Analysis
-
max time kernel
149s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
09/05/2024, 11:47
Static task
static1
Behavioral task
behavioral1
Sample
285b025ae9c6006a3e17d3a89d47d5e0_NeikiAnalytics.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
285b025ae9c6006a3e17d3a89d47d5e0_NeikiAnalytics.exe
Resource
win10v2004-20240226-en
General
-
Target
285b025ae9c6006a3e17d3a89d47d5e0_NeikiAnalytics.exe
-
Size
70KB
-
MD5
285b025ae9c6006a3e17d3a89d47d5e0
-
SHA1
3743562493f779f1933ecfdcfbb316461203a9c4
-
SHA256
0697f13198bb7b251fd70b953f10dfa73c47e7e8109fb655c07843507727c004
-
SHA512
abb6097809ef97bb8f1a6ab35d45fdce17f82fb9ae7d86c44e657ebe87c3384caeae1c1c9d46a78c9d727578be9260132a6124f778fcdc1e27a655d8819ec08e
-
SSDEEP
1536:1teqKDlXvCDB04f5Gn/L8FlADNt3d1Hw8sl1Et:Olg35GTslA5t3/w8jt
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "25600" oubpexug.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "25600" oubpexug.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "25600" oubpexug.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "25600" oubpexug.exe -
Modifies Installed Components in the registry 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{53434647-4252-4254-5343-464742524254} oubpexug.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{53434647-4252-4254-5343-464742524254}\01234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123 = "a" oubpexug.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{53434647-4252-4254-5343-464742524254}\IsInstalled = "1" oubpexug.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{53434647-4252-4254-5343-464742524254}\StubPath = "C:\\Windows\\system32\\upfugoot.exe" oubpexug.exe -
Sets file execution options in registry 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\explorer.exe\Debugger = "C:\\Windows\\system32\\eafpeabar-udooc.exe" oubpexug.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\explorer.exe oubpexug.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\explorer.exe\0123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890 = "a" oubpexug.exe -
Executes dropped EXE 2 IoCs
pid Process 1676 oubpexug.exe 2892 oubpexug.exe -
Loads dropped DLL 3 IoCs
pid Process 2332 285b025ae9c6006a3e17d3a89d47d5e0_NeikiAnalytics.exe 2332 285b025ae9c6006a3e17d3a89d47d5e0_NeikiAnalytics.exe 1676 oubpexug.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "25600" oubpexug.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "25600" oubpexug.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "25600" oubpexug.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "25600" oubpexug.exe -
Modifies WinLogon 2 TTPs 5 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\{BC84DF00-BC38-9902-8082-6FCBF2D87A0B} oubpexug.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify oubpexug.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\{BC84DF00-BC38-9902-8082-6FCBF2D87A0B}\012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345 = "a" oubpexug.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\{BC84DF00-BC38-9902-8082-6FCBF2D87A0B}\DLLName = "C:\\Windows\\system32\\ugdumoac.dll" oubpexug.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\{BC84DF00-BC38-9902-8082-6FCBF2D87A0B}\Startup = "Startup" oubpexug.exe -
