Analysis
-
max time kernel
149s -
max time network
158s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
10/05/2024, 19:41
Static task
static1
Behavioral task
behavioral1
Sample
593902335b78f72a1688ef82c19d51e0_NeikiAnalytics.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
593902335b78f72a1688ef82c19d51e0_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
593902335b78f72a1688ef82c19d51e0_NeikiAnalytics.exe
-
Size
71KB
-
MD5
593902335b78f72a1688ef82c19d51e0
-
SHA1
11239f3c657b35f29b7b9faed2114c1d9b382294
-
SHA256
9a0006d1015802c59fa5adb80a0b04d3007c76566805e11c55174d57431ce01f
-
SHA512
77415cdc052260f1926f004058f1a6d62f9aa436cf27ac57f394b315ec4911d331413ce34384dae7596e41d904c3e2556b9e0889eabc6f518263ace68c1397d8
-
SSDEEP
1536:1teqKDlXvCDB04f5Gn/L8FlADNt3d1Hw8slS:Olg35GTslA5t3/w8V
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "25600" ispoafav-imoas.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "25600" ispoafav-imoas.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "25600" ispoafav-imoas.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "25600" ispoafav-imoas.exe -
Modifies Installed Components in the registry 2 TTPs 4 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{534E4656-4751-4c55-534E-465647514c55}\IsInstalled = "1" ispoafav-imoas.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{534E4656-4751-4c55-534E-465647514c55}\StubPath = "C:\\Windows\\system32\\bnoacoon-icor.exe" ispoafav-imoas.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{534E4656-4751-4c55-534E-465647514c55} ispoafav-imoas.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{534E4656-4751-4c55-534E-465647514c55}\01234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123 = "a" ispoafav-imoas.exe -
Sets file execution options in registry 2 TTPs 3 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\explorer.exe ispoafav-imoas.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\explorer.exe\0123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890 = "a" ispoafav-imoas.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\explorer.exe\Debugger = "C:\\Windows\\system32\\enladeac-dex.exe" ispoafav-imoas.exe -
Executes dropped EXE 2 IoCs
pid Process 808 ispoafav-imoas.exe 3984 ispoafav-imoas.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "25600" ispoafav-imoas.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "25600" ispoafav-imoas.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "25600" ispoafav-imoas.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "25600" ispoafav-imoas.exe -
Modifies WinLogon 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\{BC84DF00-BC38-9902-8082-6FCBF2D87A0B}\Startup = "Startup" ispoafav-imoas.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\{BC84DF00-BC38-9902-8082-6FCBF2D87A0B} ispoafav-imoas.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify ispoafav-imoas.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\{BC84DF00-BC38-9902-8082-6FCBF2D87A0B}\012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345 = "a" ispoafav-imoas.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\{BC84DF00-BC38-9902-8082-6FCBF2D87A0B}\DLLName = "C:\\Windows\\system32\\ixbahup.dll" ispoafav-imoas.exe -
Drops file in System32 directory 9 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\ispoafav-imoas.exe 593902335b78f72a1688ef82c19d51e0_NeikiAnalytics.exe File created C:\Windows\SysWOW64\ispoafav-imoas.exe 593902335b78f72a1688ef82c19d51e0_NeikiAnalytics.exe File opened for modification C:\Windows\SysWOW64\enladeac-dex.exe ispoafav-imoas.exe File opened for modification C:\Windows\SysWOW64\bnoacoon-icor.exe ispoafav-imoas.exe File opened for modification C:\Windows\SysWOW64\ispoafav-imoas.exe ispoafav-imoas.exe File created C:\Windows\SysWOW64\enladeac-dex.exe ispoafav-imoas.exe File created C:\Windows\SysWOW64\bnoacoon-icor.exe ispoafav-imoas.exe File opened for modification C:\Windows\SysWOW64\ixbahup.dll ispoafav-imoas.exe File created C:\Windows\SysWOW64\ixbahup.dll ispoafav-imoas.