Analysis
-
max time kernel
149s -
max time network
122s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
07/05/2024, 21:36
Static task
static1
Behavioral task
behavioral1
Sample
3e9bca3540c8bd2985c8ad2807d6b730_NEIKI.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
3e9bca3540c8bd2985c8ad2807d6b730_NEIKI.exe
Resource
win10v2004-20240419-en
General
-
Target
3e9bca3540c8bd2985c8ad2807d6b730_NEIKI.exe
-
Size
72KB
-
MD5
3e9bca3540c8bd2985c8ad2807d6b730
-
SHA1
bc092124466bb50a9651bbd8bf76b26e63370f35
-
SHA256
e708b9a1e66e390fb9cef6ddf1e39de6dbaeb37d4d74bc09d81f53b0b7014432
-
SHA512
696e6d731490e8625877d5370003a097b75c318673607bfe88d765b7d12bbdd6d8ad3e5001aa1f86ecd51035343f903c4109042c731f6c6f431808da3a717c74
-
SSDEEP
768:x/nEuhThEUAvMgvvd9WhTOng8X6m2AYS1rg1YJZLIgwRdPxCdYLndQxzGp5hhJyQ:xs0evMm+tgg1XS181xbGgdjhh9ZoPbU
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "25600" angoasep.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "25600" angoasep.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "25600" angoasep.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "25600" angoasep.exe -
Modifies Installed Components in the registry 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{45584E43-4c5a-4c49-4558-4E434C5A4c49}\StubPath = "C:\\Windows\\system32\\iphuxeak-mex.exe" angoasep.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{45584E43-4c5a-4c49-4558-4E434C5A4c49} angoasep.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{45584E43-4c5a-4c49-4558-4E434C5A4c49}\01234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123 = "a" angoasep.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{45584E43-4c5a-4c49-4558-4E434C5A4c49}\IsInstalled = "1" angoasep.exe -
Sets file execution options in registry 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\explorer.exe\0123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890 = "a" angoasep.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\explorer.exe\Debugger = "C:\\Windows\\system32\\usvunid.exe" angoasep.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\explorer.exe angoasep.exe -
Executes dropped EXE 2 IoCs
pid Process 1648 angoasep.exe 2276 angoasep.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "25600" angoasep.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "25600" angoasep.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "25600" angoasep.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "25600" angoasep.exe -
Modifies WinLogon 2 TTPs 5 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\{BC84DF00-BC38-9902-8082-6FCBF2D87A0B} angoasep.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify angoasep.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\{BC84DF00-BC38-9902-8082-6FCBF2D87A0B}\012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345 = "a" angoasep.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\{BC84DF00-BC38-9902-8082-6FCBF2D87A0B}\DLLName = "C:\\Windows\\system32\\otdonuk.dll" angoasep.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\{BC84DF00-BC38-9902-8082-6FCBF2D87A0B}\Startup = "Startup" angoasep.exe -
