Analysis

  • max time kernel
    150s
  • max time network
    128s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29/06/2024, 22:25

General

  • Target

    06595175c4d3b8f98efbb04ac6cdef76128eebbe38c8c7d642570a2aa036df49_NeikiAnalytics.exe

  • Size

    206KB

  • MD5

    1c53e6150832ac5a2d825b8a5f8fb060

  • SHA1

    ac8ba3cccd30ff841ef6b28d5a378d9cdf44b1d4

  • SHA256

    06595175c4d3b8f98efbb04ac6cdef76128eebbe38c8c7d642570a2aa036df49

  • SHA512

    e3e6f5ef42704ae1f5cc6972af7c0f3ae42ac9091aad1ab19bf631b7066e9f5c7a62d4e657c3a0038f132c2502cfa73ec82837a65e2d07659a1da71d267d6143

  • SSDEEP

    3072:zvEfVUzSLhIVbV6i5LirrlZrHyrUHUckoMQ2RN6unZ:zvEN2U+T6i5LirrllHy4HUcMQY6m

Score
10/10

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 2 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Boot or Logon Autostart Execution: Active Setup 2 TTPs 8 IoCs

    Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

  • Executes dropped EXE 4 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Drops file in Windows directory 6 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 2 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\06595175c4d3b8f98efbb04ac6cdef76128eebbe38c8c7d642570a2aa036df49_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\06595175c4d3b8f98efbb04ac6cdef76128eebbe38c8c7d642570a2aa036df49_NeikiAnalytics.exe"
    1⤵
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3708
    • \??\c:\windows\system\explorer.exe
      c:\windows\system\explorer.exe
      2⤵
      • Modifies WinLogon for persistence
      • Modifies visiblity of hidden/system files in Explorer
      • Boot or Logon Autostart Execution: Active Setup
      • Executes dropped EXE
      • Adds Run key to start application
      • Drops file in Windows directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2076
      • \??\c:\windows\system\spoolsv.exe
        c:\windows\system\spoolsv.exe SE
        3⤵
        • Executes dropped EXE
        • Drops file in Windows directory
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2748
        • \??\c:\windows\system\svchost.exe
          c:\windows\system\svchost.exe
          4⤵
          • Modifies WinLogon for persistence
          • Modifies visiblity of hidden/system files in Explorer
          • Boot or Logon Autostart Execution: Active Setup
          • Executes dropped EXE
          • Adds Run key to start application
          • Drops file in Windows directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: GetForegroundWindowSpam
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:392
          • \??\c:\windows\system\spoolsv.exe
            c:\windows\system\spoolsv.exe PR
            5⤵
            • Executes dropped EXE
            • Suspicious use of SetWindowsHookEx
            PID:3276
          • C:\Windows\SysWOW64\at.exe
            at 22:27 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe
            5⤵
              PID:2328
            • C:\Windows\SysWOW64\at.exe
              at 22:28 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe
              5⤵
                PID:1996
              • C:\Windows\SysWOW64\at.exe
                at 22:29 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe
                5⤵
                  PID:3652
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --field-trial-handle=4288,i,11746347647270949551,7786733067759450703,262144 --variations-seed-version --mojo-platform-channel-handle=4104 /prefetch:8
          1⤵
            PID:2852

          Network

                MITRE ATT&CK Enterprise v15

                Replay Monitor

                Loading Replay Monitor...

                Downloads

                • C:\Users\Admin\AppData\Roaming\mrsys.exe

                  Filesize

                  206KB

                  MD5

                  9bd7b39bee7198945061e2ee4a2b820a

                  SHA1

                  2abdaa35cc18e05779b35fc323a78780b65250ef

                  SHA256

                  3832240d5448d01ef579a9a576b456a50618e414bcfaabe2362704367f20d207

                  SHA512

                  2a2e833c7c3a237a52e7dfaef6d9416fa8dc157f345c831e152d5ff8fb575ec3e1433bd2d73d8a9b2849e00762effc78a518ae8f2d481406a2df3356600a8ce8

                • C:\Windows\System\explorer.exe

                  Filesize

                  206KB

                  MD5

                  5100886dbb8dbba9db7f701e035f63af

                  SHA1

                  6f9884cbc74613132292819a38ecd2007b692e52

                  SHA256

                  400fa202af47032d2ed341b5db8d4ad74fad45d3e37aab39f97e627c49306228

                  SHA512

                  ab169dc444db81f3b947fe19e2008409ed2c3c51d57ebbc8fcfbc7edb53ebf07333c5d7c4acf24e564c44c693c677c4bd15deeba0aa0e575e0d44ca15faacd53

                • C:\Windows\System\spoolsv.exe

                  Filesize

                  206KB

                  MD5

                  2ce9477bbcc9dd917cb252294276bc10

                  SHA1

                  a8b3a186674acf14b3f3f5fe7eea1e0d996f6065

                  SHA256

                  0290a52c3cb89956228a1065cd6026676a6f0ebb3749684c6a6c2026ff32c111

                  SHA512

                  f23b361c5aaa913f3d692b6e13a741ec414aa95089701ebe513021163a8dc61bb6ac734ca368b3c92a09754dcd586f63c7bb7d25fc6116e12503c3316af487c7

                • C:\Windows\System\svchost.exe

                  Filesize

                  206KB

                  MD5

                  b449b1ac95318e3a138ce0a8bc2d946e

                  SHA1

                  63b4e306b3b4c0f68f4fb8f98cab4e42ee89297d

                  SHA256

                  7f5976609338b2389e0f2b5db2b88c1c6e59f2f269d4596949d999858ff39029

                  SHA512

                  4e3bf1d395f88221a8b944da627a6c90a695de33ed19fbf36331cc119506a663f16cb743a8ee48c580db6f09b8e78ae17a97784c76be4bddc19f4a27464e9fc5