Analysis
-
max time kernel
150s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
29/06/2024, 22:25
Static task
static1
Behavioral task
behavioral1
Sample
06595175c4d3b8f98efbb04ac6cdef76128eebbe38c8c7d642570a2aa036df49_NeikiAnalytics.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
06595175c4d3b8f98efbb04ac6cdef76128eebbe38c8c7d642570a2aa036df49_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
06595175c4d3b8f98efbb04ac6cdef76128eebbe38c8c7d642570a2aa036df49_NeikiAnalytics.exe
-
Size
206KB
-
MD5
1c53e6150832ac5a2d825b8a5f8fb060
-
SHA1
ac8ba3cccd30ff841ef6b28d5a378d9cdf44b1d4
-
SHA256
06595175c4d3b8f98efbb04ac6cdef76128eebbe38c8c7d642570a2aa036df49
-
SHA512
e3e6f5ef42704ae1f5cc6972af7c0f3ae42ac9091aad1ab19bf631b7066e9f5c7a62d4e657c3a0038f132c2502cfa73ec82837a65e2d07659a1da71d267d6143
-
SSDEEP
3072:zvEfVUzSLhIVbV6i5LirrlZrHyrUHUckoMQ2RN6unZ:zvEN2U+T6i5LirrllHy4HUcMQY6m
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" svchost.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" svchost.exe -
Boot or Logon Autostart Execution: Active Setup 2 TTPs 8 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" explorer.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999} svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" svchost.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} svchost.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" svchost.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999} svchost.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} explorer.exe -
Executes dropped EXE 4 IoCs
pid Process 2076 explorer.exe 2748 spoolsv.exe 392 svchost.exe 3276 spoolsv.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" svchost.exe -
Drops file in Windows directory 6 IoCs
description ioc Process File opened for modification \??\c:\windows\system\explorer.exe 06595175c4d3b8f98efbb04ac6cdef76128eebbe38c8c7d642570a2aa036df49_NeikiAnalytics.exe File opened for modification \??\c:\windows\system\spoolsv.exe explorer.exe File opened for modification \??\c:\windows\system\svchost.exe spoolsv.exe File opened for modification \??\c:\windows\system\explorer.exe explorer.exe File opened for modification \??\c:\windows\system\svchost.exe svchost.exe File opened for modification C:\Windows\system\udsys.exe explorer.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3708 06595175c4d3b8f98efbb04ac6cdef76128eebbe38c8c7d642570a2aa036df49_NeikiAnalytics.exe 3708 06595175c4d3b8f98efbb04ac6cdef76128eebbe38c8c7d642570a2aa036df49_NeikiAnalytics.exe 2076 explorer.exe 2076 explorer.exe 2076 explorer.exe 2076 explorer.exe 2076 explorer.exe 2076 explorer.exe 392 svchost.exe 392 svchost.exe 392 svchost.exe 392 svchost.exe 2076 explorer.exe 2076 explorer.exe 392 svchost.exe 392 svchost.exe 2076 explorer.exe 2076 explorer.exe 392 svchost.exe 392 svchost.exe 2076 explorer.exe 2076 explorer.exe 392 svchost.exe 392 svchost.exe 2076 explorer.exe 2076 explorer.exe 392 svchost.exe 392 svchost.exe 2076 explorer.exe 2076 explorer.exe 392 svchost.exe 392 svchost.exe 2076 explorer.exe 2076 explorer.exe 392 svchost.exe 392 svchost.exe 2076 explorer.exe 2076 explorer.exe 392 svchost.exe 392 svchost.exe 2076 explorer.exe 2076 explorer.exe 392 svchost.exe 392 svchost.exe 2076 explorer.exe 2076 explorer.exe 392 svchost.exe 392 svchost.exe 2076 explorer.exe 2076 explorer.exe 392 svchost.exe 392 svchost.exe 2076 explorer.exe 2076 explorer.exe 392 svchost.exe 392 svchost.exe 2076 explorer.exe 2076 explorer.exe 392 svchost.exe 392 svchost.exe 2076 explorer.exe 2076 explorer.exe 392 svchost.exe 392 svchost.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 2076 explorer.exe 392 svchost.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 3708 06595175c4d3b8f98efbb04ac6cdef76128eebbe38c8c7d642570a2aa036df49_NeikiAnalytics.exe 3708 06595175c4d3b8f98efbb04ac6cdef76128eebbe38c8c7d642570a2aa036df49_NeikiAnalytics.exe 2076 explorer.exe 2076 explorer.exe 2748 spoolsv.exe 2748 spoolsv.exe 392 svchost.exe 392 svchost.exe 3276 spoolsv.exe 3276 spoolsv.exe 2076 explorer.exe 2076 explorer.