Drops file in System32 directory 9 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\angoasep.exe 3e9bca3540c8bd2985c8ad2807d6b730_NEIKI.exe File created C:\Windows\SysWOW64\angoasep.exe 3e9bca3540c8bd2985c8ad2807d6b730_NEIKI.exe File created C:\Windows\SysWOW64\usvunid.exe angoasep.exe File opened for modification C:\Windows\SysWOW64\otdonuk.dll angoasep.exe File opened for modification C:\Windows\SysWOW64\angoasep.exe angoasep.exe File opened for modification C:\Windows\SysWOW64\usvunid.exe angoasep.exe File opened for modification C:\Windows\SysWOW64\iphuxeak-mex.exe angoasep.exe File created C:\Windows\SysWOW64\iphuxeak-mex.exe angoasep.exe File created C:\Windows\SysWOW64\otdonuk.dll angoasep.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1648 angoasep.exe 1648 angoasep.exe 1648 angoasep.exe 1648 angoasep.exe 1648 angoasep.exe 1648 angoasep.exe 1648 angoasep.exe 1648 angoasep.exe 2276 angoasep.exe 2276 angoasep.exe 1648 angoasep.exe 1648 angoasep.exe 1648 angoasep.exe 1648 angoasep.exe 1648 angoasep.exe 1648 angoasep.exe 1648 angoasep.exe 1648 angoasep.exe 1648 angoasep.exe 1648 angoasep.exe 1648 angoasep.exe 1648 angoasep.exe 1648 angoasep.exe 1648 angoasep.exe 1648 angoasep.exe 1648 angoasep.exe 1648 angoasep.exe 1648 angoasep.exe 1648 angoasep.exe 1648 angoasep.exe 1648 angoasep.exe 1648 angoasep.exe 1648 angoasep.exe 1648 angoasep.exe 1648 angoasep.exe 1648 angoasep.exe 1648 angoasep.exe 1648 angoasep.exe 1648 angoasep.exe 1648 angoasep.exe 1648 angoasep.exe 1648 angoasep.exe 1648 angoasep.exe 1648 angoasep.exe 1648 angoasep.exe 1648 angoasep.exe 1648 angoasep.exe 1648 angoasep.exe 1648 angoasep.exe 1648 angoasep.exe 1648 angoasep.exe 1648 angoasep.exe 1648 angoasep.exe 1648 angoasep.exe 1648 angoasep.exe 1648 angoasep.exe 1648 angoasep.exe 1648 angoasep.exe 1648 angoasep.exe 1648 angoasep.exe 1648 angoasep.exe 1648 angoasep.exe 1648 angoasep.exe 1648 angoasep.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1648 angoasep.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 760 wrote to memory of 1648 760 3e9bca3540c8bd2985c8ad2807d6b730_NEIKI.exe 83 PID 760 wrote to memory of 1648 760 3e9bca3540c8bd2985c8ad2807d6b730_NEIKI.exe 83 PID 760 wrote to memory of 1648 760 3e9bca3540c8bd2985c8ad2807d6b730_NEIKI.exe 83 PID 1648 wrote to memory of 2276 1648 angoasep.exe 84 PID 1648 wrote to memory of 2276 1648 angoasep.exe 84 PID 1648 wrote to memory of 2276 1648 angoasep.exe 84 PID 1648 wrote to memory of 608 1648 angoasep.exe 5 PID 1648 wrote to memory of 3452 1648 angoasep.exe 56 PID 1648 wrote to memory of 3452 1648 angoasep.exe 56 PID 1648 wrote to memory of 3452 1648 angoasep.exe 56 PID 1648 wrote to memory of 3452 1648 angoasep.exe 56 PID 1648 wrote to memory of 3452 1648 angoasep.exe 56 PID 1648 wrote to memory of 3452 1648 angoasep.exe 56 PID 1648 wrote to memory of 3452 1648 angoasep.exe 56 PID 1648 wrote to memory of 3452 1648 angoasep.exe 56 PID 1648 wrote to memory of 3452 1648 angoasep.exe 56 PID 1648 wrote to memory of 3452 1648 angoasep.exe 56 PID 1648 wrote to memory of 3452 1648 angoasep.exe 56 PID 1648 wrote to memory of 3452 1648 angoasep.exe 56 PID 1648 wrote to memory of 3452 1648 angoasep.exe 56 PID 1648 wrote to memory of 3452 1648 angoasep.exe 56 PID 1648 wrote to memory of 3452 1648 angoasep.exe 56 PID 1648 wrote to memory of 3452 1648 angoasep.exe 56 PID 1648 wrote to memory of 3452 1648 angoasep.exe 56 PID 1648 wrote to memory of 3452 1648 angoasep.exe 56 PID 1648 wrote to memory of 3452 1648 angoasep.exe 56 PID 1648 wrote to memory of 3452 1648 angoasep.exe 56 PID 1648 wrote to memory of 3452 1648 angoasep.exe 56 PID 1648 wrote to memory of 3452 1648 angoasep.exe 56 PID 1648 wrote to memory of 3452 1648 angoasep.exe 56 PID 1648 wrote to memory of 3452 1648 angoasep.exe 56 PID 1648 wrote to memory of 3452 1648 angoasep.exe 56 PID 1648 wrote to memory of 3452 1648 angoasep.exe 56 PID 1648 wrote to memory of 3452 1648 angoasep.exe 56 PID 1648 wrote to memory of 3452 1648 angoasep.exe 56 PID 1648 wrote to