Analysis

  • max time kernel
    149s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240419-en
  • resource tags

    arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system
  • submitted
    09-05-2024 19:01

General

  • Target

    ccda6fb6bf98501a867736eabfce2140_NeikiAnalytics.exe

  • Size

    69KB

  • MD5

    ccda6fb6bf98501a867736eabfce2140

  • SHA1

    8ccb09a3d9774e3b420f75563a902097f3c0381b

  • SHA256

    1b820ece6721b5aaddfe00f6be22d268eee03bbf4e8fdd4bff262b5ebd15db8d

  • SHA512

    b4d8c5576956969ecdd64a8049ec5f5e568d1c316b3ec2fae5f90e0c0846d44c7fa56a857dde5b3ca16f8c917eedc44d6215e48d21f92a5d004996fb37024ab6

  • SSDEEP

    1536:xV3YCONO6mYlRzbR05nUmJI8T80zfEGekDWnRe95ZJgN:KNO6mYlRviU+jY0YrkSnRY57s

Malware Config

Signatures

  • Windows security bypass 2 TTPs 4 IoCs
  • Modifies Installed Components in the registry 2 TTPs 4 IoCs
  • Sets file execution options in registry 2 TTPs 3 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 3 IoCs
  • Windows security modification 2 TTPs 4 IoCs
  • Modifies WinLogon 2 TTPs 5 IoCs
  • Drops file in System32 directory 9 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ccda6fb6bf98501a867736eabfce2140_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\ccda6fb6bf98501a867736eabfce2140_NeikiAnalytics.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in System32 directory
    • Suspicious use of WriteProcessMemory
    PID:2208
    • C:\Windows\SysWOW64\blofuc-oucor.exe
      "C:\Windows\SysWOW64\blofuc-oucor.exe"
      2⤵
      • Windows security bypass
      • Modifies Installed Components in the registry
      • Sets file execution options in registry
      • Executes dropped EXE
      • Loads dropped DLL
      • Windows security modification
      • Modifies WinLogon
      • Drops file in System32 directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2420
      • C:\Windows\SysWOW64\blofuc-oucor.exe
        ùù¿çç¤
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        PID:2664

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\ordeader.dll

    Filesize

    5KB

    MD5

    f37b21c00fd81bd93c89ce741a88f183

    SHA1

    b2796500597c68e2f5638e1101b46eaf32676c1c

    SHA256

    76cf016fd77cb5a06c6ed4674ddc2345e8390c010cf344491a6e742baf2c0fb0

    SHA512

    252fe66dea9a4b9aebc5fd2f24434719cb25159ba51549d9de407f44b6a2f7bce6e071be02c4f2ad6aef588c77f12c00ed415eb54f96dec1b077326e101ce0f4

  • C:\Windows\SysWOW64\oubgetet.exe

    Filesize

    70KB

    MD5

    59cda0edb223846e4aa4d927563254f4

    SHA1

    0c0e587639df40b68e0caabab40cbdc8d77610fe

    SHA256

    6d60257942de87d985437eae57b04b5311fd29fe910721859f7c0edb5064d406

    SHA512

    6901332df3c7ec85823db33a978f0abac6585a91214b6eee39fcb3d8e18d38b4b16bbdb47d5ae2f95ee725b841727e6e969eafdb97bc5833f8fbf62671f1a679

  • C:\Windows\SysWOW64\oubseaxeam-onom.exe

    Filesize

    69KB

    MD5

    d39f6dfee61494f7a5eb4d52198bc088

    SHA1

    dff4c0c0ae52b65649f648e43ccec96e8e14d32d

    SHA256

    28d39644af94e1c029f4db91fd2f53af9f17e26d7438d4c206180491f3fa6309

    SHA512

    f6da0692c3601356c49fb8fd7bd8fbfd13d1e53ced9c6cc1d69a194469ebf93341fc21a403b3132abda13213fa9273fbc3f7d01795c53b24fc8884d7a2da2281

  • \Windows\SysWOW64\blofuc-oucor.exe

    Filesize

    67KB

    MD5

    02136d9f577f5962c730704d4320b8e0

    SHA1

    5798f72c72c44e3abde3b99af9a5652b42e893fd

    SHA256

    68060c4360750886f44239516672accec5cfda922f28c805d4c1c5e807879e0e

    SHA512

    22a099477a34d6c49d84744855b0083b709905dd4e36c454607f318ecd6b71369399aba59c1851ef8c5152a313d94fe6cbcf33b223d9ca9358c7223d1473d0dc

  • memory/2208-7-0x0000000000400000-0x0000000000403000-memory.dmp

    Filesize

    12KB

  • memory/2420-53-0x0000000000400000-0x0000000000414000-memory.dmp

    Filesize

    80KB

  • memory/2664-54-0x0000000000400000-0x0000000000414000-memory.dmp

    Filesize

    80KB