Analysis
-
max time kernel
118s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
20/06/2024, 07:49
Static task
static1
Behavioral task
behavioral1
Sample
46ed292893e8302219600f1b5c8f83d6a6fe9d78f7245d7281eb13e994bb122f_NeikiAnalytics.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
46ed292893e8302219600f1b5c8f83d6a6fe9d78f7245d7281eb13e994bb122f_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
46ed292893e8302219600f1b5c8f83d6a6fe9d78f7245d7281eb13e994bb122f_NeikiAnalytics.exe
-
Size
1.5MB
-
MD5
6c5edd49b86932f574100bf07ccaee20
-
SHA1
d0f95c2f34e0eb722c5dd21dc7378f91e4f360a9
-
SHA256
46ed292893e8302219600f1b5c8f83d6a6fe9d78f7245d7281eb13e994bb122f
-
SHA512
31f9d1bc36da1a6c6be563667ad1f7020f9ac04433d53128beca1db0758f73a483d35b86ecc600e225e707fcdf46a5586c67361f8378ed55630bbc01900aa2a7
-
SSDEEP
49152:+WUMv5De9/yG9/ooooERQr0tb6H8RlOuQhRe4hvR:+WUMqyGB0Z6H8Rl4y0
Malware Config
Signatures
-
Checks for any installed AV software in registry 1 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Avast Software\Avast icarus.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 3 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 icarus.exe File opened for modification \??\PhysicalDrive0 46ed292893e8302219600f1b5c8f83d6a6fe9d78f7245d7281eb13e994bb122f_NeikiAnalytics.exe File opened for modification \??\PhysicalDrive0 icarus.exe -
Executes dropped EXE 3 IoCs
pid Process 2500 icarus.exe 1820 icarus_ui.exe 1656 icarus.exe -
Loads dropped DLL 6 IoCs
pid Process 2748 46ed292893e8302219600f1b5c8f83d6a6fe9d78f7245d7281eb13e994bb122f_NeikiAnalytics.exe 2500 icarus.exe 2500 icarus.exe 2500 icarus.exe 2500 icarus.exe 1656 icarus.exe -
Checks processor information in registry 2 TTPs 7 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz icarus.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 icarus_ui.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz icarus_ui.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 icarus.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz icarus.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 icarus.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString icarus.exe -
Modifies registry class 10 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\C06AEB9D-8774-46E7-8160-8321BCD14D9F\56C7A9DA-4B11-406A-8B1A-EFF157C294D6 = "cd9fd47e-4256-4e74-8e76-f863789d896c" icarus.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\C06AEB9D-8774-46E7-8160-8321BCD14D9F\7CCD586D-2ABC-42FF-A23B-3731F4F183D9 = "66FC9A86B023D8FFC79948E2D373B0F2" icarus.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\C06AEB9D-8774-46E7-8160-8321BCD14D9F\56C7A9DA-4B11-406A-8B1A-EFF157C294D6 = "cd9fd47e-4256-4e74-8e76-f863789d896c" icarus.