Analysis

  • max time kernel
    150s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    28-06-2024 17:57

General

  • Target

    a44e534ba84544b7438305b3afcdd1a638a939f085664a0eb4cd5566efc566b8_NeikiAnalytics.exe

  • Size

    282KB

  • MD5

    17bce7ffd31ffc9e39d5676d8e1ed640

  • SHA1

    dbec80e43538e617b7aba1e3d5c9dbf3c222e36f

  • SHA256

    a44e534ba84544b7438305b3afcdd1a638a939f085664a0eb4cd5566efc566b8

  • SHA512

    7d03e6dd828c86351015a49769a5ae1a5915231af3945e6d0bb1c8f12c6549f543fed1c85484ecdc58ad17fe8b0895bd4d79789f8b2683c557a29b70625ec622

  • SSDEEP

    3072:UVqoCl/YgjxEufVU0TbTyDDalRqIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIp:UsLqdufVUNDaF4w4lMKxpfrhsK/iBKay

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 6 IoCs
  • Loads dropped DLL 6 IoCs
  • VMProtect packed file 2 IoCs

    Detects executables packed with VMProtect commercial packer.

  • Adds Run key to start application 2 TTPs 4 IoCs
  • Drops file in System32 directory 2 IoCs
  • Drops file in Windows directory 5 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 3 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 2 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 40 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a44e534ba84544b7438305b3afcdd1a638a939f085664a0eb4cd5566efc566b8_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\a44e534ba84544b7438305b3afcdd1a638a939f085664a0eb4cd5566efc566b8_NeikiAnalytics.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1108
    • \??\c:\users\admin\appdata\local\temp\a44e534ba84544b7438305b3afcdd1a638a939f085664a0eb4cd5566efc566b8_neikianalytics.exe 
      c:\users\admin\appdata\local\temp\a44e534ba84544b7438305b3afcdd1a638a939f085664a0eb4cd5566efc566b8_neikianalytics.exe 
      2⤵
      • Executes dropped EXE
      PID:2760
    • C:\Windows\Resources\Themes\icsys.icn.exe
      C:\Windows\Resources\Themes\icsys.icn.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in Windows directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2384
      • \??\c:\windows\resources\themes\explorer.exe
        c:\windows\resources\themes\explorer.exe
        3⤵
        • Modifies visiblity of hidden/system files in Explorer
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Drops file in System32 directory
        • Drops file in Windows directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2792
        • \??\c:\windows\resources\spoolsv.exe
          c:\windows\resources\spoolsv.exe SE
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Drops file in Windows directory
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:2636
          • \??\c:\windows\resources\svchost.exe
            c:\windows\resources\svchost.exe
            5⤵
            • Modifies visiblity of hidden/system files in Explorer
            • Executes dropped EXE
            • Loads dropped DLL
            • Adds Run key to start application
            • Drops file in System32 directory
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious behavior: GetForegroundWindowSpam
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:2568
            • \??\c:\windows\resources\spoolsv.exe
              c:\windows\resources\spoolsv.exe PR
              6⤵
              • Executes dropped EXE
              • Suspicious use of SetWindowsHookEx
              PID:2472
            • C:\Windows\SysWOW64\schtasks.exe
              schtasks /create /tn "svchost" /tr "c:\windows\resources\svchost.exe" /sc daily /st 17:59 /f
              6⤵
              • Scheduled Task/Job: Scheduled Task
              PID:2512
            • C:\Windows\SysWOW64\schtasks.exe
              schtasks /create /tn "svchost" /tr "c:\windows\resources\svchost.exe" /sc daily /st 18:00 /f
              6⤵
              • Scheduled Task/Job: Scheduled Task
              PID:2292
            • C:\Windows\SysWOW64\schtasks.exe
              schtasks /create /tn "svchost" /tr "c:\windows\resources\svchost.exe" /sc daily /st 18:01 /f
              6⤵
              • Scheduled Task/Job: Scheduled Task
              PID:448
        • C:\Windows\Explorer.exe
          C:\Windows\Explorer.exe
          4⤵
            PID:2708

    Network

    MITRE ATT&CK Matrix ATT&CK v13

    Execution

    Scheduled Task/Job

    1
    T1053

    Scheduled Task

    1
    T1053.005

    Persistence

    Boot or Logon Autostart Execution

    1
    T1547

    Registry Run Keys / Startup Folder

    1
    T1547.001

    Scheduled Task/Job

    1
    T1053

    Scheduled Task

    1
    T1053.005

    Privilege Escalation

    Boot or Logon Autostart Execution

    1
    T1547

    Registry Run Keys / Startup Folder

    1
    T1547.001

    Scheduled Task/Job

    1
    T1053

    Scheduled Task

    1
    T1053.005

    Defense Evasion

    Hide Artifacts

    1
    T1564

    Hidden Files and Directories

    1
    T1564.001

    Modify Registry

    2
    T1112

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Windows\Resources\Themes\explorer.exe
      Filesize

