Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
20-06-2024 12:58
Static task
static1
Behavioral task
behavioral1
Sample
64d95187128d914965de0c8d049cbb22f5b3cda23183e94c6d82e3ed40cda817_NeikiAnalytics.dll
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
64d95187128d914965de0c8d049cbb22f5b3cda23183e94c6d82e3ed40cda817_NeikiAnalytics.dll
Resource
win10v2004-20240611-en
General
-
Target
64d95187128d914965de0c8d049cbb22f5b3cda23183e94c6d82e3ed40cda817_NeikiAnalytics.dll
-
Size
5.0MB
-
MD5
176d70629d399ac693f7b03451f262f0
-
SHA1
d134d4497b644f52fe725d8c12cb31f99af79aa0
-
SHA256
64d95187128d914965de0c8d049cbb22f5b3cda23183e94c6d82e3ed40cda817
-
SHA512
d77aca892e9c79fad97f702c3dd7e7fd445b4a7672e7abaf3388911faaa5cf65b10f731473247863a202cdfc6605849be020e5412c65caa8f089ed832fb6efde
-
SSDEEP
24576:RbLgurgQhfdmMSirYbcMNgef0QeQjGIkQg6eX6SASkjTiif0Xc/OXlc3:RnsQqMSPbcBVQejIkQo6SArf0XdX63
Malware Config
Signatures
-
Wannacry
WannaCry is a ransomware cryptoworm.
-
Contacts a large (3316) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Executes dropped EXE 2 IoCs
pid Process 4040 mssecsvr.exe 1576 mssecsvr.exe -
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Drops file in System32 directory 4 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE mssecsvr.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCookies mssecsvr.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\History\History.IE5 mssecsvr.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\Content.IE5 mssecsvr.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\WINDOWS\mssecsvr.exe rundll32.exe File created C:\WINDOWS\tasksche.exe mssecsvr.exe -
Modifies data under HKEY_USERS 15 IoCs
description ioc Process Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" mssecsvr.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix mssecsvr.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" mssecsvr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ mssecsvr.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" mssecsvr.exe Key created \REGISTRY\USER\.DEFAULT\Software mssecsvr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft mssecsvr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings mssecsvr.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" mssecsvr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\P3P\History mssecsvr.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" mssecsvr.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" mssecsvr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows mssecsvr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion mssecsvr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\P3P mssecsvr.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1852 wrote to memory of 4144 1852 rundll32.exe 83 PID 1852 wrote to memory of 4144 1852 rundll32.exe 83 PID 1852 wrote to memory of 4144 1852 rundll32.exe 83 PID 4144 wrote to memory of 4040 4144 rundll32.exe 84 PID 4144 wrote to memory of 4040 4144 rundll32.exe 84 PID 4144 wrote to memory of 4040 4144 rundll32.exe 84
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\64d95187128d914965de0c8d049cbb22f5b3cda23183e94c6d82e3ed40cda817_NeikiAnalytics.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1852 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\64d95187128d914965de0c8d049cbb22f5b3cda23183e94c6d82e3ed40cda817_NeikiAnalytics.dll,#12⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:4144 -
C:\WINDOWS\mssecsvr.exeC:\WINDOWS\mssecsvr.exe3⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:4040
-
-
-
C:\WINDOWS\mssecsvr.exeC:\WINDOWS\mssecsvr.exe -m security1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:1576
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.2MB
MD59f39db25e92f01266b2fd453d105d802
SHA1b9ed7fc5839403e87119716fa94fe3bb73b56f10
SHA256658ecb99e90cf4ce00a358a58d9e6e6468157147c73ccaae9f8e600dbb06aadd
SHA5125bb998f1763cf15aee7e0aaacd40bc28dc2a6d2b152d4c8bb530d526f2e1c1bcfad0250a70c6a987d1073470e90061dccf80b3d6b6e6c5faa9892b5f7ba704f4