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\C06AEB9D-8774-46E7-8160-8321BCD14D9F\7CCD586D-2ABC-42FF-A23B-3731F4F183D9 = "66FC9A86B023D8FFC79948E2D373B0F2" icarus.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\C06AEB9D-8774-46E7-8160-8321BCD14D9F 46ed292893e8302219600f1b5c8f83d6a6fe9d78f7245d7281eb13e994bb122f_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\C06AEB9D-8774-46E7-8160-8321BCD14D9F\5E1D6A55-0134-486E-A166-38C2E4919BB1 = "AQAAANCMnd8BFdERjHoAwE/Cl+sBAAAACNUNUA6SYEyuLZXjYPBe4QQAAAACAAAAAAAQZgAAAAEAACAAAAA5iyS1cdFA/AdYTrM27Udl9AOxhRW6Opx/8QG6rO1/nQAAAAAOgAAAAAIAACAAAABPZoZ8grwsEYPEa2wGoXUxAJU0+hXQvFkncHRLeTNeHlAAAACkNuSfgBoODG9jDH7Scklmp9LG1mfzTr2bK1JfwJtZVTHL+wF9ArV7pplhcwn9GQOqWP0Ppy5XAlvtRViwhonIULewOOMlJTUcblRftfn+5kAAAABO1kn62w7yScIQqruK4NI0EenvnCoHOx3OuOOQRzb5bi3Rv9Fl5DvSRLe+4VS6KqZrZTqhccm12L+WmQvKUETZ" 46ed292893e8302219600f1b5c8f83d6a6fe9d78f7245d7281eb13e994bb122f_NeikiAnalytics.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\C06AEB9D-8774-46E7-8160-8321BCD14D9F icarus.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\C06AEB9D-8774-46E7-8160-8321BCD14D9F icarus.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\C06AEB9D-8774-46E7-8160-8321BCD14D9F\7CCD586D-2ABC-42FF-A23B-3731F4F183D9 = "66FC9A86B023D8FFC79948E2D373B0F2" 46ed292893e8302219600f1b5c8f83d6a6fe9d78f7245d7281eb13e994bb122f_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\C06AEB9D-8774-46E7-8160-8321BCD14D9F\56C7A9DA-4B11-406A-8B1A-EFF157C294D6 = "cd9fd47e-4256-4e74-8e76-f863789d896c" 46ed292893e8302219600f1b5c8f83d6a6fe9d78f7245d7281eb13e994bb122f_NeikiAnalytics.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1820 icarus_ui.exe -
Suspicious use of AdjustPrivilegeToken 19 IoCs
description pid Process Token: SeRestorePrivilege 2500 icarus.exe Token: SeTakeOwnershipPrivilege 2500 icarus.exe Token: SeRestorePrivilege 2500 icarus.exe Token: SeTakeOwnershipPrivilege 2500 icarus.exe Token: SeRestorePrivilege 2500 icarus.exe Token: SeTakeOwnershipPrivilege 2500 icarus.exe Token: SeRestorePrivilege 2500 icarus.exe Token: SeTakeOwnershipPrivilege 2500 icarus.exe Token: SeDebugPrivilege 2500 icarus.exe Token: SeDebugPrivilege 1820 icarus_ui.exe Token: SeRestorePrivilege 1656 icarus.exe Token: SeTakeOwnershipPrivilege 1656 icarus.exe Token: SeRestorePrivilege 1656 icarus.exe Token: SeTakeOwnershipPrivilege 1656 icarus.exe Token: SeRestorePrivilege 1656 icarus.exe Token: SeTakeOwnershipPrivilege 1656 icarus.exe Token: SeRestorePrivilege 1656 icarus.exe Token: SeTakeOwnershipPrivilege 1656 icarus.exe Token: SeDebugPrivilege 1656 icarus.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 2748 46ed292893e8302219600f1b5c8f83d6a6fe9d78f7245d7281eb13e994bb122f_NeikiAnalytics.exe 1820 icarus_ui.