Analysis
-
max time kernel
149s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
29/06/2024, 05:04
Static task
static1
Behavioral task
behavioral1
Sample
67e1f86aeab144b8ae451f17ddd36c37b55f7907dc4bd733a1b840e5cf236023_NeikiAnalytics.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
67e1f86aeab144b8ae451f17ddd36c37b55f7907dc4bd733a1b840e5cf236023_NeikiAnalytics.exe
Resource
win10v2004-20240611-en
General
-
Target
67e1f86aeab144b8ae451f17ddd36c37b55f7907dc4bd733a1b840e5cf236023_NeikiAnalytics.exe
-
Size
394KB
-
MD5
1d5b46715c043df4d2dcaf146f16c160
-
SHA1
60ad63e2478aad0c6359d046957c4269881bc916
-
SHA256
67e1f86aeab144b8ae451f17ddd36c37b55f7907dc4bd733a1b840e5cf236023
-
SHA512
9f2c551b46775f5dc3bb420615a1915470907ca5ca81c070f6bc7f803b898bebe193a2b8a5095097ea366621b1f3c2e4bb67e0d458dd1f8654d312085cb83c74
-
SSDEEP
12288:5RLSsPdKSsPdks8axVPxFJPGQeOixoTe0+:5RLSo4SoP8afPZeQJIoS7
Malware Config
Signatures
-
Blocklisted process makes network request 1 IoCs
flow pid Process 5 2408 Rundll32.exe -
Loads dropped DLL 9 IoCs
pid Process 2204 Rundll32.exe 2204 Rundll32.exe 2204 Rundll32.exe 2204 Rundll32.exe 2408 Rundll32.exe 2408 Rundll32.exe 2408 Rundll32.exe 2408 Rundll32.exe 2408 Rundll32.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\system = "C:\\Windows\\system32\\system.exe" Rundll32.exe -
Enumerates connected drives 3 TTPs 2 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\D: Rundll32.exe File opened (read-only) \??\F: Rundll32.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\xouctbtb.dll 67e1f86aeab144b8ae451f17ddd36c37b55f7907dc4bd733a1b840e5cf236023_NeikiAnalytics.exe File created C:\Windows\SysWOW64\chwctbtb.dll 67e1f86aeab144b8ae451f17ddd36c37b55f7907dc4bd733a1b840e5cf236023_NeikiAnalytics.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File opened for modification C:\Program Files\KAV\CDriver.sys Rundll32.exe -
Launches sc.exe 3 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 1208 sc.exe 2964 sc.exe 2508 sc.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2204 Rundll32.exe 2204 Rundll32.exe 2204 Rundll32.exe 2204 Rundll32.exe 2204 Rundll32.exe 2408 Rundll32.exe -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 480 Process not Found -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2364 67e1f86aeab144b8ae451f17ddd36c37b55f7907dc4bd733a1b840e5cf236023_NeikiAnalytics.exe -
Suspicious use of WriteProcessMemory 42 IoCs
description pid Process procid_target PID 2364 wrote to memory of 2204 2364 67e1f86aeab144b8ae451f17ddd36c37b55f7907dc4bd733a1b840e5cf236023_NeikiAnalytics.exe 28 PID 2364 wrote to memory of 2204 2364 67e1f86aeab144b8ae451f17ddd36c37b55f7907dc4bd733a1b840e5cf236023_NeikiAnalytics.exe 28 PID 2364 wrote to memory of 2204 2364 67e1f86aeab144b8ae451f17ddd36c37b55f7907dc4bd733a1b840e5cf236023_NeikiAnalytics.exe 28 PID 2364 wrote to memory of 2204 2364 67e1f86aeab144b8ae451f17ddd36c37b55f7907dc4bd733a1b840e5cf236023_NeikiAnalytics.exe 28 PID 2364 wrote to memory of 2204 2364 67e1f86aeab144b8ae451f17ddd36c37b55f7907dc4bd733a1b840e5cf236023_NeikiAnalytics.exe 28 PID 2364 wrote to memory of 2204 2364 67e1f86aeab144b8ae451f17ddd36c37b55f7907dc4bd733a1b840e5cf236023_NeikiAnalytics.exe 28 PID 2364 wrote to memory of 2204 2364 67e1f86aeab144b8ae451f17ddd36c37b55f7907dc4bd733a1b840e5cf236023_NeikiAnalytics.exe 28 PID 2204 wrote to memory of 2480 2204 Rundll32.exe 29 PID 2204 wrote to memory of 2480 2204 Rundll32.exe 29 PID 2204 wrote to memory of 2480 2204 Rundll32.exe 29 PID 2204 wrote to memory of 2480 2204 Rundll32.exe 29 PID 2204 wrote to memory of 2144 2204 Rundll32.exe 30 PID 2204 wrote to memory of 2144 2204 Rundll32.exe 30 PID 2204 wrote to memory of 2144 2204 Rundll32.exe 30 PID 2204 wrote to memory of 2144 2204 Rundll32.exe 30 PID 2204 wrote to memory of 1208 2204 Rundll32.exe 32 PID 2204 wrote to memory of 1208 2204 Rundll32.exe 32 PID 2204 wrote to memory of 1208 2204 Rundll32.exe 32 PID 2204 wrote to memory of 1208 2204 Rundll32.exe 32 PID 2204 wrote to memory of 2964 2204 