Analysis
-
max time kernel
148s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
30-06-2024 23:36
Static task
static1
Behavioral task
behavioral1
Sample
23734d7a5922bf74e912246b7515f09a23997b37c2ad88e2024514abd38c98c6_NeikiAnalytics.dll
Resource
win7-20240611-en
General
-
Target
23734d7a5922bf74e912246b7515f09a23997b37c2ad88e2024514abd38c98c6_NeikiAnalytics.dll
-
Size
120KB
-
MD5
aae61b49c5987663d776ade89f89f4a0
-
SHA1
06818c92b72fd06d719571d27a9fd4c49fe2c70f
-
SHA256
23734d7a5922bf74e912246b7515f09a23997b37c2ad88e2024514abd38c98c6
-
SHA512
d720eaa9a4c80b96f785e0e10b0b7192de639d97a5db4181b8266e2e4f45a83db396ff510dfe65a0f9ea9e9ffbbf0d67766655568e16312ccfc0b89146dec5dd
-
SSDEEP
1536:+kpH0vSJcPK0XpwszisLFloFQvp4dmTvkvWFYB/m/JTDuzlaVz0HIEWMsyz:FpUvSmpwQLFloCvOmTZFIlegoEK
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Signatures
-
Modifies firewall policy service 3 TTPs 3 IoCs
Processes:
f766b9f.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" f766b9f.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" f766b9f.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "1" f766b9f.exe -
Processes:
f766b9f.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" f766b9f.exe -
Processes:
f766b9f.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" f766b9f.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" f766b9f.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" f766b9f.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" f766b9f.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" f766b9f.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" f766b9f.exe -
Executes dropped EXE 3 IoCs
Processes:
f766b9f.exef766ed9.exef768527.exepid process 2980 f766b9f.exe 2684 f766ed9.exe 2016 f768527.exe -
Loads dropped DLL 6 IoCs
Processes:
rundll32.exepid process 1668 rundll32.exe 1668 rundll32.exe 1668 rundll32.exe 1668 rundll32.exe 1668 rundll32.exe 1668 rundll32.exe -
Processes:
resource yara_rule behavioral1/memory/2980-23-0x0000000000590000-0x000000000164A000-memory.dmp upx behavioral1/memory/2980-18-0x0000000000590000-0x000000000164A000-memory.dmp upx behavioral1/memory/2980-20-0x0000000000590000-0x000000000164A000-memory.dmp upx behavioral1/memory/2980-15-0x0000000000590000-0x000000000164A000-memory.dmp upx behavioral1/memory/2980-21-0x0000000000590000-0x000000000164A000-memory.dmp upx behavioral1/memory/2980-17-0x0000000000590000-0x000000000164A000-memory.dmp upx behavioral1/memory/2980-16-0x0000000000590000-0x000000000164A000-memory.dmp upx behavioral1/memory/2980-19-0x0000000000590000-0x000000000164A000-memory.dmp upx behavioral1/memory/2980-14-0x0000000000590000-0x000000000164A000-memory.dmp upx behavioral1/memory/2980-22-0x0000000000590000-0x000000000164A000-memory.dmp upx behavioral1/memory/2980-64-0x0000000000590000-0x000000000164A000-memory.dmp upx behavioral1/memory/2980-65-0x0000000000590000-0x000000000164A000-memory.dmp upx behavioral1/memory/2980-66-0x0000000000590000-0x000000000164A000-memory.dmp upx behavioral1/memory/2980-67-0x0000000000590000-0x000000000164A000-memory.dmp upx behavioral1/memory/2980-68-0x0000000000590000-0x000000000164A000-memory.dmp upx behavioral1/memory/2980-70-0x0000000000590000-0x000000000164A000-memory.dmp upx behavioral1/memory/2980-85-0x0000000000590000-0x000000000164A000-memory.dmp upx behavioral1/memory/2980-87-0x0000000000590000-0x000000000164A000-memory.dmp upx behavioral1/memory/2980-90-0x0000000000590000-0x000000000164A000-memory.dmp upx behavioral1/memory/2980-91-0x0000000000590000-0x000000000164A000-memory.dmp upx behavioral1/memory/2980-111-0x0000000000590000-0x000000000164A000-memory.dmp upx behavioral1/memory/2980-156-0x0000000000590000-0x000000000164A000-memory.dmp upx behavioral1/memory/2684-161-0x0000000000960000-0x0000000001A1A000-memory.dmp upx -