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1820 icarus_ui.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 2748 wrote to memory of 2500 2748 46ed292893e8302219600f1b5c8f83d6a6fe9d78f7245d7281eb13e994bb122f_NeikiAnalytics.exe 28 PID 2748 wrote to memory of 2500 2748 46ed292893e8302219600f1b5c8f83d6a6fe9d78f7245d7281eb13e994bb122f_NeikiAnalytics.exe 28 PID 2748 wrote to memory of 2500 2748 46ed292893e8302219600f1b5c8f83d6a6fe9d78f7245d7281eb13e994bb122f_NeikiAnalytics.exe 28 PID 2748 wrote to memory of 2500 2748 46ed292893e8302219600f1b5c8f83d6a6fe9d78f7245d7281eb13e994bb122f_NeikiAnalytics.exe 28 PID 2500 wrote to memory of 1820 2500 icarus.exe 29 PID 2500 wrote to memory of 1820 2500 icarus.exe 29 PID 2500 wrote to memory of 1820 2500 icarus.exe 29 PID 2500 wrote to memory of 1656 2500 icarus.exe 30 PID 2500 wrote to memory of 1656 2500 icarus.exe 30 PID 2500 wrote to memory of 1656 2500 icarus.exe 30 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\46ed292893e8302219600f1b5c8f83d6a6fe9d78f7245d7281eb13e994bb122f_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\46ed292893e8302219600f1b5c8f83d6a6fe9d78f7245d7281eb13e994bb122f_NeikiAnalytics.exe"1⤵
- Writes to the Master Boot Record (MBR)
- Loads dropped DLL
- Modifies registry class
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2748 -
C:\Windows\Temp\asw-ceca46e0-7772-451d-b86f-0e1e52a09f77\common\icarus.exeC:\Windows\Temp\asw-ceca46e0-7772-451d-b86f-0e1e52a09f77\common\icarus.exe /icarus-info-path:C:\Windows\Temp\asw-ceca46e0-7772-451d-b86f-0e1e52a09f77\icarus-info.xml /install /sssid:27482⤵
- Writes to the Master Boot Record (MBR)
- Executes dropped EXE
- Loads dropped DLL
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2500 -
C:\Windows\Temp\asw-ceca46e0-7772-451d-b86f-0e1e52a09f77\common\icarus_ui.exeC:\Windows\Temp\asw-ceca46e0-7772-451d-b86f-0e1e52a09f77\common\icarus_ui.exe /sssid:2748 /er_master:master_ep_605eb7ab-981b-4f33-abfc-843978e94e0b /er_ui:ui_ep_df28dd87-f5c6-4c4e-825f-24e9614db2ba3⤵
- Executes dropped EXE
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:1820
-
-
C:\Windows\Temp\asw-ceca46e0-7772-451d-b86f-0e1e52a09f77\avg-tu\icarus.exeC:\Windows\Temp\asw-ceca46e0-7772-451d-b86f-0e1e52a09f77\avg-tu\icarus.exe /sssid:2748 /er_master:master_ep_605eb7ab-981b-4f33-abfc-843978e94e0b /er_ui:ui_ep_df28dd87-f5c6-4c4e-825f-24e9614db2ba /er_slave:avg-tu_slave_ep_96c1c185-796f-4386-af6f-c96026dc43ce /slave:avg-tu3⤵
- Checks for any installed AV software in registry
- Writes to the Master Boot Record (MBR)
- Executes dropped EXE
- Loads dropped DLL
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:1656
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
48KB
MD5b2d6c70f9160fa31bcbccfd460f45aa5
