Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09/05/2024, 19:01

General

  • Target

    ccda6fb6bf98501a867736eabfce2140_NeikiAnalytics.exe

  • Size

    69KB

  • MD5

    ccda6fb6bf98501a867736eabfce2140

  • SHA1

    8ccb09a3d9774e3b420f75563a902097f3c0381b

  • SHA256

    1b820ece6721b5aaddfe00f6be22d268eee03bbf4e8fdd4bff262b5ebd15db8d

  • SHA512

    b4d8c5576956969ecdd64a8049ec5f5e568d1c316b3ec2fae5f90e0c0846d44c7fa56a857dde5b3ca16f8c917eedc44d6215e48d21f92a5d004996fb37024ab6

  • SSDEEP

    1536:xV3YCONO6mYlRzbR05nUmJI8T80zfEGekDWnRe95ZJgN:KNO6mYlRviU+jY0YrkSnRY57s

Malware Config

Signatures

  • Windows security bypass 2 TTPs 4 IoCs
  • Modifies Installed Components in the registry 2 TTPs 4 IoCs
  • Sets file execution options in registry 2 TTPs 3 IoCs
  • Executes dropped EXE 2 IoCs
  • Windows security modification 2 TTPs 4 IoCs
  • Modifies WinLogon 2 TTPs 5 IoCs
  • Drops file in System32 directory 9 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ccda6fb6bf98501a867736eabfce2140_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\ccda6fb6bf98501a867736eabfce2140_NeikiAnalytics.exe"
    1⤵
    • Drops file in System32 directory
    • Suspicious use of WriteProcessMemory
    PID:3812
    • C:\Windows\SysWOW64\blofuc-oucor.exe
      "C:\Windows\SysWOW64\blofuc-oucor.exe"
      2⤵
      • Windows security bypass
      • Modifies Installed Components in the registry
      • Sets file execution options in registry
      • Executes dropped EXE
      • Windows security modification
      • Modifies WinLogon
      • Drops file in System32 directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1184
      • C:\Windows\SysWOW64\blofuc-oucor.exe
        ùù¿çç¤
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        PID:4284

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\blofuc-oucor.exe

    Filesize

    67KB

    MD5

    02136d9f577f5962c730704d4320b8e0

    SHA1

    5798f72c72c44e3abde3b99af9a5652b42e893fd

    SHA256

    68060c4360750886f44239516672accec5cfda922f28c805d4c1c5e807879e0e

    SHA512

    22a099477a34d6c49d84744855b0083b709905dd4e36c454607f318ecd6b71369399aba59c1851ef8c5152a313d94fe6cbcf33b223d9ca9358c7223d1473d0dc

  • C:\Windows\SysWOW64\ordeader.dll

    Filesize

    5KB

    MD5

    f37b21c00fd81bd93c89ce741a88f183

    SHA1

    b2796500597c68e2f5638e1101b46eaf32676c1c

    SHA256

    76cf016fd77cb5a06c6ed4674ddc2345e8390c010cf344491a6e742baf2c0fb0

    SHA512

    252fe66dea9a4b9aebc5fd2f24434719cb25159ba51549d9de407f44b6a2f7bce6e071be02c4f2ad6aef588c77f12c00ed415eb54f96dec1b077326e101ce0f4

  • C:\Windows\SysWOW64\oubgetet.exe

    Filesize

    70KB

    MD5

    804ba3e894855730eabba21cadcefc3d

    SHA1

    32eb57be4715fe778f898a1e4b2ed711a85000cb

    SHA256

    57870303a52e136ddb40468c39dab843c47a274e3a93bd90905caa375151cbb7

    SHA512

    86770288c1cb93474d5cc39d5e128ceb63264d677c0edeeaf882045079d44dcbb16ab824383bfad8251249cebb296540fe1e65ea15f4ee536c1336d774a834f5

  • C:\Windows\SysWOW64\oubseaxeam-onom.exe

    Filesize

    69KB

    MD5

    547918cc63209ed44254455ae74d8fee

    SHA1

    3893dde6cb465951c9ccd2d55c6ba15e5c94ab7a

    SHA256

    9267627a0c98c487580e31bbfd928bd8d6b93a3434986ad4c5155905a87b1db8

    SHA512

    49f3e4ce844ccff09ccc6a6051228a7b87ccb7e4b47be9c9c776804ef7f61a03c94f2081f144bc7f217cfa94fa011111608b7f1e6427ab308a97bd7927a3d014

  • memory/1184-47-0x0000000000400000-0x0000000000414000-memory.dmp

    Filesize

    80KB

  • memory/3812-2-0x0000000000400000-0x0000000000403000-memory.dmp

    Filesize

    12KB

  • memory/4284-48-0x0000000000400000-0x0000000000414000-memory.dmp

    Filesize

    80KB