Analysis

  • max time kernel
    146s
  • max time network
    156s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01-07-2024 03:46

General

  • Target

    33270120b823cc225606147457f6d086d97b5864450f16546982626902e46443_NeikiAnalytics.exe

  • Size

    7.9MB

  • MD5

    efeb18cb3559a77995618c8d419aee70

  • SHA1

    031813582c485460d3a7ff185502f4cfc3842c2f

  • SHA256

    33270120b823cc225606147457f6d086d97b5864450f16546982626902e46443

  • SHA512

    1dac843eaa518cbd988a4e8923aadf317e018b1ac872f528df799a6244afb9abbc4a62f492af78c1842d22e550da36466bdd383f06ff55e3e051fd930728fcca

  • SSDEEP

    98304:CX9lzMRum1nuqyU7XtPCySwo47CctAWUmDrhyM4Znnf6vP/iq0iuWhiw0cEWaOLS:CX9lzMRum1nQUztPClmtPqq0iZinWpM

Score
10/10

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Loads dropped DLL 12 IoCs
  • Enumerates connected drives 3 TTPs 64 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Windows directory 21 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Using powershell.exe command.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks SCSI registry key(s) 3 TTPs 5 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Modifies data under HKEY_USERS 44 IoCs
  • Modifies registry class 20 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\33270120b823cc225606147457f6d086d97b5864450f16546982626902e46443_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\33270120b823cc225606147457f6d086d97b5864450f16546982626902e46443_NeikiAnalytics.exe"
    1⤵
    • Enumerates connected drives
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:1540
    • C:\Windows\SysWOW64\msiexec.exe
      "C:\Windows\system32\msiexec.exe" /i "C:\Users\Admin\AppData\Roaming\Your Company\Your Application 1.0.0\install\Your Application.msi" AI_SETUPEXEPATH=C:\Users\Admin\AppData\Local\Temp\33270120b823cc225606147457f6d086d97b5864450f16546982626902e46443_NeikiAnalytics.exe SETUPEXEDIR=C:\Users\Admin\AppData\Local\Temp\ EXE_CMD_LINE="/exenoupdates /forcecleanup /wintime 1719565033 "
      2⤵
      • Enumerates connected drives
      • Suspicious use of FindShellTrayWindow
      PID:4200
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Enumerates connected drives
    • Drops file in Windows directory
    • Modifies data under HKEY_USERS
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:224
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding 32240A6DF8814B41A85B06AE375E2107 C
      2⤵
      • Loads dropped DLL
      PID:4516
    • C:\Windows\system32\srtasks.exe
      C:\Windows\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:2
      2⤵
        PID:400
      • C:\Windows\syswow64\MsiExec.exe
        C:\Windows\syswow64\MsiExec.exe -Embedding 118C87AFAFF0803BA31E75E4228CD6BB
        2⤵
        • Loads dropped DLL
        PID:2448
      • C:\Windows\syswow64\MsiExec.exe
        C:\Windows\syswow64\MsiExec.exe -Embedding C4AA0680BAB67571BDC250F21BE82EC2 E Global\MSI0000
        2⤵
        • Loads dropped DLL
        • Drops file in Windows directory
        • Suspicious use of WriteProcessMemory
        PID:3596
        • C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe
          -NoProfile -Noninteractive -ExecutionPolicy Bypass -File "C:\Windows\SystemTemp\pss7EB8.ps1" -propFile "C:\Windows\SystemTemp\msi7EA6.txt" -scriptFile "C:\Windows\SystemTemp\scr7EA7.ps1" -scriptArgsFile "C:\Windows\SystemTemp\scr7EA8.txt" -propSep " :<->: " -lineSep " <<:>> " -testPrefix "_testValue."
          3⤵
          • Modifies WinLogon for persistence
          • Command and Scripting Interpreter: PowerShell
          • Modifies data under HKEY_USERS
          • Suspicious behavior: EnumeratesProcesses
          PID:3032
    • C:\Windows\system32\vssvc.exe
      C:\Windows\system32\vssvc.exe
      1⤵
      • Checks SCSI registry key(s)
      PID:5056

    Network

    MITRE ATT&CK Matrix ATT&CK v13

    Execution

    Command and Scripting Interpreter

    1
    T1059

    PowerShell

    1
    T1059.001

    Persistence

    Boot or Logon Autostart Execution

    1
    T1547

    Winlogon Helper DLL

    1
    T1547.004

    Privilege Escalation

    Boot or Logon Autostart Execution

    1
    T1547

    Winlogon Helper DLL

    1
    T1547.004

    Defense Evasion

    Modify Registry

    1
    T1112

    Discovery

    Query Registry

    2
    T1012

    Peripheral Device Discovery

    2
    T1120

    System Information Discovery

    3
    T1082

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Config.Msi\e577b0f.rbs
      Filesize

      11KB

      MD5

      075b3bb092b0cc28e280d42b489c5af3

      SHA1

      7a8010a93591ab741a48085df039f58569862fd2

      SHA256

      d05248ee670407793ca6985bd60a2c354bca3cafcdcf0c77c569d2a51df7a1e1

      SHA512

      d50cc0a3c76e02057b9cd064cbeed54499a3a29d2bd089bb34cf81de7b473649cf52e4a32e790a479a94cbc39e05e4a6c1459d399f0593844c503042b4fc4797

    • C:\Users\Admin\AppData\Local\Temp\MSI5303.tmp
      Filesize

      819KB

      MD5

      3604517a3e6e69ba339239cf82fc94a5

      SHA1

      c4757e31f9c8a90ee5de233792da71c8915050c5

      SHA256

      bdd1d14c9cb54b19f6a7f37adbc7537ce8fd2f6fa59a74a4a90b08c7979708d2

      SHA512

      c22ffc410886fae221dfee6ab469e44694f87cecce14d505a059f5fe01c1b4e1ad93c15b78c7623e821a37737491e89c627ddae5d03c407a877835ab6d611619

