Analysis
-
max time kernel
148s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
01-07-2024 03:18
Behavioral task
behavioral1
Sample
317c57e4052e0e8898e68b2ae9118855e953c2efb6b2ea841e4d2d5e16d7f7b9_NeikiAnalytics.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
317c57e4052e0e8898e68b2ae9118855e953c2efb6b2ea841e4d2d5e16d7f7b9_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
317c57e4052e0e8898e68b2ae9118855e953c2efb6b2ea841e4d2d5e16d7f7b9_NeikiAnalytics.exe
-
Size
324KB
-
MD5
f60edabee0df313d9bd92cbec28e5b90
-
SHA1
a786c8938c83656ed690c2a104ca4cd4838065ab
-
SHA256
317c57e4052e0e8898e68b2ae9118855e953c2efb6b2ea841e4d2d5e16d7f7b9
-
SHA512
f043922cd08e6aeb160f4022a60d222d6567cff74c3c8cec952ef293412c70ae0243deac1b07781e96be5124e33cac7294fb87af89f956541040a902995c4918
-
SSDEEP
768:Ohm7Omh+D1DT3QVYA82vJ6lEbFEPG9pHZ6vOChSzYi34Npp6uBRpeT:OhALh+g+EF19VZ6vOCw5oNpp65T
Malware Config
Extracted
xworm
5.0
127.0.0.1:6414
fixed-execution.gl.at.ply.gg:6414
0eMY5b21feXBm85M
-
Install_directory
%Temp%
-
install_file
Discord.exe
Signatures
-
Detect Xworm Payload 4 IoCs
Processes:
resource yara_rule behavioral1/memory/2068-1-0x0000000000240000-0x0000000000298000-memory.dmp family_xworm C:\Users\Admin\AppData\Local\Temp\Discord.exe family_xworm behavioral1/memory/2568-36-0x0000000001000000-0x0000000001058000-memory.dmp family_xworm behavioral1/memory/1104-39-0x0000000000280000-0x00000000002D8000-memory.dmp family_xworm -
Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
Processes:
powershell.exepowershell.exepowershell.exepowershell.exepid process 2628 powershell.exe 2472 powershell.exe 2876 powershell.exe 2356 powershell.exe -
Drops startup file 2 IoCs
Processes:
317c57e4052e0e8898e68b2ae9118855e953c2efb6b2ea841e4d2d5e16d7f7b9_NeikiAnalytics.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Discord.lnk 317c57e4052e0e8898e68b2ae9118855e953c2efb6b2ea841e4d2d5e16d7f7b9_NeikiAnalytics.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Discord.lnk 317c57e4052e0e8898e68b2ae9118855e953c2efb6b2ea841e4d2d5e16d7f7b9_NeikiAnalytics.exe -
Executes dropped EXE 2 IoCs
Processes:
Discord.exeDiscord.exepid process 2568 Discord.exe 1104 Discord.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
317c57e4052e0e8898e68b2ae9118855e953c2efb6b2ea841e4d2d5e16d7f7b9_NeikiAnalytics.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Windows\CurrentVersion\Run\Discord = "C:\\Users\\Admin\\AppData\\Local\\Temp\\Discord.exe" 317c57e4052e0e8898e68b2ae9118855e953c2efb6b2ea841e4d2d5e16d7f7b9_NeikiAnalytics.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 4 ip-api.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 5 IoCs
Processes:
powershell.exepowershell.exepowershell.exepowershell.exe317c57e4052e0e8898e68b2ae9118855e953c2efb6b2ea841e4d2d5e16d7f7b9_NeikiAnalytics.exepid process 2628 powershell.exe 2472 powershell.exe 2876 powershell.exe 2356 powershell.exe 2068 317c57e4052e0e8898e68b2ae9118855e953c2efb6b2ea841e4d2d5e16d7f7b9_NeikiAnalytics.exe -
Suspicious use of AdjustPrivilegeToken 8 IoCs
Processes:
