Analysis
-
max time kernel
150s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
28-06-2024 17:57
Static task
static1
Behavioral task
behavioral1
Sample
a44e534ba84544b7438305b3afcdd1a638a939f085664a0eb4cd5566efc566b8_NeikiAnalytics.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
a44e534ba84544b7438305b3afcdd1a638a939f085664a0eb4cd5566efc566b8_NeikiAnalytics.exe
Resource
win10v2004-20240611-en
General
-
Target
a44e534ba84544b7438305b3afcdd1a638a939f085664a0eb4cd5566efc566b8_NeikiAnalytics.exe
-
Size
282KB
-
MD5
17bce7ffd31ffc9e39d5676d8e1ed640
-
SHA1
dbec80e43538e617b7aba1e3d5c9dbf3c222e36f
-
SHA256
a44e534ba84544b7438305b3afcdd1a638a939f085664a0eb4cd5566efc566b8
-
SHA512
7d03e6dd828c86351015a49769a5ae1a5915231af3945e6d0bb1c8f12c6549f543fed1c85484ecdc58ad17fe8b0895bd4d79789f8b2683c557a29b70625ec622
-
SSDEEP
3072:UVqoCl/YgjxEufVU0TbTyDDalRqIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIp:UsLqdufVUNDaF4w4lMKxpfrhsK/iBKay
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
Processes:
explorer.exesvchost.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" svchost.exe -
Executes dropped EXE 6 IoCs
Processes:
a44e534ba84544b7438305b3afcdd1a638a939f085664a0eb4cd5566efc566b8_neikianalytics.exe icsys.icn.exeexplorer.exespoolsv.exesvchost.exespoolsv.exepid process 2760 a44e534ba84544b7438305b3afcdd1a638a939f085664a0eb4cd5566efc566b8_neikianalytics.exe 2384 icsys.icn.exe 2792 explorer.exe 2636 spoolsv.exe 2568 svchost.exe 2472 spoolsv.exe -
Loads dropped DLL 6 IoCs
Processes:
a44e534ba84544b7438305b3afcdd1a638a939f085664a0eb4cd5566efc566b8_NeikiAnalytics.exeicsys.icn.exeexplorer.exespoolsv.exesvchost.exepid process 1108 a44e534ba84544b7438305b3afcdd1a638a939f085664a0eb4cd5566efc566b8_NeikiAnalytics.exe 1108 a44e534ba84544b7438305b3afcdd1a638a939f085664a0eb4cd5566efc566b8_NeikiAnalytics.exe 2384 icsys.icn.exe 2792 explorer.exe 2636 spoolsv.exe 2568 svchost.exe -
Processes:
resource yara_rule \Users\Admin\AppData\Local\Temp\a44e534ba84544b7438305b3afcdd1a638a939f085664a0eb4cd5566efc566b8_neikianalytics.exe vmprotect behavioral1/memory/2760-12-0x0000000000FD0000-0x0000000001002000-memory.dmp vmprotect -
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
explorer.exesvchost.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\resources\\themes\\explorer.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\resources\\svchost.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\resources\\themes\\explorer.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\resources\\svchost.exe RO" svchost.exe -
Drops file in System32 directory 2 IoCs
Processes:
explorer.exesvchost.exedescription ioc process File opened for modification C:\Windows\SysWOW64\explorer.exe explorer.exe File opened for modification C:\Windows\SysWOW64\explorer.exe svchost.exe -
Drops file in Windows directory 5 IoCs
Processes:
