Analysis
-
max time kernel
150s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
27-06-2024 21:03
Static task
static1
Behavioral task
behavioral1
Sample
1b3803415e932fad397539e98059798241d0ebe12dc3ee5e085cc7c51dbf0d1f_NeikiAnalytics.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
1b3803415e932fad397539e98059798241d0ebe12dc3ee5e085cc7c51dbf0d1f_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
1b3803415e932fad397539e98059798241d0ebe12dc3ee5e085cc7c51dbf0d1f_NeikiAnalytics.exe
-
Size
464KB
-
MD5
246ab5cf6898086b1ccc631058889110
-
SHA1
c0006e0d13f5bb3cc3f473c3bba893f7f127ed97
-
SHA256
1b3803415e932fad397539e98059798241d0ebe12dc3ee5e085cc7c51dbf0d1f
-
SHA512
f08ecbe0a43004e4f9c2644c12ba1b56dcae540ed751d02ce3cc3eba5c6b4310fcf2e68ddaa2cb3ff2ac9b06685e4b11a715a7e84b89390f43750674ed8ccc82
-
SSDEEP
12288:J5lc87eqqV5e+wBV6O+zpA6okfvEbEKupef+f:J5SqqHeVBxEpAqEI6Gf
Malware Config
Signatures
-
Executes dropped EXE 3 IoCs
pid Process 4724 cmmotutl.exe 3092 mspailes.exe 184 ~5F46.tmp -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\OposHost = "C:\\Users\\Admin\\AppData\\Roaming\\mtstll32\\cmmotutl.exe" 1b3803415e932fad397539e98059798241d0ebe12dc3ee5e085cc7c51dbf0d1f_NeikiAnalytics.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\mspailes.exe 1b3803415e932fad397539e98059798241d0ebe12dc3ee5e085cc7c51dbf0d1f_NeikiAnalytics.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4724 cmmotutl.exe 4724 cmmotutl.exe 3440 Explorer.EXE 3440 Explorer.EXE 3440 Explorer.EXE 3440 Explorer.EXE 3440 Explorer.EXE 3440 Explorer.EXE 3440 Explorer.EXE 3440 Explorer.EXE 3440 Explorer.EXE 3440 Explorer.EXE 3440 Explorer.EXE 3440 Explorer.EXE 3440 Explorer.EXE 3440 Explorer.EXE 3440 Explorer.EXE 3440 Explorer.EXE 3440 Explorer.EXE 3440 Explorer.EXE 3440 Explorer.EXE 3440 Explorer.EXE 3440 Explorer.EXE 3440 Explorer.EXE 3440 Explorer.EXE 3440 Explorer.EXE 3440 Explorer.EXE 3440 Explorer.EXE 3440 Explorer.EXE 3440 Explorer.EXE 3440 Explorer.EXE 3440 Explorer.EXE 3440 Explorer.EXE 3440 Explorer.EXE 3440 Explorer.EXE 3440 Explorer.EXE 3440 Explorer.EXE 3440 Explorer.EXE 3440 Explorer.EXE 3440 Explorer.EXE 3440 Explorer.EXE 3440 Explorer.EXE 3440 Explorer.EXE 3440 Explorer.EXE 3440 Explorer.EXE 3440 Explorer.EXE 3440 Explorer.EXE 3440 Explorer.EXE 3440 Explorer.EXE 3440 Explorer.EXE 3440 Explorer.EXE 3440 Explorer.EXE 3440 Explorer.EXE 3440 Explorer.EXE 3440 Explorer.EXE 3440 Explorer.EXE 3440 Explorer.EXE 3440 Explorer.EXE 3440 Explorer.EXE 3440 Explorer.EXE 3440 Explorer.EXE 3440 Explorer.EXE 3440 Explorer.EXE 3440 Explorer.EXE -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4724 cmmotutl.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 3440 Explorer.EXE -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3064 wrote to memory of 4724 3064 1b3803415e932fad397539e98059798241d0ebe12dc3ee5e085cc7c51dbf0d1f_NeikiAnalytics.exe 81 PID 3064 wrote to memory of 4724 3064 1b3803415e932fad397539e98059798241d0ebe12dc3ee5e085cc7c51dbf0d1f_NeikiAnalytics.exe 81 PID 3064 wrote to memory of 4724 3064 1b3803415e932fad397539e98059798241d0ebe12dc3ee5e085cc7c51dbf0d1f_NeikiAnalytics.exe 81 PID 4724 wrote to memory of 184 4724 cmmotutl.exe 83 PID 4724 wrote to memory of 184 4724 cmmotutl.exe 83 PID 184 wrote to memory of 3440 184 ~5F46.tmp 56
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
PID:3440 -
C:\Users\Admin\AppData\Local\Temp\1b3803415e932fad397539e98059798241d0ebe12dc3ee5e085cc7c51dbf0d1f_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\1b3803415e932fad397539e98059798241d0ebe12dc3ee5e085cc7c51dbf0d1f_NeikiAnalytics.exe"2⤵
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:3064 -
C:\Users\Admin\AppData\Roaming\mtstll32\cmmotutl.exe"C:\Users\Admin\AppData\Roaming\mtstll32"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4724 -
C:\Users\Admin\AppData\Local\Temp\~5F46.tmp3440 475144 4724 14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:184
-
-
-
-
C:\Windows\SysWOW64\mspailes.exeC:\Windows\SysWOW64\mspailes.exe -s1⤵
- Executes dropped EXE
PID:3092
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
8KB
MD586dc243576cf5c7445451af37631eea9
SHA199a81c47c4c02f32c0ab456bfa23c306c7a09bf9
SHA25625d2a671e1b5b5b95697ac0234ce4d46e0d0894919521b54aabebd9daecf994a
SHA512c7310524f9b65f811146c1eb6ae944966351ac88a95fbc1ac422d8810730e5e212a7e28090ad758ea23c96ba38073e7fcf42460575e7f09dbc759a45c5d5a4a4
-
Filesize
464KB
MD5631ab7b30076dade1f1f5d86617bb558
SHA1d462fffedbd836f7a5e6cba19bb855f52f92c64c
SHA2560069bbfb07fdee04b493acf6822bec0475070ad8a491c1612bf411cc46cee051
SHA512f0ef6a9e1b36442d4aee8c5fa9e28dfc7dc06972511f9321c80c57dd1132935d122ad612186cda42378706c9c207daeff2a71bfee5a1b58d8285a9ca214f5ccd