Analysis

  • max time kernel
    149s
  • max time network
    158s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10/05/2024, 19:41

General

  • Target

    593902335b78f72a1688ef82c19d51e0_NeikiAnalytics.exe

  • Size

    71KB

  • MD5

    593902335b78f72a1688ef82c19d51e0

  • SHA1

    11239f3c657b35f29b7b9faed2114c1d9b382294

  • SHA256

    9a0006d1015802c59fa5adb80a0b04d3007c76566805e11c55174d57431ce01f

  • SHA512

    77415cdc052260f1926f004058f1a6d62f9aa436cf27ac57f394b315ec4911d331413ce34384dae7596e41d904c3e2556b9e0889eabc6f518263ace68c1397d8

  • SSDEEP

    1536:1teqKDlXvCDB04f5Gn/L8FlADNt3d1Hw8slS:Olg35GTslA5t3/w8V

Malware Config

Signatures

  • Windows security bypass 2 TTPs 4 IoCs
  • Modifies Installed Components in the registry 2 TTPs 4 IoCs
  • Sets file execution options in registry 2 TTPs 3 IoCs
  • Executes dropped EXE 2 IoCs
  • Windows security modification 2 TTPs 4 IoCs
  • Modifies WinLogon 2 TTPs 5 IoCs
  • Drops file in System32 directory 9 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\system32\winlogon.exe
    winlogon.exe
    1⤵
      PID:612
    • C:\Windows\Explorer.EXE
      C:\Windows\Explorer.EXE
      1⤵
        PID:3456
        • C:\Users\Admin\AppData\Local\Temp\593902335b78f72a1688ef82c19d51e0_NeikiAnalytics.exe
          "C:\Users\Admin\AppData\Local\Temp\593902335b78f72a1688ef82c19d51e0_NeikiAnalytics.exe"
          2⤵
          • Drops file in System32 directory
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:4428
          • C:\Windows\SysWOW64\ispoafav-imoas.exe
            "C:\Windows\system32\ispoafav-imoas.exe"
            3⤵
            • Windows security bypass
            • Modifies Installed Components in the registry
            • Sets file execution options in registry
            • Executes dropped EXE
            • Windows security modification
            • Modifies WinLogon
            • Drops file in System32 directory
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:808
            • C:\Windows\SysWOW64\ispoafav-imoas.exe
              --k33p
              4⤵
              • Executes dropped EXE
              • Suspicious behavior: EnumeratesProcesses
              PID:3984

      Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Windows\SysWOW64\bnoacoon-icor.exe

              Filesize

              73KB

              MD5

              1d6e71fbab70417814d87e0ef031ffa8

              SHA1

              98fed30b76e25db5ca37c5955100d21f78f49532

              SHA256

              ac37ff36e49a2982d4465f40092f3ad8920172a3a05a34a5c17ba06102d07afb

              SHA512

              5bd9351c9250ee0f28c72eb84814175a2299b2289d02bcaf3394ff727026426d66846c5638a7772bf0a6fcf4e918d8e22e4433f952850191244d96cba4fcdc8f

            • C:\Windows\SysWOW64\enladeac-dex.exe

              Filesize

              74KB

              MD5

              ec8c08b827c469e542047e223b171985

              SHA1

              a24ac2a569490d9c56e8b3407964a394ce92c6dd

              SHA256

              86549f2d46230237ca601a3c2da197f3615c91161644389284b5ebba596f495a

              SHA512

              bcf42da29c6b01dbe535eb56aa0a893f518b925fc1205fb2e32638387f108d20d800cf9c329a19cf8d191d553e4dadaf79c8f7e01c11033678273fd44607ec45

            • C:\Windows\SysWOW64\ispoafav-imoas.exe

              Filesize

              71KB

              MD5

              593902335b78f72a1688ef82c19d51e0

              SHA1

              11239f3c657b35f29b7b9faed2114c1d9b382294

              SHA256

              9a0006d1015802c59fa5adb80a0b04d3007c76566805e11c55174d57431ce01f

              SHA512

              77415cdc052260f1926f004058f1a6d62f9aa436cf27ac57f394b315ec4911d331413ce34384dae7596e41d904c3e2556b9e0889eabc6f518263ace68c1397d8

            • C:\Windows\SysWOW64\ixbahup.dll

              Filesize

              5KB

              MD5

              f37b21c00fd81bd93c89ce741a88f183

              SHA1

              b2796500597c68e2f5638e1101b46eaf32676c1c

              SHA256

              76cf016fd77cb5a06c6ed4674ddc2345e8390c010cf344491a6e742baf2c0fb0

              SHA512

              252fe66dea9a4b9aebc5fd2f24434719cb25159ba51549d9de407f44b6a2f7bce6e071be02c4f2ad6aef588c77f12c00ed415eb54f96dec1b077326e101ce0f4

            • memory/808-49-0x0000000000400000-0x0000000000414000-memory.dmp

              Filesize

              80KB

            • memory/3984-50-0x0000000000400000-0x0000000000414000-memory.dmp

              Filesize

              80KB

            • memory/4428-6-0x0000000000400000-0x0000000000414000-memory.dmp

              Filesize

              80KB