explorer.exea44e534ba84544b7438305b3afcdd1a638a939f085664a0eb4cd5566efc566b8_NeikiAnalytics.exeicsys.icn.exespoolsv.exedescription ioc process File opened for modification C:\Windows\Resources\tjud.exe explorer.exe File opened for modification C:\Windows\Resources\Themes\icsys.icn.exe a44e534ba84544b7438305b3afcdd1a638a939f085664a0eb4cd5566efc566b8_NeikiAnalytics.exe File opened for modification \??\c:\windows\resources\themes\explorer.exe icsys.icn.exe File opened for modification \??\c:\windows\resources\spoolsv.exe explorer.exe File opened for modification \??\c:\windows\resources\svchost.exe spoolsv.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exeschtasks.exepid process 2512 schtasks.exe 2292 schtasks.exe 448 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
a44e534ba84544b7438305b3afcdd1a638a939f085664a0eb4cd5566efc566b8_NeikiAnalytics.exeicsys.icn.exeexplorer.exesvchost.exepid process 1108 a44e534ba84544b7438305b3afcdd1a638a939f085664a0eb4cd5566efc566b8_NeikiAnalytics.exe 1108 a44e534ba84544b7438305b3afcdd1a638a939f085664a0eb4cd5566efc566b8_NeikiAnalytics.exe 1108 a44e534ba84544b7438305b3afcdd1a638a939f085664a0eb4cd5566efc566b8_NeikiAnalytics.exe 1108 a44e534ba84544b7438305b3afcdd1a638a939f085664a0eb4cd5566efc566b8_NeikiAnalytics.exe 1108 a44e534ba84544b7438305b3afcdd1a638a939f085664a0eb4cd5566efc566b8_NeikiAnalytics.exe 1108 a44e534ba84544b7438305b3afcdd1a638a939f085664a0eb4cd5566efc566b8_NeikiAnalytics.exe 1108 a44e534ba84544b7438305b3afcdd1a638a939f085664a0eb4cd5566efc566b8_NeikiAnalytics.exe 1108 a44e534ba84544b7438305b3afcdd1a638a939f085664a0eb4cd5566efc566b8_NeikiAnalytics.exe 1108 a44e534ba84544b7438305b3afcdd1a638a939f085664a0eb4cd5566efc566b8_NeikiAnalytics.exe 1108 a44e534ba84544b7438305b3afcdd1a638a939f085664a0eb4cd5566efc566b8_NeikiAnalytics.exe 1108 a44e534ba84544b7438305b3afcdd1a638a939f085664a0eb4cd5566efc566b8_NeikiAnalytics.exe 1108 a44e534ba84544b7438305b3afcdd1a638a939f085664a0eb4cd5566efc566b8_NeikiAnalytics.exe 1108 a44e534ba84544b7438305b3afcdd1a638a939f085664a0eb4cd5566efc566b8_NeikiAnalytics.exe 1108 a44e534ba84544b7438305b3afcdd1a638a939f085664a0eb4cd5566efc566b8_NeikiAnalytics.exe 1108 a44e534ba84544b7438305b3afcdd1a638a939f085664a0eb4cd5566efc566b8_NeikiAnalytics.exe 1108 a44e534ba84544b7438305b3afcdd1a638a939f085664a0eb4cd5566efc566b8_NeikiAnalytics.exe 2384 icsys.icn.exe 2384 icsys.icn.exe 2384 icsys.icn.exe 2384 icsys.icn.exe 2384 icsys.icn.exe 2384 icsys.icn.exe 2384 icsys.icn.exe 2384 icsys.icn.exe 2384 icsys.icn.exe 2384 icsys.icn.exe 2384 icsys.icn.exe 2384 icsys.icn.exe 2384 icsys.icn.exe 2384 icsys.icn.exe 2384 icsys.icn.exe 2384 icsys.icn.exe 2384 icsys.icn.exe 2792 explorer.exe 2792 explorer.exe 2792 explorer.exe 2792 explorer.exe 2792 explorer.exe 2792 explorer.exe 2792 explorer.exe 2792 explorer.exe 2792 explorer.exe 2792 explorer.exe 2792 explorer.exe 2792 explorer.exe 2792 explorer.exe 2792 explorer.exe 2792 explorer.exe 2792 explorer.exe 2568 svchost.exe 2568 svchost.exe 2568 svchost.exe 2568 svchost.exe 2568 svchost.exe 2568 svchost.exe 2568 svchost.exe 2568 svchost.exe 2568 svchost.exe 2568 svchost.exe 2568 svchost.exe 2568 svchost.exe 2568 svchost.exe 2568 svchost.exe 2568 svchost.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