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 808 ispoafav-imoas.exe 808 ispoafav-imoas.exe 808 ispoafav-imoas.exe 808 ispoafav-imoas.exe 808 ispoafav-imoas.exe 808 ispoafav-imoas.exe 808 ispoafav-imoas.exe 808 ispoafav-imoas.exe 3984 ispoafav-imoas.exe 3984 ispoafav-imoas.exe 808 ispoafav-imoas.exe 808 ispoafav-imoas.exe 808 ispoafav-imoas.exe 808 ispoafav-imoas.exe 808 ispoafav-imoas.exe 808 ispoafav-imoas.exe 808 ispoafav-imoas.exe 808 ispoafav-imoas.exe 808 ispoafav-imoas.exe 808 ispoafav-imoas.exe 808 ispoafav-imoas.exe 808 ispoafav-imoas.exe 808 ispoafav-imoas.exe 808 ispoafav-imoas.exe 808 ispoafav-imoas.exe 808 ispoafav-imoas.exe 808 ispoafav-imoas.exe 808 ispoafav-imoas.exe 808 ispoafav-imoas.exe 808 ispoafav-imoas.exe 808 ispoafav-imoas.exe 808 ispoafav-imoas.exe 808 ispoafav-imoas.exe 808 ispoafav-imoas.exe 808 ispoafav-imoas.exe 808 ispoafav-imoas.exe 808 ispoafav-imoas.exe 808 ispoafav-imoas.exe 808 ispoafav-imoas.exe 808 ispoafav-imoas.exe 808 ispoafav-imoas.exe 808 ispoafav-imoas.exe 808 ispoafav-imoas.exe 808 ispoafav-imoas.exe 808 ispoafav-imoas.exe 808 ispoafav-imoas.exe 808 ispoafav-imoas.exe 808 ispoafav-imoas.exe 808 ispoafav-imoas.exe 808 ispoafav-imoas.exe 808 ispoafav-imoas.exe 808 ispoafav-imoas.exe 808 ispoafav-imoas.exe 808 ispoafav-imoas.exe 808 ispoafav-imoas.exe 808 ispoafav-imoas.exe 808 ispoafav-imoas.exe 808 ispoafav-imoas.exe 808 ispoafav-imoas.exe 808 ispoafav-imoas.exe 808 ispoafav-imoas.exe 808 ispoafav-imoas.exe 808 ispoafav-imoas.exe 808 ispoafav-imoas.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4428 593902335b78f72a1688ef82c19d51e0_NeikiAnalytics.exe Token: SeDebugPrivilege 808 ispoafav-imoas.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4428 wrote to memory of 808 4428 593902335b78f72a1688ef82c19d51e0_NeikiAnalytics.exe 81 PID 4428 wrote to memory of 808 4428 593902335b78f72a1688ef82c19d51e0_NeikiAnalytics.exe 81 PID 4428 wrote to memory of 808 4428 593902335b78f72a1688ef82c19d51e0_NeikiAnalytics.exe 81 PID 808 wrote to memory of 612 808 ispoafav-imoas.exe 5 PID 808 wrote to memory of 3984 808 ispoafav-imoas.exe 82 PID 808 wrote to memory of 3984 808 ispoafav-imoas.exe 82 PID 808 wrote to memory of 3984 808 ispoafav-imoas.exe 82 PID 808 wrote to memory of 3456 808 ispoafav-imoas.exe 56 PID 808 wrote to memory of 3456 808 ispoafav-imoas.exe 56 PID 808 wrote to memory of 3456 808 ispoafav-imoas.exe 56 PID 808 wrote to memory of 3456 808 ispoafav-imoas.exe 56 PID 808 wrote to memory of 3456 808 ispoafav-imoas.exe 56 PID 808 wrote to memory of 3456 808 ispoafav-imoas.exe 56 PID 808 wrote to memory of 3456 808 ispoafav-imoas.exe 56 PID 808 wrote to memory of 3456 808 ispoafav-imoas.exe 56 PID 808 wrote to memory of 3456 808 ispoafav-imoas.exe 56 PID 808 wrote to memory of 3456 808 ispoafav-imoas.exe 56 PID 808 wrote to memory of 3456 808 ispoafav-imoas.exe 56 PID 808 wrote to memory of 3456 808 ispoafav-imoas.exe 56 PID 808 wrote to memory of 3456 808 ispoafav-imoas.exe 56 PID 808 wrote to memory of 3456 808 ispoafav-imoas.exe 56 PID 808 wrote to memory of 3456 808 ispoafav-imoas.exe 56 PID 808 wrote to memory of 3456 808 ispoafav-imoas.exe 56 PID 808 wrote to memory of 3456 808 ispoafav-imoas.exe 56 PID 808 wrote to memory of 3456 808 ispoafav-imoas.exe 56 PID 808 wrote to memory of 3456 808 ispoafav-imoas.exe 56 PID 808 wrote to memory of 3456 808 ispoafav-imoas.exe 56 PID 808 wrote to memory of 3456 808 ispoafav-imoas.exe 56 PID 808 wrote to memory of 3456 808 ispoafav-imoas.exe 56 PID 808 wrote to memory of 3456 808 ispoafav-imoas.exe 56 PID 808 wrote to memory of 3456 808 ispoafav-imoas.exe 56 PID 808 wrote to memory of 3456 808 ispoafav-imoas.exe 56 PID 808 wrote to memory of 3456 808 