9ff893c5f0d0305
SHA157d2bb22ace6b9196ee70ae039781a763709de4b
SHA2566b283250a142de5bb131279db2db071b314cf492c580b1ec4b298ea5c31ff7a8
SHA512429def07b4c7f939c13fc53f062f2d31574f5e6eabca75d20babe9a2c394ef62f01ce99d609815ea4c42795bff55c4609c8b91f1ac1e1beb6aac0f0e80bf6475
-
Filesize
90KB
MD52fbc7b2f6137118e42955ca6fa8f6263
SHA1d4dc793bc776b0b7cdd14291dacc948cb12d0d8b
SHA25600f14bf27d1974fbd13e7345d847154c63fc1077ca57d6c6c89f2e7573f9448c
SHA512ce4e4aba1fb96a86f7e60dd19deabfbaadbd8c9e93df6b963b88662f90614728e3e01735ee312b2fdef4cafb4e4b0c6ab24a1a55d17f92e873518a94097e22ed