Analysis
-
max time kernel
150s -
max time network
143s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
29-06-2024 12:31
Static task
static1
Behavioral task
behavioral1
Sample
ab8c00477a8a142a9cfd9e08ec179b15c12905eb1f2934aa6923dd55a35755ab_NeikiAnalytics.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
ab8c00477a8a142a9cfd9e08ec179b15c12905eb1f2934aa6923dd55a35755ab_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
ab8c00477a8a142a9cfd9e08ec179b15c12905eb1f2934aa6923dd55a35755ab_NeikiAnalytics.exe
-
Size
150KB
-
MD5
a218db59526521a9e2e6f5ff3de7a3f0
-
SHA1
572075ecad019a5d89f2808996c5f8a17cc60f45
-
SHA256
ab8c00477a8a142a9cfd9e08ec179b15c12905eb1f2934aa6923dd55a35755ab
-
SHA512
e0c3e977b4e6d52b58c7115b9b7d76519ee621abd71849777615a640f3fe2c8156a1183b2622153cf187a2ed895883e9d1b5f2561c02260c80deadf5ebaeaf3e
-
SSDEEP
3072:HuuczBGY3j4nLXhfRf70MCRRb85TFcMo7xQGHMOfAVTzXW:HlcEY3iLXXgvRG5TFZoFQaMrHX
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\apppatch\\svchost.exe," svchost.exe -
Executes dropped EXE 1 IoCs
pid Process 2024 svchost.exe -
Loads dropped DLL 2 IoCs
pid Process 2088 ab8c00477a8a142a9cfd9e08ec179b15c12905eb1f2934aa6923dd55a35755ab_NeikiAnalytics.exe 2088 ab8c00477a8a142a9cfd9e08ec179b15c12905eb1f2934aa6923dd55a35755ab_NeikiAnalytics.exe -
Modifies WinLogon 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\25667d45 = "C:\\Windows\\apppatch\\svchost.exe" ab8c00477a8a142a9cfd9e08ec179b15c12905eb1f2934aa6923dd55a35755ab_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\25667d45 = "C:\\Windows\\apppatch\\svchost.exe" svchost.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\apppatch\svchost.exe ab8c00477a8a142a9cfd9e08ec179b15c12905eb1f2934aa6923dd55a35755ab_NeikiAnalytics.exe File opened for modification C:\Windows\apppatch\svchost.exe ab8c00477a8a142a9cfd9e08ec179b15c12905eb1f2934aa6923dd55a35755ab_NeikiAnalytics.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2024 svchost.exe 2024 svchost.exe 2024 svchost.exe 2024 svchost.exe 2024 svchost.exe 2024 svchost.exe 2024 svchost.exe 2024 svchost.exe 2024 svchost.exe 2024 svchost.exe 2024 svchost.exe 2024 svchost.exe 2024 svchost.exe 2024 svchost.exe 2024 svchost.exe 2024 svchost.exe 2024 svchost.exe 2024 svchost.exe 2024 svchost.exe 2024 svchost.exe 2024 svchost.exe 2024 svchost.exe 2024 svchost.exe 2024 svchost.exe 2024 svchost.exe 2024 svchost.exe 2024 svchost.exe 2024 svchost.exe 2024 svchost.exe 2024 svchost.exe 2024 svchost.exe 2024 svchost.exe 2024 svchost.exe 2024 svchost.exe 2024 svchost.exe 2024 svchost.exe 2024 svchost.exe 2024 svchost.exe 2024 svchost.exe 2024 svchost.exe 2024 svchost.exe 2024 svchost.exe 2024 svchost.exe 2024 svchost.exe 2024 svchost.exe 2024 svchost.exe 2024 svchost.exe 2024 svchost.exe 2024 svchost.exe 2024 svchost.exe 2024 svchost.exe 2024 svchost.exe 2024 svchost.exe 2024 svchost.exe 2024 svchost.exe 2024 svchost.exe 2024 svchost.exe 2024 svchost.exe 2024 svchost.exe 2024 svchost.exe 2024 svchost.exe 2024 svchost.exe 2024 svchost.exe 2024 svchost.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2088 ab8c00477a8a142a9cfd9e08ec179b15c12905eb1f2934aa6923dd55a35755ab_NeikiAnalytics.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2088 wrote to memory of 2024 2088 ab8c00477a8a142a9cfd9e08ec179b15c12905eb1f2934aa6923dd55a35755ab_NeikiAnalytics.exe 28 PID 2088 wrote to memory of 2024 2088 ab8c00477a8a142a9cfd9e08ec179b15c12905eb1f2934aa6923dd55a35755ab_NeikiAnalytics.exe 28 PID 2088 wrote to memory of 2024 2088 ab8c00477a8a142a9cfd9e08ec179b15c12905eb1f2934aa6923dd55a35755ab_NeikiAnalytics.exe 28 PID 2088 wrote to memory of 2024 2088 ab8c00477a8a142a9cfd9e08ec179b15c12905eb1f2934aa6923dd55a35755ab_NeikiAnalytics.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\ab8c00477a8a142a9cfd9e08ec179b15c12905eb1f2934aa6923dd55a35755ab_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\ab8c00477a8a142a9cfd9e08ec179b15c12905eb1f2934aa6923dd55a35755ab_NeikiAnalytics.exe"1⤵
- Loads dropped DLL
- Modifies WinLogon
- Drops file in Windows directory
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:2088 -
C:\Windows\apppatch\svchost.exe"C:\Windows\apppatch\svchost.exe"2⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Modifies WinLogon
- Suspicious behavior: EnumeratesProcesses
PID:2024
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
150KB
MD51d66d0315631147e3f626a30d949dbf5
SHA134da746225325f0036fadf1ecbfc790da8211bb2
SHA2565e5b5dbcfbf8f9f0302e98f52c88aae4ef19e20d83f312f0a5ae7ba2d3d618fd
SHA51251cbb76ed5c1c6f68fe7c71f59b20993c3139dec7412bc854154bb93b5a60bffb25fb69a33aaa8ad002490b6e34c37dd04fd71738168908c553ea7620f80146a