SHA101dcc107da93fa3ab7fef35a4063d37a4ba9c6ea
SHA256c09def84053ebe183822ce06434c6435e88dc8698fe910dbbad0a6a7e459bbee
SHA5120d667861179bbe62dec91f944484b70e5c0ebbaf9be52800fb36efdf616020c2d75eee47a1026e2e028a0af852c3819e2b4ac924d590061cdf2e34a4a9d5755b
-
Filesize
11KB
MD5bbeba9fe02066f5ca3bcbdc3bef29e80
SHA11fa413bfe6f665c79fa8be910580f6fdd5094d30
SHA256832de1c416a77e1974842e5ac07b3f1999c275f680dd699e40757c156d402f49
SHA512a0b7d35f27b56f7a8da8734fe2bc38d3362e92f14c3fc94dcf65518a37e1c5156be4a086c107eab6d1826a24c68de6350a4d8afe40034e7da4b8d00d5a371bc1
-
Filesize
10KB
MD55d5ea4926230170ce9a4c41898ebacef
SHA1cefe769be5dce699f2e7aac1cc5faf48950f262a
SHA256ff0405e43fdcd763ee280ef328db0d9de661dfa2a8991f0cc193218562c20879
SHA5123f4adb183fdc01632c8e11ff4c5814cdb61ad7b84c6f04567e04d3fc39caec5ecf90a1e89ef0ee6baab1aaef949e40e43671d9ba65860e3232cb88c383f4c0f0
-
Filesize
278B
MD5b8853a8e6228549b5d3ad97752d173d4
SHA1cd471a5d57e0946c19a694a6be8a3959cef30341
SHA2568e511706c04e382e58153c274138e99a298e87e29e12548d39b7f3d3442878b9
SHA512cf4edd9ee238c1e621501f91a4c3338ec0cb07ca2c2df00aa7c44d3db7c4f3798bc4137c11c15379d0c71fab1c5c61f19be32ba3fc39dc242313d0947461a787
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
64B
MD522417b5d5eb168147f2c237d658a7163
SHA16ae67daf07c0a187f397923ecba497e5ab01ed58
SHA256f1945b77f21bf5b8174bc94d0d69d4446baffd6808185554f8ae541e4254ecb1
SHA512392b79a63b451495cc81877c288c0068d6c159bf0d7ce9ac0cc290128e57a5a1ebe0569dcbab85433448b3c1928be03cf01300ec7ae99573cfc4ef8c4c9b3cb8
-
Filesize
72B
MD57cbbc24c29ecef293907d30764b0e3ea
SHA1df262b856dd95329de2519ba593f939436eb3720
SHA256ed5b171416fd26dc5d072848e24394aa609c9b08ada6fbd31337c34a597a2733
SHA51282c9770fbd4cdf5c7c6a10c60acf5534de370cb4a6c7ff23bd8a434aaba4327d48d50421f5f8a5e40a9077128cf9f8a3ed13f63df498066eb3a35d50ac7bb164
-
Filesize
4.8MB
MD50c0f0ca2bb49dfa3743e9d4156007c70
SHA1042fdfba346a89a83f0c782117038a82b29a28d1
SHA2560e1865702916ae47aafc54c6199e3a73acb735ae888f9a8dd7bc4656268ef9ea
SHA512e15f826ce67d4d5224cdcefc3194a5a9144e152ad16136f5774d2ca29484fc11e778e2e9d114af80ad2a99907bd4999e6eef95c7b7dbbe6a7829d67c1b6bbc92
-
Filesize
549B
MD5d74cac8e23617717dcbac5d12be7e108
SHA1573f84282e738e302b822eb9842500bf1b4b3b39
SHA256a7f55316856c9eddb54a08fee7cd386aa07c27034c0ddd784cb0f4fc2fb0c55b
SHA512b482cbeef3789d2c74e8035488aca68b33b395e1c561223a3c9a3cc5687a89cbbad88a84e4bdef8d1a55dfa831089075086362b02781726b55f260727af49052
-
Filesize
1.2MB
MD52f8931c51ebbe01d0c1d87d5ad2d652f
SHA1a322fec62bbfe4d8b46199bc9001b4af74bbaf93
SHA256add1dd3fb660dfb534317cb29e18a37e82f4e27000004ef29213914a6b6d5cfd
SHA5122018cbf3179db624de67860370b80c46d8dbf59c9286e24c89e4edbf348720e38080aa1c5f8c6519593960057eb7fb3fa19b490bda5bc5fcafed2654dbb57890
