Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
11/05/2024, 04:48
Static task
static1
Behavioral task
behavioral1
Sample
80d1d610a8cf71539e9f035f1e13ee30_NeikiAnalytics.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
80d1d610a8cf71539e9f035f1e13ee30_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
80d1d610a8cf71539e9f035f1e13ee30_NeikiAnalytics.exe
-
Size
71KB
-
MD5
80d1d610a8cf71539e9f035f1e13ee30
-
SHA1
884310809f99ce8f7bd1b0771a9e6ce3afedf448
-
SHA256
80e83c0a1b591526fdf5ead39511afd6e4f43bac36c9803afe62ce10484c7f59
-
SHA512
d8191dca188a35aeec15b5dd00895b66db2044cd86d42832863b1a7e7b0350cce31726a81bc5c2c3819d4cb4af13a6aa7edb3a1739523a84d3f56700ecf79b7e
-
SSDEEP
1536:1teqKDlXvCDB04f5Gn/L8FlADNt3d1Hw8slx:Olg35GTslA5t3/w8W
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "25600" orkoavit-ufoas.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "25600" orkoavit-ufoas.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "25600" orkoavit-ufoas.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "25600" orkoavit-ufoas.exe -
Modifies Installed Components in the registry 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{4F424A49-5955-4945-4F42-4A4959554945} orkoavit-ufoas.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{4F424A49-5955-4945-4F42-4A4959554945}\01234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123 = "a" orkoavit-ufoas.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{4F424A49-5955-4945-4F42-4A4959554945}\IsInstalled = "1" orkoavit-ufoas.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{4F424A49-5955-4945-4F42-4A4959554945}\StubPath = "C:\\Windows\\system32\\udmoakoox.exe" orkoavit-ufoas.exe -
Sets file execution options in registry 2 TTPs 3 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\explorer.exe orkoavit-ufoas.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\explorer.exe\0123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890 = "a" orkoavit-ufoas.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\explorer.exe\Debugger = "C:\\Windows\\system32\\ellaxax-tix.exe" orkoavit-ufoas.exe -
Executes dropped EXE 2 IoCs
pid Process 5016 orkoavit-ufoas.exe 1480 orkoavit-ufoas.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "25600" orkoavit-ufoas.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "25600" orkoavit-ufoas.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "25600" orkoavit-ufoas.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "25600" orkoavit-ufoas.exe -
Modifies WinLogon 2 TTPs 5 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\{BC84DF00-BC38-9902-8082-6FCBF2D87A0B} orkoavit-ufoas.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify orkoavit-ufoas.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\{BC84DF00-BC38-9902-8082-6FCBF2D87A0B}\012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345 = "a" orkoavit-ufoas.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\{BC84DF00-BC38-9902-8082-6FCBF2D87A0B}\DLLName = "C:\\Windows\\system32\\abparear-ucom.dll" orkoavit-ufoas.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\{BC84DF00-BC38-9902-8082-6FCBF2D87A0B}\Startup = "Startup" orkoavit-ufoas.exe -
Drops file in System32 directory 9 IoCs