Processes:
f766b9f.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" f766b9f.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" f766b9f.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" f766b9f.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\Svc f766b9f.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" f766b9f.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" f766b9f.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" f766b9f.exe -
Processes:
f766b9f.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" f766b9f.exe -
Enumerates connected drives 3 TTPs 14 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
f766b9f.exedescription ioc process File opened (read-only) \??\J: f766b9f.exe File opened (read-only) \??\K: f766b9f.exe File opened (read-only) \??\M: f766b9f.exe File opened (read-only) \??\P: f766b9f.exe File opened (read-only) \??\R: f766b9f.exe File opened (read-only) \??\H: f766b9f.exe File opened (read-only) \??\I: f766b9f.exe File opened (read-only) \??\L: f766b9f.exe File opened (read-only) \??\N: f766b9f.exe File opened (read-only) \??\O: f766b9f.exe File opened (read-only) \??\E: f766b9f.exe File opened (read-only) \??\G: f766b9f.exe File opened (read-only) \??\Q: f766b9f.exe File opened (read-only) \??\S: f766b9f.exe -
Drops file in Windows directory 2 IoCs
Processes:
f766b9f.exedescription ioc process File created C:\Windows\f766c1b f766b9f.exe File opened for modification C:\Windows\SYSTEM.INI f766b9f.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
f766b9f.exepid process 2980 f766b9f.exe 2980 f766b9f.exe -
Suspicious use of AdjustPrivilegeToken 21 IoCs
Processes:
f766b9f.exedescription pid process Token: SeDebugPrivilege 2980 f766b9f.exe Token: SeDebugPrivilege 2980 f766b9f.exe Token: SeDebugPrivilege 2980 f766b9f.exe Token: SeDebugPrivilege 2980 f766b9f.exe Token: SeDebugPrivilege 2980 f766b9f.exe Token: SeDebugPrivilege 2980 f766b9f.exe Token: SeDebugPrivilege 2980 f766b9f.exe Token: SeDebugPrivilege 2980 f766b9f.exe Token: SeDebugPrivilege 2980 f766b9f.exe Token: SeDebugPrivilege 2980 f766b9f.exe Token: SeDebugPrivilege 2980 f766b9f.exe Token: SeDebugPrivilege 2980 f766b9f.exe Token: SeDebugPrivilege 2980 f766b9f.exe Token: SeDebugPrivilege 2980 f766b9f.exe Token: SeDebugPrivilege 2980 f766b9f.exe Token: SeDebugPrivilege 2980 f766b9f.exe Token: SeDebugPrivilege 2980 f766b9f.exe Token: SeDebugPrivilege 2980 f766b9f.exe Token: SeDebugPrivilege 2980 f766b9f.exe Token: SeDebugPrivilege 2980 f766b9f.exe Token: SeDebugPrivilege 2980 f766b9f.exe -
Suspicious use of WriteProcessMemory 33 IoCs
Processes:
rundll32.exerundll32.exef766b9f.exedescription pid process target process PID 2228 wrote to memory of 1668 2228 rundll32.exe rundll32.exe PID 2228 wrote to memory of 1668 2228 rundll32.exe rundll32.exe PID 2228 wrote to memory of 1668 2228 rundll32.exe rundll32.exe PID 2228 wrote to memory of 1668 2228 rundll32.exe rundll32.exe PID 2228 wrote to memory of 1668 2228 rundll32.exe rundll32.exe PID 2228 wrote to memory of 1668 2228 rundll32.exe rundll32.exe PID 2228 wrote to memory of 1668 2228 rundll32.exe rundll32.exe PID 1668 wrote to memory of 2980 1668 rundll32.exe f766b9f.exe PID 1668 wrote to memory of 2980 1668 rundll32.exe f766b9f.exe PID 1668 wrote to memory of 2980 1668 rundll32.exe f766b9f.exe PID 1668 wrote to memory of 2980 1668 rundll32.exe