Processes:
explorer.exesvchost.exepid process 2792 explorer.exe 2568 svchost.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
Processes:
a44e534ba84544b7438305b3afcdd1a638a939f085664a0eb4cd5566efc566b8_NeikiAnalytics.exeicsys.icn.exeexplorer.exespoolsv.exesvchost.exespoolsv.exepid process 1108 a44e534ba84544b7438305b3afcdd1a638a939f085664a0eb4cd5566efc566b8_NeikiAnalytics.exe 1108 a44e534ba84544b7438305b3afcdd1a638a939f085664a0eb4cd5566efc566b8_NeikiAnalytics.exe 2384 icsys.icn.exe 2384 icsys.icn.exe 2792 explorer.exe 2792 explorer.exe 2636 spoolsv.exe 2636 spoolsv.exe 2568 svchost.exe 2568 svchost.exe 2472 spoolsv.exe 2472 spoolsv.exe -
Suspicious use of WriteProcessMemory 40 IoCs
Processes:
a44e534ba84544b7438305b3afcdd1a638a939f085664a0eb4cd5566efc566b8_NeikiAnalytics.exeicsys.icn.exeexplorer.exespoolsv.exesvchost.exedescription pid process target process PID 1108 wrote to memory of 2760 1108 a44e534ba84544b7438305b3afcdd1a638a939f085664a0eb4cd5566efc566b8_NeikiAnalytics.exe a44e534ba84544b7438305b3afcdd1a638a939f085664a0eb4cd5566efc566b8_neikianalytics.exe PID 1108 wrote to memory of 2760 1108 a44e534ba84544b7438305b3afcdd1a638a939f085664a0eb4cd5566efc566b8_NeikiAnalytics.exe a44e534ba84544b7438305b3afcdd1a638a939f085664a0eb4cd5566efc566b8_neikianalytics.exe PID 1108 wrote to memory of 2760 1108 a44e534ba84544b7438305b3afcdd1a638a939f085664a0eb4cd5566efc566b8_NeikiAnalytics.exe a44e534ba84544b7438305b3afcdd1a638a939f085664a0eb4cd5566efc566b8_neikianalytics.exe PID 1108 wrote to memory of 2760 1108 a44e534ba84544b7438305b3afcdd1a638a939f085664a0eb4cd5566efc566b8_NeikiAnalytics.exe a44e534ba84544b7438305b3afcdd1a638a939f085664a0eb4cd5566efc566b8_neikianalytics.exe PID 1108 wrote to memory of 2384 1108 a44e534ba84544b7438305b3afcdd1a638a939f085664a0eb4cd5566efc566b8_NeikiAnalytics.exe icsys.icn.exe PID 1108 wrote to memory of 2384 1108 a44e534ba84544b7438305b3afcdd1a638a939f085664a0eb4cd5566efc566b8_NeikiAnalytics.exe icsys.icn.exe PID 1108 wrote to memory of 2384 1108 a44e534ba84544b7438305b3afcdd1a638a939f085664a0eb4cd5566efc566b8_NeikiAnalytics.exe icsys.icn.exe PID 1108 wrote to memory of 2384 1108 a44e534ba84544b7438305b3afcdd1a638a939f085664a0eb4cd5566efc566b8_NeikiAnalytics.exe icsys.icn.exe PID 2384 wrote to memory of 2792 2384 icsys.icn.exe explorer.exe PID 2384 wrote to memory of 2792 2384 icsys.icn.exe explorer.exe PID 2384 wrote to memory of 2792 2384 icsys.icn.exe explorer.exe PID 2384 wrote to memory of 2792 2384 icsys.icn.exe explorer.exe PID 2792 wrote to memory of 2636 2792 explorer.exe spoolsv.exe PID 2792 wrote to memory of 2636 2792 explorer.exe spoolsv.exe PID 2792 wrote to memory of 2636 2792 explorer.exe spoolsv.exe PID 2792 wrote to memory of 2636 2792 explorer.exe spoolsv.exe PID 2636 wrote to memory of 2568 2636 spoolsv.exe svchost.exe PID 2636 wrote to memory of 2568 2636 spoolsv.exe svchost.exe PID 2636 wrote to memory of 2568 2636 spoolsv.exe svchost.exe PID 2636 