317c57e4052e0e8898e68b2ae9118855e953c2efb6b2ea841e4d2d5e16d7f7b9_NeikiAnalytics.exepowershell.exepowershell.exepowershell.exepowershell.exeDiscord.exeDiscord.exedescription pid process Token: SeDebugPrivilege 2068 317c57e4052e0e8898e68b2ae9118855e953c2efb6b2ea841e4d2d5e16d7f7b9_NeikiAnalytics.exe Token: SeDebugPrivilege 2628 powershell.exe Token: SeDebugPrivilege 2472 powershell.exe Token: SeDebugPrivilege 2876 powershell.exe Token: SeDebugPrivilege 2356 powershell.exe Token: SeDebugPrivilege 2068 317c57e4052e0e8898e68b2ae9118855e953c2efb6b2ea841e4d2d5e16d7f7b9_NeikiAnalytics.exe Token: SeDebugPrivilege 2568 Discord.exe Token: SeDebugPrivilege 1104 Discord.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
317c57e4052e0e8898e68b2ae9118855e953c2efb6b2ea841e4d2d5e16d7f7b9_NeikiAnalytics.exepid process 2068 317c57e4052e0e8898e68b2ae9118855e953c2efb6b2ea841e4d2d5e16d7f7b9_NeikiAnalytics.exe -
Suspicious use of WriteProcessMemory 21 IoCs
Processes:
317c57e4052e0e8898e68b2ae9118855e953c2efb6b2ea841e4d2d5e16d7f7b9_NeikiAnalytics.exetaskeng.exedescription pid process target process PID 2068 wrote to memory of 2628 2068 317c57e4052e0e8898e68b2ae9118855e953c2efb6b2ea841e4d2d5e16d7f7b9_NeikiAnalytics.exe powershell.exe PID 2068 wrote to memory of 2628 2068 317c57e4052e0e8898e68b2ae9118855e953c2efb6b2ea841e4d2d5e16d7f7b9_NeikiAnalytics.exe powershell.exe PID 2068 wrote to memory of 2628 2068 317c57e4052e0e8898e68b2ae9118855e953c2efb6b2ea841e4d2d5e16d7f7b9_NeikiAnalytics.exe powershell.exe PID 2068 wrote to memory of 2472 2068 317c57e4052e0e8898e68b2ae9118855e953c2efb6b2ea841e4d2d5e16d7f7b9_NeikiAnalytics.exe powershell.exe PID 2068 wrote to memory of 2472 2068 317c57e4052e0e8898e68b2ae9118855e953c2efb6b2ea841e4d2d5e16d7f7b9_NeikiAnalytics.exe powershell.exe PID 2068 wrote to memory of 2472 2068 317c57e4052e0e8898e68b2ae9118855e953c2efb6b2ea841e4d2d5e16d7f7b9_NeikiAnalytics.exe powershell.exe PID 2068 wrote to memory of 2876 2068 317c57e4052e0e8898e68b2ae9118855e953c2efb6b2ea841e4d2d5e16d7f7b9_NeikiAnalytics.exe powershell.exe PID 2068 wrote to memory of 2876 2068 317c57e4052e0e8898e68b2ae9118855e953c2efb6b2ea841e4d2d5e16d7f7b9_NeikiAnalytics.exe powershell.exe PID 2068 wrote to memory of 2876 2068 317c57e4052e0e8898e68b2ae9118855e953c2efb6b2ea841e4d2d5e16d7f7b9_NeikiAnalytics.exe powershell.exe PID 2068 wrote to memory of 2356 2068 317c57e4052e0e8898e68b2ae9118855e953c2efb6b2ea841e4d2d5e16d7f7b9_NeikiAnalytics.exe powershell.exe PID 2068 wrote to memory of 2356 2068 317c57e4052e0e8898e68b2ae9118855e953c2efb6b2ea841e4d2d5e16d7f7b9_NeikiAnalytics.exe powershell.exe PID 2068 wrote to memory of 2356 2068 317c57e4052e0e8898e68b2ae9118855e953c2efb6b2ea841e4d2d5e16d7f7b9_NeikiAnalytics.exe powershell.exe PID 2068 wrote to memory of 1704 2068 317c57e4052e0e8898e68b2ae9118855e953c2efb6b2ea841e4d2d5e16d7f7b9_NeikiAnalytics.exe schtasks.exe PID 2068 wrote to memory of 1704 2068 317c57e4052e0e8898e68b2ae9118855e953c2efb6b2ea841e4d2d5e16d7f7b9_NeikiAnalytics.exe schtasks.exe PID 2068 wrote to memory of 1704 2068 317c57e4052e0e8898e68b2ae9118855e953c2efb6b2ea841e4d2d5e16d7f7b9_NeikiAnalytics.exe schtasks.exe PID 2016 wrote to memory of 2568 2016 taskeng.exe Discord.exe PID 2016 wrote to memory of 2568 2016 taskeng.exe Discord.exe PID 2016 wrote to memory of 2568 2016 taskeng.exe Discord.exe PID 2016 wrote to memory of 1104 2016 taskeng.exe Discord.exe PID 2016 wrote to memory of 1104 2016 taskeng.exe Discord.exe PID 2016 wrote to memory of 1104 2016 taskeng.exe Discord.