Analysis
-
max time kernel
149s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
08/05/2024, 14:33
Static task
static1
Behavioral task
behavioral1
Sample
db17b899dfff125c225762104a420320_NEIKI.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
db17b899dfff125c225762104a420320_NEIKI.exe
Resource
win10v2004-20240508-en
General
-
Target
db17b899dfff125c225762104a420320_NEIKI.exe
-
Size
70KB
-
MD5
db17b899dfff125c225762104a420320
-
SHA1
588bb328f2c726609f2d93adec8244213e82f538
-
SHA256
2bfe1dde9aab799451338024fa4d67809ef18dc53bea1981a3b8eb9a7865b7fa
-
SHA512
4bdb621fe382777a26a50c0d63b8a48abdd4d1de445007662a31e17253f143e4a3cd86b72d7596b1d1a5e1f75571679f1d6299332b76b0243207cbc8e4c82a71
-
SSDEEP
1536:1teqKDlXvCDB04f5Gn/L8FlADNt3d1Hw8J:Olg35GTslA5t3/w8J
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "25600" aploavoab-ucex.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "25600" aploavoab-ucex.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "25600" aploavoab-ucex.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "25600" aploavoab-ucex.exe -
Modifies Installed Components in the registry 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{495A4B43-4b4f-5450-495A-4B434B4F5450} aploavoab-ucex.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{495A4B43-4b4f-5450-495A-4B434B4F5450}\01234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123 = "a" aploavoab-ucex.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{495A4B43-4b4f-5450-495A-4B434B4F5450}\IsInstalled = "1" aploavoab-ucex.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{495A4B43-4b4f-5450-495A-4B434B4F5450}\StubPath = "C:\\Windows\\system32\\utgusoop.exe" aploavoab-ucex.exe -
Sets file execution options in registry 2 TTPs 3 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\explorer.exe aploavoab-ucex.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\explorer.exe\0123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890 = "a" aploavoab-ucex.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\explorer.exe\Debugger = "C:\\Windows\\system32\\aslexeg.exe" aploavoab-ucex.exe -
Executes dropped EXE 2 IoCs
pid Process 2200 aploavoab-ucex.exe 2236 aploavoab-ucex.exe -
Loads dropped DLL 3 IoCs
pid Process 1800 db17b899dfff125c225762104a420320_NEIKI.exe 1800 db17b899dfff125c225762104a420320_NEIKI.exe 2200 aploavoab-ucex.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "25600" aploavoab-ucex.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "25600" aploavoab-ucex.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "25600" aploavoab-ucex.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "25600" aploavoab-ucex.exe -
Modifies WinLogon 2 TTPs 5 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\{BC84DF00-BC38-9902-8082-6FCBF2D87A0B} aploavoab-ucex.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify aploavoab-ucex.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\{BC84DF00-BC38-9902-8082-6FCBF2D87A0B}\012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345 = "a" aploavoab-ucex.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\{BC84DF00-BC38-9902-8082-6FCBF2D87A0B}\DLLName = "C:\\Windows\\system32\\okmotoat.dll" aploavoab-ucex.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\{BC84DF00-BC38-9902-8082-6FCBF2D87A0B}\Startup = "Startup" aploavoab-ucex.exe -
Drops file in System32 directory 9 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\aploavoab-ucex.exe db17b899dfff125c225762104a420320_NEIKI.exe File opened for modification C:\Windows\SysWOW64\okmotoat.dll aploavoab-ucex.exe File created C:\Windows\SysWOW64\okmotoat.dll aploavoab-ucex.exe File created C:\Windows\SysWOW64\aploavoab-ucex.exe db17b899dfff125c225762104a420320_NEIKI.exe File opened for modification C:\Windows\SysWOW64\aslexeg.exe aploavoab-ucex.exe File created C:\Windows\SysWOW64\aslexeg.exe aploavoab-ucex.exe File opened for modification C:\Windows\SysWOW64\utgusoop.exe aploavoab-ucex.exe File created C:\Windows\SysWOW64\utgusoop.exe aploavoab-ucex.exe File opened for modification C:\Windows\SysWOW64\aploavoab-ucex.exe aploavoab-ucex.