Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
20-06-2024 12:58
Static task
static1
Behavioral task
behavioral1
Sample
64d95187128d914965de0c8d049cbb22f5b3cda23183e94c6d82e3ed40cda817_NeikiAnalytics.dll
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
64d95187128d914965de0c8d049cbb22f5b3cda23183e94c6d82e3ed40cda817_NeikiAnalytics.dll
Resource
win10v2004-20240611-en
General
-
Target
64d95187128d914965de0c8d049cbb22f5b3cda23183e94c6d82e3ed40cda817_NeikiAnalytics.dll
-
Size
5.0MB
-
MD5
176d70629d399ac693f7b03451f262f0
-
SHA1
d134d4497b644f52fe725d8c12cb31f99af79aa0
-
SHA256
64d95187128d914965de0c8d049cbb22f5b3cda23183e94c6d82e3ed40cda817
-
SHA512
d77aca892e9c79fad97f702c3dd7e7fd445b4a7672e7abaf3388911faaa5cf65b10f731473247863a202cdfc6605849be020e5412c65caa8f089ed832fb6efde
-
SSDEEP
24576:RbLgurgQhfdmMSirYbcMNgef0QeQjGIkQg6eX6SASkjTiif0Xc/OXlc3:RnsQqMSPbcBVQejIkQo6SArf0XdX63
Malware Config
Signatures
-
Wannacry
WannaCry is a ransomware cryptoworm.
-
Contacts a large (3300) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Executes dropped EXE 2 IoCs
pid Process 2056 mssecsvr.exe 344 mssecsvr.exe -
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Drops file in System32 directory 5 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Roaming\Microsoft\Windows\Cookies\A95VVOYE.txt mssecsvr.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat mssecsvr.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Roaming\Microsoft\Windows\Cookies\MAX3AYV4.txt mssecsvr.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Roaming\Microsoft\Windows\Cookies\MAX3AYV4.txt mssecsvr.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Roaming\Microsoft\Windows\Cookies\A95VVOYE.txt mssecsvr.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\WINDOWS\mssecsvr.exe rundll32.exe File created C:\WINDOWS\tasksche.exe mssecsvr.exe -
Modifies data under HKEY_USERS 24 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections mssecsvr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings mssecsvr.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable = "0" mssecsvr.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 mssecsvr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ mssecsvr.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix mssecsvr.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\86-79-66-c3-c8-b4\WpadDecisionTime = 804f538111c3da01 mssecsvr.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings mssecsvr.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" mssecsvr.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{000CDB81-6B7A-4701-A42A-CADE1503F99A}\WpadDecision = "0" mssecsvr.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{000CDB81-6B7A-4701-A42A-CADE1503F99A}\WpadNetworkName = "Network 3" mssecsvr.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\86-79-66-c3-c8-b4 mssecsvr.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 mssecsvr.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" mssecsvr.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{000CDB81-6B7A-4701-A42A-CADE1503F99A} mssecsvr.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{000CDB81-6B7A-4701-A42A-CADE1503F99A}\WpadDecisionTime = 804f538111c3da01 mssecsvr.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\86-79-66-c3-c8-b4\WpadDecisionReason = "1" mssecsvr.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "0" mssecsvr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad mssecsvr.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000003000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f004a000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 mssecsvr.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{000CDB81-6B7A-4701-A42A-CADE1503F99A}\WpadDecisionReason = "1" mssecsvr.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{000CDB81-6B7A-4701-A42A-CADE1503F99A}\86-79-66-c3-c8-b4 mssecsvr.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\86-79-66-c3-c8-b4\WpadDecision = "0" mssecsvr.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "1" mssecsvr.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2108 wrote to memory of 2060 2108 rundll32.exe 28 PID 2108 wrote to memory of 2060 2108 rundll32.exe 28 PID 2108 wrote to memory of 2060 2108 rundll32.exe 28 PID 2108 wrote to memory of 2060 2108 rundll32.exe 28 PID 2108 wrote to memory of 2060 2108 rundll32.exe 28 PID 2108 wrote to memory of 2060 2108 rundll32.exe 28 PID 2108 wrote to memory of 2060 2108 rundll32.exe 28 PID 2060 wrote to memory of 2056 2060 rundll32.exe 29 PID 2060 wrote to memory of 2056 2060 rundll32.exe 29 PID 2060 wrote to memory of 2056 2060 rundll32.exe 29 PID 2060 wrote to memory of 2056 2060 rundll32.exe 29
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\64d95187128d914965de0c8d049cbb22f5b3cda23183e94c6d82e3ed40cda817_NeikiAnalytics.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2108 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\64d95187128d914965de0c8d049cbb22f5b3cda23183e94c6d82e3ed40cda817_NeikiAnalytics.dll,#12⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2060 -
C:\WINDOWS\mssecsvr.exeC:\WINDOWS\mssecsvr.exe3⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:2056
-
-
-
C:\WINDOWS\mssecsvr.exeC:\WINDOWS\mssecsvr.exe -m security1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:344
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.2MB
MD59f39db25e92f01266b2fd453d105d802
SHA1b9ed7fc5839403e87119716fa94fe3bb73b56f10
SHA256658ecb99e90cf4ce00a358a58d9e6e6468157147c73ccaae9f8e600dbb06aadd
SHA5125bb998f1763cf15aee7e0aaacd40bc28dc2a6d2b152d4c8bb530d526f2e1c1bcfad0250a70c6a987d1073470e90061dccf80b3d6b6e6c5faa9892b5f7ba704f4