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 3708 wrote to memory of 2076 3708 06595175c4d3b8f98efbb04ac6cdef76128eebbe38c8c7d642570a2aa036df49_NeikiAnalytics.exe 89 PID 3708 wrote to memory of 2076 3708 06595175c4d3b8f98efbb04ac6cdef76128eebbe38c8c7d642570a2aa036df49_NeikiAnalytics.exe 89 PID 3708 wrote to memory of 2076 3708 06595175c4d3b8f98efbb04ac6cdef76128eebbe38c8c7d642570a2aa036df49_NeikiAnalytics.exe 89 PID 2076 wrote to memory of 2748 2076 explorer.exe 90 PID 2076 wrote to memory of 2748 2076 explorer.exe 90 PID 2076 wrote to memory of 2748 2076 explorer.exe 90 PID 2748 wrote to memory of 392 2748 spoolsv.exe 91 PID 2748 wrote to memory of 392 2748 spoolsv.exe 91 PID 2748 wrote to memory of 392 2748 spoolsv.exe 91 PID 392 wrote to memory of 3276 392 svchost.exe 92 PID 392 wrote to memory of 3276 392 svchost.exe 92 PID 392 wrote to memory of 3276 392 svchost.exe 92 PID 392 wrote to memory of 2328 392 svchost.exe 93 PID 392 wrote to memory of 2328 392 svchost.exe 93 PID 392 wrote to memory of 2328 392 svchost.exe 93 PID 392 wrote to memory of 1996 392 svchost.exe 105 PID 392 wrote to memory of 1996 392 svchost.exe 105 PID 392 wrote to memory of 1996 392 svchost.exe 105 PID 392 wrote to memory of 3652 392 svchost.exe 107 PID 392 wrote to memory of 3652 392 svchost.exe 107 PID 392 wrote to memory of 3652 392 svchost.exe 107
Processes
-
C:\Users\Admin\AppData\Local\Temp\06595175c4d3b8f98efbb04ac6cdef76128eebbe38c8c7d642570a2aa036df49_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\06595175c4d3b8f98efbb04ac6cdef76128eebbe38c8c7d642570a2aa036df49_NeikiAnalytics.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3708 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe2⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2076 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE3⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2748 -
\??\c:\windows\system\svchost.exec:\windows\system\svchost.exe4⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:392 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe PR5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3276
-
-
C:\Windows\SysWOW64\at.exeat 22:27 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe5⤵PID:2328
-
-
C:\Windows\SysWOW64\at.exeat 22:28 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe5⤵PID:1996
-
-
C:\Windows\SysWOW64\at.exeat 22:29 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe5⤵PID:3652
-
-
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --field-trial-handle=4288,i,11746347647270949551,7786733067759450703,262144 --variations-seed-version --mojo-platform-channel-handle=4104 /prefetch:81⤵PID:2852
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
206KB
MD59bd7b39bee7198945061e2ee4a2b820a
SHA12abdaa35cc18e05779b35fc323a78780b65250ef
SHA2563832240d5448d01ef579a9a576b456a50618e414bcfaabe2362704367f20d207
SHA5122a2e833c7c3a237a52e7dfaef6d9416fa8dc157f345c831e152d5ff8fb575ec3e1433bd2d73d8a9b2849e00762effc78a518ae8f2d481406a2df3356600a8ce8
-
Filesize
206KB
MD55100886dbb8dbba9db7f701e035f63af
SHA16f9884cbc74613132292819a38ecd2007b692e52
SHA256400fa202af47032d2ed341b5db8d4ad74fad45d3e37aab39f97e627c49306228
SHA512ab169dc444db81f3b947fe19e2008409ed2c3c51d57ebbc8fcfbc7edb53ebf07333c5d7c4acf24e564c44c693c677c4bd15deeba0aa0e575e0d44ca15faacd53
-
Filesize
206KB
MD52ce9477bbcc9dd917cb252294276bc10
SHA1a8b3a186674acf14b3f3f5fe7eea1e0d996f6065
SHA2560290a52c3cb89956228a1065cd6026676a6f0ebb3749684c6a6c2026ff32c111
SHA512f23b361c5aaa913f3d692b6e13a741ec414aa95089701ebe513021163a8dc61bb6ac734ca368b3c92a09754dcd586f63c7bb7d25fc6116e12503c3316af487c7
-
Filesize
206KB
MD5b449b1ac95318e3a138ce0a8bc2d946e
SHA163b4e306b3b4c0f68f4fb8f98cab4e42ee89297d
SHA2567f5976609338b2389e0f2b5db2b88c1c6e59f2f269d4596949d999858ff39029
SHA5124e3bf1d395f88221a8b944da627a6c90a695de33ed19fbf36331cc119506a663f16cb743a8ee48c580db6f09b8e78ae17a97784c76be4bddc19f4a27464e9fc5