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\317c57e4052e0e8898e68b2ae9118855e953c2efb6b2ea841e4d2d5e16d7f7b9_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\317c57e4052e0e8898e68b2ae9118855e953c2efb6b2ea841e4d2d5e16d7f7b9_NeikiAnalytics.exe"1⤵
- Drops startup file
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\317c57e4052e0e8898e68b2ae9118855e953c2efb6b2ea841e4d2d5e16d7f7b9_NeikiAnalytics.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess '317c57e4052e0e8898e68b2ae9118855e953c2efb6b2ea841e4d2d5e16d7f7b9_NeikiAnalytics.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\Discord.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'Discord.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "Discord" /tr "C:\Users\Admin\AppData\Local\Temp\Discord.exe"2⤵
- Scheduled Task/Job: Scheduled Task
-
C:\Windows\system32\taskeng.exetaskeng.exe {D8F7DAD3-C361-4A0A-97AF-A37B8B362F42} S-1-5-21-2737914667-933161113-3798636211-1000:PUMARTNR\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\Discord.exeC:\Users\Admin\AppData\Local\Temp\Discord.exe2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\Discord.exeC:\Users\Admin\AppData\Local\Temp\Discord.exe2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v13
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\Discord.exeFilesize
324KB
MD5f60edabee0df313d9bd92cbec28e5b90
SHA1a786c8938c83656ed690c2a104ca4cd4838065ab
SHA256317c57e4052e0e8898e68b2ae9118855e953c2efb6b2ea841e4d2d5e16d7f7b9
SHA512f043922cd08e6aeb160f4022a60d222d6567cff74c3c8cec952ef293412c70ae0243deac1b07781e96be5124e33cac7294fb87af89f956541040a902995c4918
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-msFilesize
7KB
MD57553918aa24dbf8b260bb671f2602f2b
SHA19a96538fcced3573448174a78852bf86a4aa2276
SHA2569a290512e9698734d57fe3fbec69136c3aea049fa09e98381c95b2cbacf7e609
SHA512498b0c9e0776d675e8058c314fa37e502c5977b1a6d66d42c5c1f9be95b40bbaad20347a958438dc1824bfd573abe4bc7cfb5ff58ef067455c6d4207f3ee7ee3
-
memory/1104-39-0x0000000000280000-0x00000000002D8000-memory.dmpFilesize
352KB
-
memory/2068-1-0x0000000000240000-0x0000000000298000-memory.dmpFilesize
352KB
-
memory/2068-2-0x000007FEF5780000-0x000007FEF616C000-memory.dmpFilesize
9.9MB
-
memory/2068-0-0x000007FEF5783000-0x000007FEF5784000-memory.dmpFilesize
4KB
-
memory/2068-7-0x000007FEF5783000-0x000007FEF5784000-memory.dmpFilesize
4KB
-
memory/2068-32-0x000007FEF5780000-0x000007FEF616C000-memory.dmpFilesize
9.9MB
-
memory/2472-16-0x000000001B690000-0x000000001B972000-memory.dmpFilesize
2.9MB
-
memory/2472-17-0x0000000001E10000-0x0000000001E18000-memory.dmpFilesize
32KB
-
memory/2568-36-0x0000000001000000-0x0000000001058000-memory.dmpFilesize
352KB
-
memory/2628-8-0x00000000028F0000-0x0000000002970000-memory.dmpFilesize
512KB
-
memory/2628-10-0x00000000023C0000-0x00000000023C8000-memory.dmpFilesize
32KB
-
memory/2628-9-0x000000001B6D0000-0x000000001B9B2000-memory.dmpFilesize
2.9MB