wrote to memory of 2568 2636 spoolsv.exe svchost.exe PID 2568 wrote to memory of 2472 2568 svchost.exe spoolsv.exe PID 2568 wrote to memory of 2472 2568 svchost.exe spoolsv.exe PID 2568 wrote to memory of 2472 2568 svchost.exe spoolsv.exe PID 2568 wrote to memory of 2472 2568 svchost.exe spoolsv.exe PID 2792 wrote to memory of 2708 2792 explorer.exe Explorer.exe PID 2792 wrote to memory of 2708 2792 explorer.exe Explorer.exe PID 2792 wrote to memory of 2708 2792 explorer.exe Explorer.exe PID 2792 wrote to memory of 2708 2792 explorer.exe Explorer.exe PID 2568 wrote to memory of 2512 2568 svchost.exe schtasks.exe PID 2568 wrote to memory of 2512 2568 svchost.exe schtasks.exe PID 2568 wrote to memory of 2512 2568 svchost.exe schtasks.exe PID 2568 wrote to memory of 2512 2568 svchost.exe schtasks.exe PID 2568 wrote to memory of 2292 2568 svchost.exe schtasks.exe PID 2568 wrote to memory of 2292 2568 svchost.exe schtasks.exe PID 2568 wrote to memory of 2292 2568 svchost.exe schtasks.exe PID 2568 wrote to memory of 2292 2568 svchost.exe schtasks.exe PID 2568 wrote to memory of 448 2568 svchost.exe schtasks.exe PID 2568 wrote to memory of 448 2568 svchost.exe schtasks.exe PID 2568 wrote to memory of 448 2568 svchost.exe schtasks.exe PID 2568 wrote to memory of 448 2568 svchost.exe schtasks.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\a44e534ba84544b7438305b3afcdd1a638a939f085664a0eb4cd5566efc566b8_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\a44e534ba84544b7438305b3afcdd1a638a939f085664a0eb4cd5566efc566b8_NeikiAnalytics.exe"1⤵
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
\??\c:\users\admin\appdata\local\temp\a44e534ba84544b7438305b3afcdd1a638a939f085664a0eb4cd5566efc566b8_neikianalytics.exec:\users\admin\appdata\local\temp\a44e534ba84544b7438305b3afcdd1a638a939f085664a0eb4cd5566efc566b8_neikianalytics.exe2⤵
- Executes dropped EXE
-
C:\Windows\Resources\Themes\icsys.icn.exeC:\Windows\Resources\Themes\icsys.icn.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
\??\c:\windows\resources\themes\explorer.exec:\windows\resources\themes\explorer.exe3⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
\??\c:\windows\resources\spoolsv.exec:\windows\resources\spoolsv.exe SE4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
\??\c:\windows\resources\svchost.exec:\windows\resources\svchost.exe5⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
\??\c:\windows\resources\spoolsv.exec:\windows\resources\spoolsv.exe PR6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn "svchost" /tr "c:\windows\resources\svchost.exe" /sc daily /st 17:59 /f6⤵
- Scheduled Task/Job: Scheduled Task
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn "svchost" /tr "c:\windows\resources\svchost.exe" /sc daily /st 18:00 /f6⤵
- Scheduled Task/Job: Scheduled Task
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn "svchost" /tr "c:\windows\resources\svchost.exe" /sc daily /st 18:01 /f6⤵
- Scheduled Task/Job: Scheduled Task
-