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2200 aploavoab-ucex.exe 2200 aploavoab-ucex.exe 2200 aploavoab-ucex.exe 2200 aploavoab-ucex.exe 2236 aploavoab-ucex.exe 2200 aploavoab-ucex.exe 2200 aploavoab-ucex.exe 2200 aploavoab-ucex.exe 2200 aploavoab-ucex.exe 2200 aploavoab-ucex.exe 2200 aploavoab-ucex.exe 2200 aploavoab-ucex.exe 2200 aploavoab-ucex.exe 2200 aploavoab-ucex.exe 2200 aploavoab-ucex.exe 2200 aploavoab-ucex.exe 2200 aploavoab-ucex.exe 2200 aploavoab-ucex.exe 2200 aploavoab-ucex.exe 2200 aploavoab-ucex.exe 2200 aploavoab-ucex.exe 2200 aploavoab-ucex.exe 2200 aploavoab-ucex.exe 2200 aploavoab-ucex.exe 2200 aploavoab-ucex.exe 2200 aploavoab-ucex.exe 2200 aploavoab-ucex.exe 2200 aploavoab-ucex.exe 2200 aploavoab-ucex.exe 2200 aploavoab-ucex.exe 2200 aploavoab-ucex.exe 2200 aploavoab-ucex.exe 2200 aploavoab-ucex.exe 2200 aploavoab-ucex.exe 2200 aploavoab-ucex.exe 2200 aploavoab-ucex.exe 2200 aploavoab-ucex.exe 2200 aploavoab-ucex.exe 2200 aploavoab-ucex.exe 2200 aploavoab-ucex.exe 2200 aploavoab-ucex.exe 2200 aploavoab-ucex.exe 2200 aploavoab-ucex.exe 2200 aploavoab-ucex.exe 2200 aploavoab-ucex.exe 2200 aploavoab-ucex.exe 2200 aploavoab-ucex.exe 2200 aploavoab-ucex.exe 2200 aploavoab-ucex.exe 2200 aploavoab-ucex.exe 2200 aploavoab-ucex.exe 2200 aploavoab-ucex.exe 2200 aploavoab-ucex.exe 2200 aploavoab-ucex.exe 2200 aploavoab-ucex.exe 2200 aploavoab-ucex.exe 2200 aploavoab-ucex.exe 2200 aploavoab-ucex.exe 2200 aploavoab-ucex.exe 2200 aploavoab-ucex.exe 2200 aploavoab-ucex.exe 2200 aploavoab-ucex.exe 2200 aploavoab-ucex.exe 2200 aploavoab-ucex.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1800 db17b899dfff125c225762104a420320_NEIKI.exe Token: SeDebugPrivilege 2200 aploavoab-ucex.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1800 wrote to memory of 2200 1800 db17b899dfff125c225762104a420320_NEIKI.exe 28 PID 1800 wrote to memory of 2200 1800 db17b899dfff125c225762104a420320_NEIKI.exe 28 PID 1800 wrote to memory of 2200 1800 db17b899dfff125c225762104a420320_NEIKI.exe 28 PID 1800 wrote to memory of 2200 1800 db17b899dfff125c225762104a420320_NEIKI.exe 28 PID 2200 wrote to memory of 436 2200 aploavoab-ucex.exe 5 PID 2200 wrote to memory of 1204 2200 aploavoab-ucex.exe 21 PID 2200 wrote to memory of 1204 2200 aploavoab-ucex.exe 21 PID 2200 wrote to memory of 2236 2200 aploavoab-ucex.exe 29 PID 2200 wrote to memory of 2236 2200 aploavoab-ucex.exe 29 PID 2200 wrote to memory of 2236 2200 aploavoab-ucex.exe 29 PID 2200 wrote to memory of 2236 2200 aploavoab-ucex.exe 29 PID 2200 wrote to memory of 1204 2200 aploavoab-ucex.exe 21 PID 2200 wrote to memory of 1204 2200 aploavoab-ucex.exe 21 PID 2200 wrote to memory of 1204 2200 aploavoab-ucex.exe 21 PID 2200 wrote to memory of 1204 2200 aploavoab-ucex.exe 21 PID 2200 wrote to memory of 1204 2200 aploavoab-ucex.exe 21 PID 2200 wrote to memory of 1204 2200 aploavoab-ucex.exe 21 PID 2200 wrote to memory of 1204 2200 aploavoab-ucex.exe 21 PID 2200 wrote to memory of 1204 2200 aploavoab-ucex.exe 21 PID 2200 wrote to memory of 1204 2200 aploavoab-ucex.exe 21 PID 2200 wrote to memory of 1204 2200 aploavoab-ucex.exe 21 PID 2200 wrote to memory of 1204 2200 aploavoab-ucex.exe 21 PID 2200 wrote to memory of 1204 2200 aploavoab-ucex.exe 21 PID 2200 wrote to memory of 1204 2200 aploavoab-ucex.exe 21 PID 2200 wrote to memory of 1204 2200 aploavoab-ucex.exe 21 PID 2200 wrote to memory of 1204 2200 aploavoab-ucex.exe 21 PID 2200 wrote to memory of 1204 2200 aploavoab-ucex.exe 21 PID 2200 wrote to memory of 1204 2200 aploavoab-ucex.exe 21 PID 2200 wrote to memory of 1204 2200 aploavoab-ucex.exe 21 PID 2200 wrote to memory of 1204 2200 aploavoab-ucex.exe 21 PID 2200 wrote to memory of 1204 2200 aploavoab-ucex.exe 21 PID 2200 wrote to memory of 1204 2200 aploavoab-ucex.exe 21 PID 2200 wrote to memory