-
Filesize
228KB
MD575fa646c45a8991f3b6978844588670e
SHA124cd6e97d367b481d173bac4fafc6e0b83f5537f
SHA2566727dd70125f8c3b6f209b8bd08eef1c2b2be322e552720ccc986863d3c2eb11
SHA5123e387b529ce28c6f7332637f57e973cea96a862012a40dc7f50a4e33e6258d67ac7bfce0005263de37633a47b689a10187d61a3202db1610fec4b9bab0e174a0
-
Filesize
257KB
MD5c95dc978812b51e1b9aa38c27faf3b1a
SHA170dee9e4f828652f6be927a193be6938bc175ce4
SHA2564bafb54cd8637586dbfe316ea6e7f9f50010ff021f813128490d2a9c34a89bf0
SHA5125202548902634ee28ce8fdab32f1fb8797881e3643b74d892da0155c3e90cbd98e837a85069c5bf1b06518e8355660486e63abefe41b2a484b4683f29fb1f0d0
-
Filesize
3.4MB
MD5c22d80d43019235520344972efec9ff2
SHA11a2b4b2a52d820f9233ca0201be9ee7f6d82adbc
SHA2565841a3df4784e008b8f2c567f15bb28cdb4cb4ca35c750f1108dfb1ccb6011f0
SHA512f1cadbc3077379a6d7e36b8cf3bc830f44b5e668d4a6c0ce6b62bde292498c4f41c6588c5eba2599aa67524acfd125b7f23c419ae2b4a8e4afea7708aad83edc
-
Filesize
11.8MB
MD57ebae16a6ea514e55f7160c3539261cc
SHA1ae74b3af4926b6932aea68a32c7c8727d53a94e7
SHA256f27f92f003505dbca839513d233198211860de0ef487973a5ce0761d8e8ebfb9
SHA512f7c7c084517785f21ae0bd82509ddc31e985edbe9e07f275414806afa3f696037340ea0e6091221a5d81250adf170ca0fa4345915d000eaba6034a9db0f61369
-
Filesize
6KB
MD5ca24f226325bdc68559f6b406eb272a1
SHA1b730d609ca398767f0a1eebe20aceae9cae82faf
SHA2567c73d3d03aa3f302aeedf1abb83d5f82a87ca3c51fad7b1e70b7cf11abfca5dd
SHA512aa3638faf1ee9d52384e32d09ecc1ae328c6ef66c96cf6eac5c537c8fc214cf64df6547e86a0ce5fc5d1af8620e7d16b9c70b813033ed99a874c1eab7208e372
-
Filesize
21B
MD5a6f4b1ef270fe9312c1434e0eedce035
SHA1efec1b16abf8005b9bbf88e14972b4f9075b39c6
SHA2567067c203b4b5c6807c039cb3fd5d92bdd7e154e849a49b2472dab7f86d32b80b
SHA512e5bd609a8d32a8c3b2d5477550529efaa362894d3797b30575ce8a4b73a82af8f918c0c30f7248ffa65dc7cfebf097b42611e6ff858d33583e77a75c0265a723
-
Filesize
50B
MD57661652b44b59d2467aa087248ffd63c
SHA14cbd8704770a52e0191f6c524317602f790446ef
SHA256b3a118b1536058b32659f7d928c0ac96b364a479a535eabe43340aaeccf12c9e
SHA5121786249dc38535b7cddb9c03093816d1b4834210b5341a38ed0be7465e4a69278d1af8640c75c1b5cbb975124aeb62e1136d37a38068bccf18c485ce11f39a02
-
Filesize
1KB
MD508079f92fa3d96ed0f3b67967c333675
SHA152e77c9ed016c843c0252f430d4e075cd88202c4
SHA256067a62778d85c6551cf2e4c96fb12c84b81a2004c82dad803135ec003c03300c
SHA512b54b2943227f296e11680173e79445566e1cacedddc1f4e82fb261e29200e23f30f2823b73edab2e063b6a97be1455dd5ce3ecd9e3f21f8189d418b74bd695e9
-
Filesize
7.7MB
MD597856ab19be2842f985c899ccde7e312
SHA14b33ff3baeba3b61ee040b1d00ebff0531cc21ef
SHA2562569a72d3a55ea7ad690d708907245c221664c5c88cadbc19e1967135fa40514
SHA512b2f57fd7c482977ebf52b49e50e57f60f1bf87be5bbf54c0dcfb3038c0f46b89c70f10161fab7585d01b90c4fdc00b86932444f32528fed04b514c6746bff29f