ispoafav-imoas.exe 56 PID 808 wrote to memory of 3456 808 ispoafav-imoas.exe 56 PID 808 wrote to memory of 3456 808 ispoafav-imoas.exe 56 PID 808 wrote to memory of 3456 808 ispoafav-imoas.exe 56 PID 808 wrote to memory of 3456 808 ispoafav-imoas.exe 56 PID 808 wrote to memory of 3456 808 ispoafav-imoas.exe 56 PID 808 wrote to memory of 3456 808 ispoafav-imoas.exe 56 PID 808 wrote to memory of 3456 808 ispoafav-imoas.exe 56 PID 808 wrote to memory of 3456 808 ispoafav-imoas.exe 56 PID 808 wrote to memory of 3456 808 ispoafav-imoas.exe 56 PID 808 wrote to memory of 3456 808 ispoafav-imoas.exe 56 PID 808 wrote to memory of 3456 808 ispoafav-imoas.exe 56 PID 808 wrote to memory of 3456 808 ispoafav-imoas.exe 56 PID 808 wrote to memory of 3456 808 ispoafav-imoas.exe 56 PID 808 wrote to memory of 3456 808 ispoafav-imoas.exe 56 PID 808 wrote to memory of 3456 808 ispoafav-imoas.exe 56 PID 808 wrote to memory of 3456 808 ispoafav-imoas.exe 56 PID 808 wrote to memory of 3456 808 ispoafav-imoas.exe 56 PID 808 wrote to memory of 3456 808 ispoafav-imoas.exe 56 PID 808 wrote to memory of 3456 808 ispoafav-imoas.exe 56 PID 808 wrote to memory of 3456 808 ispoafav-imoas.exe 56 PID 808 wrote to memory of 3456 808 ispoafav-imoas.exe 56 PID 808 wrote to memory of 3456 808 ispoafav-imoas.exe 56 PID 808 wrote to memory of 3456 808 ispoafav-imoas.exe 56 PID 808 wrote to memory of 3456 808 ispoafav-imoas.exe 56 PID 808 wrote to memory of 3456 808 ispoafav-imoas.exe 56 PID 808 wrote to memory of 3456 808 ispoafav-imoas.exe 56 PID 808 wrote to memory of 3456 808 ispoafav-imoas.exe 56 PID 808 wrote to memory of 3456 808 ispoafav-imoas.exe 56 PID 808 wrote to memory of 3456 808 ispoafav-imoas.exe 56 PID 808 wrote to memory of 3456 808 ispoafav-imoas.exe 56 PID 808 wrote to memory of 3456 808 ispoafav-imoas.exe 56
Processes
-
C:\Windows\system32\winlogon.exewinlogon.exe1⤵PID:612
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3456
-
C:\Users\Admin\AppData\Local\Temp\593902335b78f72a1688ef82c19d51e0_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\593902335b78f72a1688ef82c19d51e0_NeikiAnalytics.exe"2⤵
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4428 -
C:\Windows\SysWOW64\ispoafav-imoas.exe"C:\Windows\system32\ispoafav-imoas.exe"3⤵
- Windows security bypass
- Modifies Installed Components in the registry
- Sets file execution options in registry
- Executes dropped EXE
- Windows security modification
- Modifies WinLogon
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:808 -
C:\Windows\SysWOW64\ispoafav-imoas.exe--k33p4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:3984
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
73KB
MD51d6e71fbab70417814d87e0ef031ffa8
SHA198fed30b76e25db5ca37c5955100d21f78f49532
SHA256ac37ff36e49a2982d4465f40092f3ad8920172a3a05a34a5c17ba06102d07afb
SHA5125bd9351c9250ee0f28c72eb84814175a2299b2289d02bcaf3394ff727026426d66846c5638a7772bf0a6fcf4e918d8e22e4433f952850191244d96cba4fcdc8f
-
Filesize
74KB
MD5ec8c08b827c469e542047e223b171985
SHA1a24ac2a569490d9c56e8b3407964a394ce92c6dd
SHA25686549f2d46230237ca601a3c2da197f3615c91161644389284b5ebba596f495a
SHA512bcf42da29c6b01dbe535eb56aa0a893f518b925fc1205fb2e32638387f108d20d800cf9c329a19cf8d191d553e4dadaf79c8f7e01c11033678273fd44607ec45
-
Filesize
71KB
MD5593902335b78f72a1688ef82c19d51e0
SHA111239f3c657b35f29b7b9faed2114c1d9b382294
SHA2569a0006d1015802c59fa5adb80a0b04d3007c76566805e11c55174d57431ce01f
SHA51277415cdc052260f1926f004058f1a6d62f9aa436cf27ac57f394b315ec4911d331413ce34384dae7596e41d904c3e2556b9e0889eabc6f518263ace68c1397d8
-
Filesize
5KB
MD5f37b21c00fd81bd93c89ce741a88f183
SHA1b2796500597c68e2f5638e1101b46eaf32676c1c
SHA25676cf016fd77cb5a06c6ed4674ddc2345e8390c010cf344491a6e742baf2c0fb0
SHA512252fe66dea9a4b9aebc5fd2f24434719cb25159ba51549d9de407f44b6a2f7bce6e071be02c4f2ad6aef588c77f12c00ed415eb54f96dec1b077326e101ce0f4