    • C:\Users\Admin\AppData\Local\Temp\MSI5373.tmp
      Filesize

      1.1MB

      MD5

      cc048c7aadc4adf3a29d429f1f5eead0

      SHA1

      6b4d89df901427fe955be2d58ad91a6de30be9d6

      SHA256

      d23c6ac751423ff6961694437e67d7b608102bd351e3e0cd10d34d026a1a08ca

      SHA512

      0e67c0a4db70e19ead49f6c0fd41045f3fd9ee688d75a6da2916e347b70783843fa0e3d6cfc2b0bcd5e16a6045ba27707dff655556ebc725c126082e45cee2fa

    • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_qqtviaqy.nli.ps1
      Filesize

      60B

      MD5

      d17fe0a3f47be24a6453e9ef58c94641

      SHA1

      6ab83620379fc69f80c0242105ddffd7d98d5d9d

      SHA256

      96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

      SHA512

      5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

    • C:\Users\Admin\AppData\Roaming\Your Company\Your Application 1.0.0\install\Your Application.msi
      Filesize

      4.1MB

      MD5

      c6f2c182d1946aa7c29ec6861fbf168f

      SHA1

      f1f8b2e65d8581f966b577c5ff22a3af081d3994

      SHA256

      6688cc74e524b2b68fae49e66d0e2c718e7d01e591883530bbe32e00d6d93392

      SHA512

      eca4e43c79812578787f68ac912ca863356e0e3a16580d967b3eeaacfef32c53832b05acb57d0da61b55f75f241fe172faad4cc28a75b51383ffff7ca6a214f8

    • C:\Windows\Installer\MSI7CE7.tmp
      Filesize

      877KB

      MD5

      899a6d5f1c9e00ec2f43e732c6b7548f

      SHA1

      a795646d8c878a21beb51120a8c709dc83b87960

      SHA256

      0ca4e5eb5a7bac56a3ee31df50110a4e89ab4781ecb1da43bb5cab66ff799491

      SHA512

      8467de1ede139dbf6f6d2225c58f379d140972101f2770e59ef50d98d6793bacfc62a4abe80644d7ab587ee20c8da02839efb95ae3f0689dfa837c4495c1a172

    • C:\Windows\Installer\MSI7E02.tmp
      Filesize

      758KB

      MD5

      419cea1c6064e430860508e269f0cd2f

      SHA1

      921841797df087a1adc93877467e30e00c7d1d7e

      SHA256

      10575139bca9cb43ea44a9883308fdd83cebe6df59f68036337ab72530f0a8f4

      SHA512

      c6597fff8febdc6aa26dc91147532af6892a49e789903fcfed57fe8131a43bbfaa59b93035a4b2bbfd580fcf098ddd478e2110890381269556f387c689fb3c35

    • C:\Windows\SystemTemp\pss7EB8.ps1
      Filesize

      6KB

      MD5

      30c30ef2cb47e35101d13402b5661179

      SHA1

      25696b2aab86a9233f19017539e2dd83b2f75d4e

      SHA256

      53094df6fa4e57a3265ff04bc1e970c10bcdb3d4094ad6dd610c05b7a8b79e0f

      SHA512

      882be2768138bb75ff7dde7d5ca4c2e024699398baacd0ce1d4619902402e054297e4f464d8cb3c22b2f35d3dabc408122c207facad64ec8014f2c54834cf458

    • C:\Windows\SystemTemp\scr7EA7.ps1
      Filesize

      528B

      MD5

      2fbae52477ff679cee8e0755a5b286e2

      SHA1

      c7318cd2a317e0092e5adfc8e8cd90081e3a102e

      SHA256

      c0c4317a1c6dbef47e86a3b67b40c3c98836138dfb42e223abcb94450d2edd1d

      SHA512

      adfbe6943401df15f012889d07bd13004581058ba9377e9570cf6e80f0faaa468636a8b03797e4d6921a4d566af45f7b9cdfeff8eeca1ba038dbd8a4bcac21ad

    • \??\GLOBALROOT\Device\HarddiskVolumeShadowCopy2\System Volume Information\SPP\metadata-2
      Filesize

      23.7MB

      MD5

      99ba5818e4cf70fb2286fd1a8840dcf0

      SHA1

      7e7580ece21ac6fca0251ea180338fdd4e09f1f5

      SHA256

      a814fa410015e232abbdfa4a26762831d81fd6e8be9f45198ec2819a806f32b1

      SHA512

      c7da0b70a2d9beee8b12a32d62427221849638aea67d8c83fde9ede8fd1d4d5678286b00c03b2939cc387d9b365d23f4aea8559a92a89831f55edf2ff3053bd9

    • \??\Volume{8fc740eb-0000-0000-0000-d01200000000}\System Volume Information\SPP\OnlineMetadataCache\{5e57cf92-c3b5-4a4d-9260-b37d53badefc}_OnDiskSnapshotProp
      Filesize

      6KB

      MD5

      c7cd574b40d7f9327d0f319997f9dabd

      SHA1

      cc2354314be9b28bd0e60a981a3111afc196cce2

      SHA256

      347900776f4109431466c8f2d7903f39820a264bdfd10fa53da3c37cb5fa84e6

      SHA512

      65660a7b981c2cbb83573f9020c3434153ec9b5e09c890188ab64fa21d77115ee77696cc8123ce0347c8515142d0b87e360c6b282f38e50f6904b7397be25935

    • memory/3032-82-0x0000021AE65B0000-0x0000021AE65D2000-memory.dmp
      Filesize

      136KB