Rundll32.exe 34 PID 2204 wrote to memory of 2964 2204 Rundll32.exe 34 PID 2204 wrote to memory of 2964 2204 Rundll32.exe 34 PID 2204 wrote to memory of 2964 2204 Rundll32.exe 34 PID 2480 wrote to memory of 2660 2480 net.exe 38 PID 2480 wrote to memory of 2660 2480 net.exe 38 PID 2480 wrote to memory of 2660 2480 net.exe 38 PID 2480 wrote to memory of 2660 2480 net.exe 38 PID 2144 wrote to memory of 2684 2144 net.exe 37 PID 2144 wrote to memory of 2684 2144 net.exe 37 PID 2144 wrote to memory of 2684 2144 net.exe 37 PID 2144 wrote to memory of 2684 2144 net.exe 37 PID 2204 wrote to memory of 2508 2204 Rundll32.exe 39 PID 2204 wrote to memory of 2508 2204 Rundll32.exe 39 PID 2204 wrote to memory of 2508 2204 Rundll32.exe 39 PID 2204 wrote to memory of 2508 2204 Rundll32.exe 39 PID 2364 wrote to memory of 2408 2364 67e1f86aeab144b8ae451f17ddd36c37b55f7907dc4bd733a1b840e5cf236023_NeikiAnalytics.exe 41 PID 2364 wrote to memory of 2408 2364 67e1f86aeab144b8ae451f17ddd36c37b55f7907dc4bd733a1b840e5cf236023_NeikiAnalytics.exe 41 PID 2364 wrote to memory of 2408 2364 67e1f86aeab144b8ae451f17ddd36c37b55f7907dc4bd733a1b840e5cf236023_NeikiAnalytics.exe 41 PID 2364 wrote to memory of 2408 2364 67e1f86aeab144b8ae451f17ddd36c37b55f7907dc4bd733a1b840e5cf236023_NeikiAnalytics.exe 41 PID 2364 wrote to memory of 2408 2364 67e1f86aeab144b8ae451f17ddd36c37b55f7907dc4bd733a1b840e5cf236023_NeikiAnalytics.exe 41 PID 2364 wrote to memory of 2408 2364 67e1f86aeab144b8ae451f17ddd36c37b55f7907dc4bd733a1b840e5cf236023_NeikiAnalytics.exe 41 PID 2364 wrote to memory of 2408 2364 67e1f86aeab144b8ae451f17ddd36c37b55f7907dc4bd733a1b840e5cf236023_NeikiAnalytics.exe 41
Processes
-
C:\Users\Admin\AppData\Local\Temp\67e1f86aeab144b8ae451f17ddd36c37b55f7907dc4bd733a1b840e5cf236023_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\67e1f86aeab144b8ae451f17ddd36c37b55f7907dc4bd733a1b840e5cf236023_NeikiAnalytics.exe"1⤵
- Drops file in System32 directory
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:2364 -
C:\Windows\SysWOW64\Rundll32.exeRundll32 C:\Windows\system32\xouctbtb.dll Exucute2⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2204 -
C:\Windows\SysWOW64\net.exenet stop WinDefend3⤵
- Suspicious use of WriteProcessMemory
PID:2480 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop WinDefend4⤵PID:2660
-
-
-
C:\Windows\SysWOW64\net.exenet stop MpsSvc3⤵
- Suspicious use of WriteProcessMemory
PID:2144 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MpsSvc4⤵PID:2684
-
-
-
C:\Windows\SysWOW64\sc.exesc config WinDefend start= disabled3⤵
- Launches sc.exe
PID:1208
-
-
C:\Windows\SysWOW64\sc.exesc config MpsSvc start= disabled3⤵
- Launches sc.exe
PID:2964
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" stop PolicyAgent3⤵
- Launches sc.exe
PID:2508
-
-
-
C:\Windows\SysWOW64\Rundll32.exeRundll32 C:\Windows\system32\chwctbtb.dll Exucute2⤵
- Blocklisted process makes network request
- Loads dropped DLL
- Adds Run key to start application
- Enumerates connected drives
- Suspicious behavior: EnumeratesProcesses
PID:2408
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
23KB
MD53ec0097815c1cbc8806a684756b218d6
SHA1cc5c412023810ed506255f3d13740ca1865b192b
SHA2562ed2a4a3405bdde9effe735c5a6df4aff71a2da380ef207947e5d65f82e6031e
SHA512f55a781d76c60797373caca8d75d7a909e722e3a589477753d2169d4dca96a4eb0377d79d22e6fcd248cf82d1e946a300bb6e4f9db6d0e88b179b2251ff02019
-
Filesize
59KB
MD5f26ca2f6846d3cdf60d54bc8ed39eaba
SHA1de124e7c81c79408a578d891acfd13a1ddd9f391
SHA2563b784ac577cd9140f8dc9bf08c506f2fd472e1aafdd95a386584408cde95a7d7
SHA512fea242ee4ec5f2f2dca8dd15d550c3a9c7d95fd3f3ff639774d025f4914790df1a6deee66fa470d53a47385c2ae0f9bcfae81c5b47b44a1c2988bffa6a85bba3
-
Filesize
1.7MB
MD5b5eb5bd3066959611e1f7a80fd6cc172
SHA16fb1532059212c840737b3f923a9c0b152c0887a
SHA2561ffb68a66f28f604adcae9c135f8dcf301316ab7fda8ebd294583c56dd26f7cc
SHA5126c0743e0ff4922e859ba66b68040ab994dbae33e80c63ce8c993ad31a0c7aad6c6467484da1550063214953cd641dbf597438dd0c02f24164505d88ca80ea1b6