      135KB

      MD5

      87058ba0a9c4085364f972bbc6e7d1bb

      SHA1

      b2b22f39fb10aef0ad055840895b47f35ade0e46

      SHA256

      51e4113e8f7111e3e908d860b12b7afc310bb34f0e5062022efa4fa109ef6a0b

      SHA512

      033abc5d006da8e15ff1a1fcc07d5288573beefa4ae0fb8c878425b345e90023e04d109da54eec5d324a075b67f9ff84e13378a5ca62fa497e72f5e514fc3400

    • C:\Windows\Resources\spoolsv.exe
      Filesize

      135KB

      MD5

      f492bfe99681330dd1fd493eab174e9a

      SHA1

      09cb16743eb6b7addf233fe7caf769453e62a88d

      SHA256

      19c3cf9ce8047939d0a8cc0a13490c87e48a46efef72c0ff42e224eff1361b6f

      SHA512

      3f544d1fcf70369773688a730ac56a5d3cf441a9316e801157cf987608f7d5d237c8467995b689a5fbde1b1ab8d08560ad9b3c9e9d98bbc7763403e79ae32ea0

    • \Users\Admin\AppData\Local\Temp\a44e534ba84544b7438305b3afcdd1a638a939f085664a0eb4cd5566efc566b8_neikianalytics.exe 
      Filesize

      147KB

      MD5

      d3698cfcec3e1728d519ae88bca852a5

      SHA1

      08cb8b83ee9245a6703ec1a327f8572479cc0418

      SHA256

      6fbca8741926f4809e0788b6439b2a1a9922f13953641e4dfd0b77d4cbba74ad

      SHA512

      6a349b315328c15f377c9c0000f25089b122742d82018a60f4930adb300d21e2fe74bb5d6b69b89572055d6e6f27d956993729ab75708384953006fe600170c3

    • \Windows\Resources\Themes\icsys.icn.exe
      Filesize

      135KB

      MD5

      d2d60ae76b8ee4e618f057d398ea831b

      SHA1

      fe595e683918af0e1ddc9568c181e14f803a1392

      SHA256

      0d84ea404758277ed045ac3734fc6d3b3e91a67d3063832d61ad784eb8ccae06

      SHA512

      ba97c12e6b1ed055f2bb17c157b37e856c6a41539e175feb81cfab588113974f25986c893c70c43dd929bb4edf2a4bed1ad07d5f11b1bdf88d028cb9c1bc8e14

    • \Windows\Resources\svchost.exe
      Filesize

      135KB

      MD5

      c3e40deae1dffa018bb1c6ce1da092c6

      SHA1

      e5986258d845ef276d354de208b8793f61ed66f8

      SHA256

      699635d8169ca547dd80d24df94690a1ed7c2caa78b5185a1b54db2e039b8f0e

      SHA512

      a82020ced870f083865bb1dccfe7aaf373f24e227eb8f0a1385e7eae5528137e2994039172b5db46d9b07ef4d8d16efb3cd7ce586b0c71fc5e35da7bc76bcdc8

    • memory/1108-65-0x0000000000400000-0x000000000041F000-memory.dmp
      Filesize

      124KB

    • memory/1108-32-0x00000000003C0000-0x00000000003DF000-memory.dmp
      Filesize

      124KB

    • memory/1108-0-0x0000000000400000-0x000000000041F000-memory.dmp
      Filesize

      124KB

    • memory/2384-28-0x0000000000400000-0x000000000041F000-memory.dmp
      Filesize

      124KB

    • memory/2384-64-0x0000000000400000-0x000000000041F000-memory.dmp
      Filesize

      124KB

    • memory/2384-29-0x00000000002A0000-0x00000000002BF000-memory.dmp
      Filesize

      124KB

    • memory/2472-62-0x0000000000400000-0x000000000041F000-memory.dmp
      Filesize

      124KB

    • memory/2568-53-0x0000000000400000-0x000000000041F000-memory.dmp
      Filesize

      124KB

    • memory/2568-58-0x0000000000420000-0x000000000043F000-memory.dmp
      Filesize

      124KB

    • memory/2636-63-0x0000000000400000-0x000000000041F000-memory.dmp
      Filesize

      124KB

    • memory/2760-24-0x00000000740A0000-0x000000007478E000-memory.dmp
      Filesize

      6.9MB

    • memory/2760-67-0x00000000740A0000-0x000000007478E000-memory.dmp
      Filesize

      6.9MB

    • memory/2760-12-0x0000000000FD0000-0x0000000001002000-memory.dmp
      Filesize

      200KB

    • memory/2760-66-0x00000000740AE000-0x00000000740AF000-memory.dmp
      Filesize

      4KB

    • memory/2760-11-0x00000000740AE000-0x00000000740AF000-memory.dmp
      Filesize

      4KB