of 1204 2200 aploavoab-ucex.exe 21 PID 2200 wrote to memory of 1204 2200 aploavoab-ucex.exe 21 PID 2200 wrote to memory of 1204 2200 aploavoab-ucex.exe 21 PID 2200 wrote to memory of 1204 2200 aploavoab-ucex.exe 21 PID 2200 wrote to memory of 1204 2200 aploavoab-ucex.exe 21 PID 2200 wrote to memory of 1204 2200 aploavoab-ucex.exe 21 PID 2200 wrote to memory of 1204 2200 aploavoab-ucex.exe 21 PID 2200 wrote to memory of 1204 2200 aploavoab-ucex.exe 21 PID 2200 wrote to memory of 1204 2200 aploavoab-ucex.exe 21 PID 2200 wrote to memory of 1204 2200 aploavoab-ucex.exe 21 PID 2200 wrote to memory of 1204 2200 aploavoab-ucex.exe 21 PID 2200 wrote to memory of 1204 2200 aploavoab-ucex.exe 21 PID 2200 wrote to memory of 1204 2200 aploavoab-ucex.exe 21 PID 2200 wrote to memory of 1204 2200 aploavoab-ucex.exe 21 PID 2200 wrote to memory of 1204 2200 aploavoab-ucex.exe 21 PID 2200 wrote to memory of 1204 2200 aploavoab-ucex.exe 21 PID 2200 wrote to memory of 1204 2200 aploavoab-ucex.exe 21 PID 2200 wrote to memory of 1204 2200 aploavoab-ucex.exe 21 PID 2200 wrote to memory of 1204 2200 aploavoab-ucex.exe 21 PID 2200 wrote to memory of 1204 2200 aploavoab-ucex.exe 21 PID 2200 wrote to memory of 1204 2200 aploavoab-ucex.exe 21 PID 2200 wrote to memory of 1204 2200 aploavoab-ucex.exe 21 PID 2200 wrote to memory of 1204 2200 aploavoab-ucex.exe 21 PID 2200 wrote to memory of 1204 2200 aploavoab-ucex.exe 21 PID 2200 wrote to memory of 1204 2200 aploavoab-ucex.exe 21 PID 2200 wrote to memory of 1204 2200 aploavoab-ucex.exe 21 PID 2200 wrote to memory of 1204 2200 aploavoab-ucex.exe 21 PID 2200 wrote to memory of 1204 2200 aploavoab-ucex.exe 21 PID 2200 wrote to memory of 1204 2200 aploavoab-ucex.exe 21 PID 2200 wrote to memory of 1204 2200 aploavoab-ucex.exe 21 PID 2200 wrote to memory of 1204 2200 aploavoab-ucex.exe 21 PID 2200 wrote to memory of 1204 2200 aploavoab-ucex.exe 21
Processes
-
C:\Windows\system32\winlogon.exewinlogon.exe1⤵PID:436
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1204
-
C:\Users\Admin\AppData\Local\Temp\db17b899dfff125c225762104a420320_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\db17b899dfff125c225762104a420320_NEIKI.exe"2⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1800 -
C:\Windows\SysWOW64\aploavoab-ucex.exe"C:\Windows\system32\aploavoab-ucex.exe"3⤵
- Windows security bypass
- Modifies Installed Components in the registry
- Sets file execution options in registry
- Executes dropped EXE
- Loads dropped DLL
- Windows security modification
- Modifies WinLogon
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2200 -
C:\Windows\SysWOW64\aploavoab-ucex.exe--k33p4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2236
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
73KB
MD5741618fc308521f72061f162a15671d9
SHA19cc3c3cdc520014da8f8bddab95d24035b1583bb
SHA256af55dd6f0e9365a655ffbd73bdd7a42ef7f044a44c42f8dbf873594d608e06e7
SHA512a85822ee015bedd8287ca4b1ed5af08af9e2ef5e4e73338c868825a17ed7c7af9ccd3268781303a71dd7c73d6b6a7a9bdb52d2999e419ce5a15527929ff38a7f
-
Filesize
5KB
MD5f37b21c00fd81bd93c89ce741a88f183
SHA1b2796500597c68e2f5638e1101b46eaf32676c1c
SHA25676cf016fd77cb5a06c6ed4674ddc2345e8390c010cf344491a6e742baf2c0fb0
SHA512252fe66dea9a4b9aebc5fd2f24434719cb25159ba51549d9de407f44b6a2f7bce6e071be02c4f2ad6aef588c77f12c00ed415eb54f96dec1b077326e101ce0f4
-
Filesize
72KB
MD553a2819e43a5d3bcf11c4bb3e38d4b54
SHA1f9a7f09e832207b1837bc19bd40c73a185f0a231
SHA2567cf78377e44fd1bb994d1f0ab67a5cf93708685dcd22541eb4b627b23bd61302
SHA5126c9b73f0a2a6b7afa3797750a824142cf74a53320075e93a16c815679cbb4c76ce2a8e30851cd295e330fc9f5bf5a0daae3c9b05e2e6c9d496389661347313c2
-
Filesize
70KB
MD5db17b899dfff125c225762104a420320
SHA1588bb328f2c726609f2d93adec8244213e82f538
SHA2562bfe1dde9aab799451338024fa4d67809ef18dc53bea1981a3b8eb9a7865b7fa
SHA5124bdb621fe382777a26a50c0d63b8a48abdd4d1de445007662a31e17253f143e4a3cd86b72d7596b1d1a5e1f75571679f1d6299332b76b0243207cbc8e4c82a71