Drops file in System32 directory 9 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\oubpexug.exe 285b025ae9c6006a3e17d3a89d47d5e0_NeikiAnalytics.exe File created C:\Windows\SysWOW64\oubpexug.exe 285b025ae9c6006a3e17d3a89d47d5e0_NeikiAnalytics.exe File created C:\Windows\SysWOW64\eafpeabar-udooc.exe oubpexug.exe File opened for modification C:\Windows\SysWOW64\upfugoot.exe oubpexug.exe File created C:\Windows\SysWOW64\upfugoot.exe oubpexug.exe File opened for modification C:\Windows\SysWOW64\ugdumoac.dll oubpexug.exe File opened for modification C:\Windows\SysWOW64\eafpeabar-udooc.exe oubpexug.exe File created C:\Windows\SysWOW64\ugdumoac.dll oubpexug.exe File opened for modification C:\Windows\SysWOW64\oubpexug.exe oubpexug.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1676 oubpexug.exe 1676 oubpexug.exe 1676 oubpexug.exe 1676 oubpexug.exe 2892 oubpexug.exe 1676 oubpexug.exe 1676 oubpexug.exe 1676 oubpexug.exe 1676 oubpexug.exe 1676 oubpexug.exe 1676 oubpexug.exe 1676 oubpexug.exe 1676 oubpexug.exe 1676 oubpexug.exe 1676 oubpexug.exe 1676 oubpexug.exe 1676 oubpexug.exe 1676 oubpexug.exe 1676 oubpexug.exe 1676 oubpexug.exe 1676 oubpexug.exe 1676 oubpexug.exe 1676 oubpexug.exe 1676 oubpexug.exe 1676 oubpexug.exe 1676 oubpexug.exe 1676 oubpexug.exe 1676 oubpexug.exe 1676 oubpexug.exe 1676 oubpexug.exe 1676 oubpexug.exe 1676 oubpexug.exe 1676 oubpexug.exe 1676 oubpexug.exe 1676 oubpexug.exe 1676 oubpexug.exe 1676 oubpexug.exe 1676 oubpexug.exe 1676 oubpexug.exe 1676 oubpexug.exe 1676 oubpexug.exe 1676 oubpexug.exe 1676 oubpexug.exe 1676 oubpexug.exe 1676 oubpexug.exe 1676 oubpexug.exe 1676 oubpexug.exe 1676 oubpexug.exe 1676 oubpexug.exe 1676 oubpexug.exe 1676 oubpexug.exe 1676 oubpexug.exe 1676 oubpexug.exe 1676 oubpexug.exe 1676 oubpexug.exe 1676 oubpexug.exe 1676 oubpexug.exe 1676 oubpexug.exe 1676 oubpexug.exe 1676 oubpexug.exe 1676 oubpexug.exe 1676 oubpexug.exe 1676 oubpexug.exe 1676 oubpexug.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2332 285b025ae9c6006a3e17d3a89d47d5e0_NeikiAnalytics.exe Token: SeDebugPrivilege 1676 oubpexug.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2332 wrote to memory of 1676 2332 285b025ae9c6006a3e17d3a89d47d5e0_NeikiAnalytics.exe 28 PID 2332 wrote to memory of 1676 2332 285b025ae9c6006a3e17d3a89d47d5e0_NeikiAnalytics.exe 28 PID 2332 wrote to memory of 1676 2332 285b025ae9c6006a3e17d3a89d47d5e0_NeikiAnalytics.exe 28 PID 2332 wrote to memory of 1676 2332 285b025ae9c6006a3e17d3a89d47d5e0_NeikiAnalytics.exe 28 PID 1676 wrote to memory of 432 1676 oubpexug.exe 5 PID 1676 wrote to memory of 1356 1676 oubpexug.exe 21 PID 1676 wrote to memory of 1356 1676 oubpexug.exe 21 PID 1676 wrote to memory of 2892 1676 oubpexug.exe 29 PID 1676 wrote to memory of 2892 1676 oubpexug.exe 29 PID 1676 wrote to memory of 2892 1676 oubpexug.exe 29 PID 1676 wrote to memory of 2892 1676 oubpexug.exe 29 PID 1676 wrote to memory of 1356 1676 oubpexug.exe 21 PID 1676 wrote to memory of 1356 1676 oubpexug.exe 21 PID 1676 wrote to memory of 1356 1676 oubpexug.exe 21 PID 1676 wrote to memory of 1356 1676 oubpexug.exe 21 PID 1676 wrote to memory of 1356 1676 oubpexug.exe 21 PID 1676 wrote to memory of 1356 1676 oubpexug.exe 21 PID 1676 wrote to memory of 1356 1676 oubpexug.exe 21 PID 1676 wrote to memory of 1356 1676 oubpexug.exe 21 PID 1676 wrote to memory of 1356 1676 oubpexug.exe 21 PID 1676 wrote to memory of 1356 1676 oubpexug.exe 21 PID 1676 wrote to memory of 1356 1676 oubpexug.exe 21 PID 1676 wrote to memory of 1356 1676 oubpexug.exe 21 PID 1676 wrote to memory of 1356 1676 oubpexug.exe 21 PID 1676 wrote to memory of 1356 1676 oubpexug.exe 21 PID 1676 wrote to memory of 1356 1676 oubpexug.exe 21 PID 1676 wrote to memory of 1356 1676 oubpexug.exe 21 PID 1676 wrote to memory of 1356 1676 oubpexug.exe 21 PID 1676 wrote to memory of 1356 1676 oubpexug.exe 21 PID 1676 wrote to memory of 1356 1676 oubpexug.exe 21 PID 1676 wrote to memory of 1356 1676 oubpexug.exe 21 PID 1676 wrote to memory of 1356 1676 oubpexug.exe 21 PID 1676 wrote to memory of 1356 1676 oubpexug.exe 21 PID 1676 wrote to memory of 1356 1676 oubpexug.exe 