f766b9f.exe PID 2980 wrote to memory of 1212 2980 f766b9f.exe taskhost.exe PID 2980 wrote to memory of 1292 2980 f766b9f.exe Dwm.exe PID 2980 wrote to memory of 1348 2980 f766b9f.exe Explorer.EXE PID 2980 wrote to memory of 2044 2980 f766b9f.exe DllHost.exe PID 2980 wrote to memory of 2228 2980 f766b9f.exe rundll32.exe PID 2980 wrote to memory of 1668 2980 f766b9f.exe rundll32.exe PID 2980 wrote to memory of 1668 2980 f766b9f.exe rundll32.exe PID 1668 wrote to memory of 2684 1668 rundll32.exe f766ed9.exe PID 1668 wrote to memory of 2684 1668 rundll32.exe f766ed9.exe PID 1668 wrote to memory of 2684 1668 rundll32.exe f766ed9.exe PID 1668 wrote to memory of 2684 1668 rundll32.exe f766ed9.exe PID 1668 wrote to memory of 2016 1668 rundll32.exe f768527.exe PID 1668 wrote to memory of 2016 1668 rundll32.exe f768527.exe PID 1668 wrote to memory of 2016 1668 rundll32.exe f768527.exe PID 1668 wrote to memory of 2016 1668 rundll32.exe f768527.exe PID 2980 wrote to memory of 1212 2980 f766b9f.exe taskhost.exe PID 2980 wrote to memory of 1292 2980 f766b9f.exe Dwm.exe PID 2980 wrote to memory of 1348 2980 f766b9f.exe Explorer.EXE PID 2980 wrote to memory of 2684 2980 f766b9f.exe f766ed9.exe PID 2980 wrote to memory of 2684 2980 f766b9f.exe f766ed9.exe PID 2980 wrote to memory of 2016 2980 f766b9f.exe f768527.exe PID 2980 wrote to memory of 2016 2980 f766b9f.exe f768527.exe -
System policy modification 1 TTPs 1 IoCs
Processes:
f766b9f.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" f766b9f.exe
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\23734d7a5922bf74e912246b7515f09a23997b37c2ad88e2024514abd38c98c6_NeikiAnalytics.dll,#12⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\23734d7a5922bf74e912246b7515f09a23997b37c2ad88e2024514abd38c98c6_NeikiAnalytics.dll,#13⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\f766b9f.exeC:\Users\Admin\AppData\Local\Temp\f766b9f.exe4⤵
- Modifies firewall policy service
- UAC bypass
- Windows security bypass
- Executes dropped EXE
- Windows security modification
- Checks whether UAC is enabled
- Enumerates connected drives
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
-
C:\Users\Admin\AppData\Local\Temp\f766ed9.exeC:\Users\Admin\AppData\Local\Temp\f766ed9.exe4⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\f768527.exeC:\Users\Admin\AppData\Local\Temp\f768527.exe4⤵
- Executes dropped EXE
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Privilege Escalation
Create or Modify System Process
1Windows Service
1Abuse Elevation Control Mechanism
1Bypass User Account Control
1Defense Evasion
Modify Registry
5Impair Defenses
4Disable or Modify Tools
3Disable or Modify System Firewall
1Abuse Elevation Control Mechanism
1Bypass User Account Control
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\f766b9f.exeFilesize
97KB
MD5032bcefa3c10fcbde64a0f6dd8a86009
SHA1c03fc6e34eaaaff97f3135036d6fcf0c55ae8d83
SHA256e44b83ee1afe225ae08b9349ad5571f685c3f9ea3561f2396933b0931bd0442c
SHA51228acb88a5b66883dda129c35946c7c8e4c2e87ff83fd99917380f83c2454461cdd0ee2d99213d37dfb7d5669d42f18aec10653695f3f4a62e4a77b9b247f4f80
-
memory/1212-29-0x0000000000490000-0x0000000000492000-memory.dmpFilesize
8KB
-
memory/1668-60-0x0000000000790000-0x00000000007A2000-memory.dmpFilesize
72KB
-
memory/1668-8-0x00000000001F0000-0x0000000000202000-memory.dmpFilesize
72KB
-
memory/1668-1-0x0000000010000000-0x0000000010020000-memory.dmpFilesize
128KB
-
memory/1668-48-0x0000000000750000-0x0000000000751000-memory.dmpFilesize
4KB
-
memory/1668-79-0x0000000000680000-0x0000000000682000-memory.dmpFilesize
8KB