memory of 3452 1648 angoasep.exe 56 PID 1648 wrote to memory of 3452 1648 angoasep.exe 56 PID 1648 wrote to memory of 3452 1648 angoasep.exe 56 PID 1648 wrote to memory of 3452 1648 angoasep.exe 56 PID 1648 wrote to memory of 3452 1648 angoasep.exe 56 PID 1648 wrote to memory of 3452 1648 angoasep.exe 56 PID 1648 wrote to memory of 3452 1648 angoasep.exe 56 PID 1648 wrote to memory of 3452 1648 angoasep.exe 56 PID 1648 wrote to memory of 3452 1648 angoasep.exe 56 PID 1648 wrote to memory of 3452 1648 angoasep.exe 56 PID 1648 wrote to memory of 3452 1648 angoasep.exe 56 PID 1648 wrote to memory of 3452 1648 angoasep.exe 56 PID 1648 wrote to memory of 3452 1648 angoasep.exe 56 PID 1648 wrote to memory of 3452 1648 angoasep.exe 56 PID 1648 wrote to memory of 3452 1648 angoasep.exe 56 PID 1648 wrote to memory of 3452 1648 angoasep.exe 56 PID 1648 wrote to memory of 3452 1648 angoasep.exe 56 PID 1648 wrote to memory of 3452 1648 angoasep.exe 56 PID 1648 wrote to memory of 3452 1648 angoasep.exe 56 PID 1648 wrote to memory of 3452 1648 angoasep.exe 56 PID 1648 wrote to memory of 3452 1648 angoasep.exe 56 PID 1648 wrote to memory of 3452 1648 angoasep.exe 56 PID 1648 wrote to memory of 3452 1648 angoasep.exe 56 PID 1648 wrote to memory of 3452 1648 angoasep.exe 56 PID 1648 wrote to memory of 3452 1648 angoasep.exe 56 PID 1648 wrote to memory of 3452 1648 angoasep.exe 56 PID 1648 wrote to memory of 3452 1648 angoasep.exe 56 PID 1648 wrote to memory of 3452 1648 angoasep.exe 56 PID 1648 wrote to memory of 3452 1648 angoasep.exe 56
Processes
-
C:\Windows\system32\winlogon.exewinlogon.exe1⤵PID:608
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3452
-
C:\Users\Admin\AppData\Local\Temp\3e9bca3540c8bd2985c8ad2807d6b730_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\3e9bca3540c8bd2985c8ad2807d6b730_NEIKI.exe"2⤵
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:760 -
C:\Windows\SysWOW64\angoasep.exe"C:\Windows\SysWOW64\angoasep.exe"3⤵
- Windows security bypass
- Modifies Installed Components in the registry
- Sets file execution options in registry
- Executes dropped EXE
- Windows security modification
- Modifies WinLogon
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1648 -
C:\Windows\SysWOW64\angoasep.exe--k33p4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2276
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD5a15c48532bca3166702729b0e035f20e
SHA122a3423ff5fa5638b1a80a4df78c3e9792cecbfd
SHA2567467ad056277caae1eb65c0f52b7fff252af1d9987a7b9a22136d08f916b3cec
SHA512051e57d17b4b0b4d011a11f8062dbd6a226d1d701883f89751efbb97645ba2fb88da887f5c73b28e9ec154ad3b77df0f8a10374a4692160dd9fc8ad774be0772
-
Filesize
72KB
MD551ccbe3b014be37abccb660a9c5d5f95
SHA1b8e5afd68b6fd9fa28fca8b4c94c54fc89a09335
SHA2563361bbb5fbc8993303b2f9bc519e9683cdbe8bb0651e3e7fea984042de0ba894
SHA512f34692c51090fc8af48856962a4c7597aeb8f72b813a37fea6306974aa7525506bc86d3f7538eb9afda439ee8c17f867935f40f4d8d81be039bcb78cce1e4dae
-
Filesize
5KB
MD5f37b21c00fd81bd93c89ce741a88f183
SHA1b2796500597c68e2f5638e1101b46eaf32676c1c
SHA25676cf016fd77cb5a06c6ed4674ddc2345e8390c010cf344491a6e742baf2c0fb0
SHA512252fe66dea9a4b9aebc5fd2f24434719cb25159ba51549d9de407f44b6a2f7bce6e071be02c4f2ad6aef588c77f12c00ed415eb54f96dec1b077326e101ce0f4
-
Filesize
73KB
MD56bee52de31357550cc1bcb0f96aa328e
SHA163e731c5dd4b87da84461e5b63a0f5264280d1b4
SHA256047c388c7ef957f5c98931d98bb7e0dd896128704bdbdc6805c9f7daa5b317a7
SHA5123666e797d4571b52bc8ac7bb57e594e058e218c3c35424d9f3d2518b996fb46d9f49bcf2cd65693dfa2ac2bc8f6225fc2ee4b34058c1cff03ff67cd61af9ded3