C:\Windows\Explorer.exeC:\Windows\Explorer.exe4⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Windows\Resources\Themes\explorer.exeFilesize
135KB
MD587058ba0a9c4085364f972bbc6e7d1bb
SHA1b2b22f39fb10aef0ad055840895b47f35ade0e46
SHA25651e4113e8f7111e3e908d860b12b7afc310bb34f0e5062022efa4fa109ef6a0b
SHA512033abc5d006da8e15ff1a1fcc07d5288573beefa4ae0fb8c878425b345e90023e04d109da54eec5d324a075b67f9ff84e13378a5ca62fa497e72f5e514fc3400
-
C:\Windows\Resources\spoolsv.exeFilesize
135KB
MD5f492bfe99681330dd1fd493eab174e9a
SHA109cb16743eb6b7addf233fe7caf769453e62a88d
SHA25619c3cf9ce8047939d0a8cc0a13490c87e48a46efef72c0ff42e224eff1361b6f
SHA5123f544d1fcf70369773688a730ac56a5d3cf441a9316e801157cf987608f7d5d237c8467995b689a5fbde1b1ab8d08560ad9b3c9e9d98bbc7763403e79ae32ea0
-
\Users\Admin\AppData\Local\Temp\a44e534ba84544b7438305b3afcdd1a638a939f085664a0eb4cd5566efc566b8_neikianalytics.exeFilesize
147KB
MD5d3698cfcec3e1728d519ae88bca852a5
SHA108cb8b83ee9245a6703ec1a327f8572479cc0418
SHA2566fbca8741926f4809e0788b6439b2a1a9922f13953641e4dfd0b77d4cbba74ad
SHA5126a349b315328c15f377c9c0000f25089b122742d82018a60f4930adb300d21e2fe74bb5d6b69b89572055d6e6f27d956993729ab75708384953006fe600170c3
-
\Windows\Resources\Themes\icsys.icn.exeFilesize
135KB
MD5d2d60ae76b8ee4e618f057d398ea831b
SHA1fe595e683918af0e1ddc9568c181e14f803a1392
SHA2560d84ea404758277ed045ac3734fc6d3b3e91a67d3063832d61ad784eb8ccae06
SHA512ba97c12e6b1ed055f2bb17c157b37e856c6a41539e175feb81cfab588113974f25986c893c70c43dd929bb4edf2a4bed1ad07d5f11b1bdf88d028cb9c1bc8e14
-
\Windows\Resources\svchost.exeFilesize
135KB
MD5c3e40deae1dffa018bb1c6ce1da092c6
SHA1e5986258d845ef276d354de208b8793f61ed66f8
SHA256699635d8169ca547dd80d24df94690a1ed7c2caa78b5185a1b54db2e039b8f0e
SHA512a82020ced870f083865bb1dccfe7aaf373f24e227eb8f0a1385e7eae5528137e2994039172b5db46d9b07ef4d8d16efb3cd7ce586b0c71fc5e35da7bc76bcdc8
-
memory/1108-65-0x0000000000400000-0x000000000041F000-memory.dmpFilesize
124KB
-
memory/1108-32-0x00000000003C0000-0x00000000003DF000-memory.dmpFilesize
124KB
-
memory/1108-0-0x0000000000400000-0x000000000041F000-memory.dmpFilesize
124KB
-
memory/2384-28-0x0000000000400000-0x000000000041F000-memory.dmpFilesize
124KB
-
memory/2384-64-0x0000000000400000-0x000000000041F000-memory.dmpFilesize
124KB
-
memory/2384-29-0x00000000002A0000-0x00000000002BF000-memory.dmpFilesize
124KB
-
memory/2472-62-0x0000000000400000-0x000000000041F000-memory.dmpFilesize
124KB
-
memory/2568-53-0x0000000000400000-0x000000000041F000-memory.dmpFilesize
124KB
-
memory/2568-58-0x0000000000420000-0x000000000043F000-memory.dmpFilesize
124KB
-
memory/2636-63-0x0000000000400000-0x000000000041F000-memory.dmpFilesize
124KB
-
memory/2760-24-0x00000000740A0000-0x000000007478E000-memory.dmpFilesize
6.9MB
-
memory/2760-67-0x00000000740A0000-0x000000007478E000-memory.dmpFilesize
6.9MB
-
memory/2760-12-0x0000000000FD0000-0x0000000001002000-memory.dmpFilesize
200KB
-
memory/2760-66-0x00000000740AE000-0x00000000740AF000-memory.dmpFilesize
4KB
-
memory/2760-11-0x00000000740AE000-0x00000000740AF000-memory.dmpFilesize
4KB