-
memory/1668-84-0x00000000001F0000-0x00000000001F2000-memory.dmpFilesize
8KB
-
memory/1668-39-0x0000000000750000-0x0000000000751000-memory.dmpFilesize
4KB
-
memory/1668-38-0x0000000000680000-0x0000000000682000-memory.dmpFilesize
8KB
-
memory/1668-61-0x0000000000680000-0x0000000000682000-memory.dmpFilesize
8KB
-
memory/1668-82-0x00000000007B0000-0x00000000007C2000-memory.dmpFilesize
72KB
-
memory/1668-58-0x0000000000680000-0x0000000000682000-memory.dmpFilesize
8KB
-
memory/1668-9-0x00000000001F0000-0x0000000000202000-memory.dmpFilesize
72KB
-
memory/2016-106-0x00000000002B0000-0x00000000002B1000-memory.dmpFilesize
4KB
-
memory/2016-109-0x0000000000260000-0x0000000000262000-memory.dmpFilesize
8KB
-
memory/2016-107-0x0000000000260000-0x0000000000262000-memory.dmpFilesize
8KB
-
memory/2016-83-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/2016-167-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/2684-108-0x0000000000260000-0x0000000000262000-memory.dmpFilesize
8KB
-
memory/2684-102-0x00000000002B0000-0x00000000002B1000-memory.dmpFilesize
4KB
-
memory/2684-63-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/2684-101-0x0000000000260000-0x0000000000262000-memory.dmpFilesize
8KB
-
memory/2684-161-0x0000000000960000-0x0000000001A1A000-memory.dmpFilesize
16.7MB
-
memory/2684-163-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/2980-17-0x0000000000590000-0x000000000164A000-memory.dmpFilesize
16.7MB
-
memory/2980-90-0x0000000000590000-0x000000000164A000-memory.dmpFilesize
16.7MB
-
memory/2980-59-0x0000000000480000-0x0000000000482000-memory.dmpFilesize
8KB
-
memory/2980-66-0x0000000000590000-0x000000000164A000-memory.dmpFilesize
16.7MB
-
memory/2980-67-0x0000000000590000-0x000000000164A000-memory.dmpFilesize
16.7MB
-
memory/2980-68-0x0000000000590000-0x000000000164A000-memory.dmpFilesize
16.7MB
-
memory/2980-70-0x0000000000590000-0x000000000164A000-memory.dmpFilesize
16.7MB
-
memory/2980-65-0x0000000000590000-0x000000000164A000-memory.dmpFilesize
16.7MB
-
memory/2980-64-0x0000000000590000-0x000000000164A000-memory.dmpFilesize
16.7MB
-
memory/2980-85-0x0000000000590000-0x000000000164A000-memory.dmpFilesize
16.7MB
-
memory/2980-22-0x0000000000590000-0x000000000164A000-memory.dmpFilesize
16.7MB
-
memory/2980-14-0x0000000000590000-0x000000000164A000-memory.dmpFilesize
16.7MB
-
memory/2980-87-0x0000000000590000-0x000000000164A000-memory.dmpFilesize
16.7MB
-
memory/2980-49-0x00000000016D0000-0x00000000016D1000-memory.dmpFilesize
4KB
-
memory/2980-91-0x0000000000590000-0x000000000164A000-memory.dmpFilesize
16.7MB
-
memory/2980-19-0x0000000000590000-0x000000000164A000-memory.dmpFilesize
16.7MB
-
memory/2980-16-0x0000000000590000-0x000000000164A000-memory.dmpFilesize
16.7MB
-
memory/2980-11-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/2980-21-0x0000000000590000-0x000000000164A000-memory.dmpFilesize
16.7MB
-
memory/2980-15-0x0000000000590000-0x000000000164A000-memory.dmpFilesize
16.7MB
-
memory/2980-51-0x0000000000480000-0x0000000000482000-memory.dmpFilesize
8KB
-
memory/2980-111-0x0000000000590000-0x000000000164A000-memory.dmpFilesize
16.7MB
-
memory/2980-124-0x0000000000480000-0x0000000000482000-memory.dmpFilesize
8KB
-
memory/2980-156-0x0000000000590000-0x000000000164A000-memory.dmpFilesize
16.7MB
-
memory/2980-157-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/2980-20-0x0000000000590000-0x000000000164A000-memory.dmpFilesize
16.7MB
-
memory/2980-18-0x0000000000590000-0x000000000164A000-memory.dmpFilesize
16.7MB
-
memory/2980-23-0x0000000000590000-0x000000000164A000-memory.dmpFilesize
16.7MB