21 PID 1676 wrote to memory of 1356 1676 oubpexug.exe 21 PID 1676 wrote to memory of 1356 1676 oubpexug.exe 21 PID 1676 wrote to memory of 1356 1676 oubpexug.exe 21 PID 1676 wrote to memory of 1356 1676 oubpexug.exe 21 PID 1676 wrote to memory of 1356 1676 oubpexug.exe 21 PID 1676 wrote to memory of 1356 1676 oubpexug.exe 21 PID 1676 wrote to memory of 1356 1676 oubpexug.exe 21 PID 1676 wrote to memory of 1356 1676 oubpexug.exe 21 PID 1676 wrote to memory of 1356 1676 oubpexug.exe 21 PID 1676 wrote to memory of 1356 1676 oubpexug.exe 21 PID 1676 wrote to memory of 1356 1676 oubpexug.exe 21 PID 1676 wrote to memory of 1356 1676 oubpexug.exe 21 PID 1676 wrote to memory of 1356 1676 oubpexug.exe 21 PID 1676 wrote to memory of 1356 1676 oubpexug.exe 21 PID 1676 wrote to memory of 1356 1676 oubpexug.exe 21 PID 1676 wrote to memory of 1356 1676 oubpexug.exe 21 PID 1676 wrote to memory of 1356 1676 oubpexug.exe 21 PID 1676 wrote to memory of 1356 1676 oubpexug.exe 21 PID 1676 wrote to memory of 1356 1676 oubpexug.exe 21 PID 1676 wrote to memory of 1356 1676 oubpexug.exe 21 PID 1676 wrote to memory of 1356 1676 oubpexug.exe 21 PID 1676 wrote to memory of 1356 1676 oubpexug.exe 21 PID 1676 wrote to memory of 1356 1676 oubpexug.exe 21 PID 1676 wrote to memory of 1356 1676 oubpexug.exe 21 PID 1676 wrote to memory of 1356 1676 oubpexug.exe 21 PID 1676 wrote to memory of 1356 1676 oubpexug.exe 21 PID 1676 wrote to memory of 1356 1676 oubpexug.exe 21 PID 1676 wrote to memory of 1356 1676 oubpexug.exe 21 PID 1676 wrote to memory of 1356 1676 oubpexug.exe 21 PID 1676 wrote to memory of 1356 1676 oubpexug.exe 21
Processes
-
C:\Windows\system32\winlogon.exewinlogon.exe1⤵PID:432
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1356
-
C:\Users\Admin\AppData\Local\Temp\285b025ae9c6006a3e17d3a89d47d5e0_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\285b025ae9c6006a3e17d3a89d47d5e0_NeikiAnalytics.exe"2⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2332 -
C:\Windows\SysWOW64\oubpexug.exe"C:\Windows\system32\oubpexug.exe"3⤵
- Windows security bypass
- Modifies Installed Components in the registry
- Sets file execution options in registry
- Executes dropped EXE
- Loads dropped DLL
- Windows security modification
- Modifies WinLogon
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1676 -
C:\Windows\SysWOW64\oubpexug.exe--k33p4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2892
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
73KB
MD5970a4120bf746dac54bb60cef6e1b62e
SHA18a2df7a5a7c8ff6acb1bb698629ef498ee37e216
SHA25660e9ec3ae4bf86d326f5d1a369d7fb3bae27901be18ff2401e9179412e4e2102
SHA5125a5c3d6479e90f5bee56fe867bb46dddaf2e48b47fe491b3b4c76bcec3bbad6e07525ba519f7491910cd600aa897e2fbad1f6cbbe42fd49ee06f4f403f7d0fc5
-
Filesize
5KB
MD5f37b21c00fd81bd93c89ce741a88f183
SHA1b2796500597c68e2f5638e1101b46eaf32676c1c
SHA25676cf016fd77cb5a06c6ed4674ddc2345e8390c010cf344491a6e742baf2c0fb0
SHA512252fe66dea9a4b9aebc5fd2f24434719cb25159ba51549d9de407f44b6a2f7bce6e071be02c4f2ad6aef588c77f12c00ed415eb54f96dec1b077326e101ce0f4
-
Filesize
72KB
MD5684419082d02faf2a2ad430e77de4467
SHA141566774e2a12dca7efe523e532afc44c9e28121
SHA25608aa6a5f0fd5763bed3624fd39b8506e342049826c78d808f0cc77177db45611
SHA51231a22eee956d22465dfdc2e55e36ac79131e17c7f169925c2c22f5a7aa4e5628eb8fac3821588195e9a0b59632fb15c6aab2caa83603644dfe28238109f4c3af
-
Filesize
70KB
MD5285b025ae9c6006a3e17d3a89d47d5e0
SHA13743562493f779f1933ecfdcfbb316461203a9c4
SHA2560697f13198bb7b251fd70b953f10dfa73c47e7e8109fb655c07843507727c004
SHA512abb6097809ef97bb8f1a6ab35d45fdce17f82fb9ae7d86c44e657ebe87c3384caeae1c1c9d46a78c9d727578be9260132a6124f778fcdc1e27a655d8819ec08e