description ioc Process File created C:\Windows\SysWOW64\udmoakoox.exe orkoavit-ufoas.exe File opened for modification C:\Windows\SysWOW64\abparear-ucom.dll orkoavit-ufoas.exe File created C:\Windows\SysWOW64\abparear-ucom.dll orkoavit-ufoas.exe File opened for modification C:\Windows\SysWOW64\orkoavit-ufoas.exe 80d1d610a8cf71539e9f035f1e13ee30_NeikiAnalytics.exe File created C:\Windows\SysWOW64\orkoavit-ufoas.exe 80d1d610a8cf71539e9f035f1e13ee30_NeikiAnalytics.exe File opened for modification C:\Windows\SysWOW64\ellaxax-tix.exe orkoavit-ufoas.exe File created C:\Windows\SysWOW64\ellaxax-tix.exe orkoavit-ufoas.exe File opened for modification C:\Windows\SysWOW64\udmoakoox.exe orkoavit-ufoas.exe File opened for modification C:\Windows\SysWOW64\orkoavit-ufoas.exe orkoavit-ufoas.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 5016 orkoavit-ufoas.exe 5016 orkoavit-ufoas.exe 5016 orkoavit-ufoas.exe 5016 orkoavit-ufoas.exe 5016 orkoavit-ufoas.exe 5016 orkoavit-ufoas.exe 5016 orkoavit-ufoas.exe 5016 orkoavit-ufoas.exe 1480 orkoavit-ufoas.exe 1480 orkoavit-ufoas.exe 5016 orkoavit-ufoas.exe 5016 orkoavit-ufoas.exe 5016 orkoavit-ufoas.exe 5016 orkoavit-ufoas.exe 5016 orkoavit-ufoas.exe 5016 orkoavit-ufoas.exe 5016 orkoavit-ufoas.exe 5016 orkoavit-ufoas.exe 5016 orkoavit-ufoas.exe 5016 orkoavit-ufoas.exe 5016 orkoavit-ufoas.exe 5016 orkoavit-ufoas.exe 5016 orkoavit-ufoas.exe 5016 orkoavit-ufoas.exe 5016 orkoavit-ufoas.exe 5016 orkoavit-ufoas.exe 5016 orkoavit-ufoas.exe 5016 orkoavit-ufoas.exe 5016 orkoavit-ufoas.exe 5016 orkoavit-ufoas.exe 5016 orkoavit-ufoas.exe 5016 orkoavit-ufoas.exe 5016 orkoavit-ufoas.exe 5016 orkoavit-ufoas.exe 5016 orkoavit-ufoas.exe 5016 orkoavit-ufoas.exe 5016 orkoavit-ufoas.exe 5016 orkoavit-ufoas.exe 5016 orkoavit-ufoas.exe 5016 orkoavit-ufoas.exe 5016 orkoavit-ufoas.exe 5016 orkoavit-ufoas.exe 5016 orkoavit-ufoas.exe 5016 orkoavit-ufoas.exe 5016 orkoavit-ufoas.exe 5016 orkoavit-ufoas.exe 5016 orkoavit-ufoas.exe 5016 orkoavit-ufoas.exe 5016 orkoavit-ufoas.exe 5016 orkoavit-ufoas.exe 5016 orkoavit-ufoas.exe 5016 orkoavit-ufoas.exe 5016 orkoavit-ufoas.exe 5016 orkoavit-ufoas.exe 5016 orkoavit-ufoas.exe 5016 orkoavit-ufoas.exe 5016 orkoavit-ufoas.exe 5016 orkoavit-ufoas.exe 5016 orkoavit-ufoas.exe 5016 orkoavit-ufoas.exe 5016 orkoavit-ufoas.exe 5016 orkoavit-ufoas.exe 5016 orkoavit-ufoas.exe 5016 orkoavit-ufoas.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4364 80d1d610a8cf71539e9f035f1e13ee30_NeikiAnalytics.exe Token: SeDebugPrivilege 5016 orkoavit-ufoas.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4364 wrote to memory of 5016 4364 80d1d610a8cf71539e9f035f1e13ee30_NeikiAnalytics.exe 83 PID 4364 wrote to memory of 5016 4364 80d1d610a8cf71539e9f035f1e13ee30_NeikiAnalytics.exe 83 PID 4364 wrote to memory of 5016 4364 80d1d610a8cf71539e9f035f1e13ee30_NeikiAnalytics.exe 83 PID 5016 wrote to memory of 1480 5016 orkoavit-ufoas.exe 84 PID 5016 wrote to memory of 1480 5016 orkoavit-ufoas.exe 84 PID 5016 wrote to memory of 1480 5016 orkoavit-ufoas.exe 84 PID 5016 wrote to memory of 616 5016 orkoavit-ufoas.exe 5 PID 5016 wrote to memory of 3448 5016 orkoavit-ufoas.exe 56 PID 5016 wrote to memory of 3448 5016 orkoavit-ufoas.exe 56 PID 5016 wrote to memory of 3448 5016 orkoavit-ufoas.exe 56 PID 5016 wrote to memory of 3448 5016 orkoavit-ufoas.exe 56 PID 5016 wrote to memory of 3448 5016 orkoavit-ufoas.exe 56 PID 5016 wrote to memory of 3448 5016 orkoavit-ufoas.exe 56 PID 5016 wrote to memory of 3448 5016 orkoavit-ufoas.exe 56 PID 5016 wrote to memory of 3448 5016 orkoavit-ufoas.exe 56 PID 5016 wrote to memory of 3448 5016 orkoavit-ufoas.exe 56 PID 5016 wrote to memory of 3448 5016 orkoavit-ufoas.exe 56 PID 5016 wrote to memory of 3448 5016 orkoavit-ufoas.exe 56 PID 5016 wrote to memory of 3448 5016 orkoavit-ufoas.exe 56 PID 5016 wrote to memory of 3448 5016 orkoavit-ufoas.exe 56 PID 5016 wrote to memory of 3448 5016 orkoavit-ufoas.exe 56 PID 5016 wrote to memory of 3448 5016 orkoavit-ufoas.exe 56 PID 5016 wrote to memory of 3448 5016 orkoavit-ufoas.exe 56 PID 5016 wrote to memory of 3448 5016 orkoavit-ufoas.exe 56 PID 5016 wrote to memory of 3448 5016 orkoavit-ufoas.exe 56 PID 5016 wrote to memory of 3448 5016 orkoavit-ufoas.exe 56 PID 5016 wrote to memory of 3448 5016 orkoavit-ufoas.exe 56 PID 5016 wrote to memory of 3448 5016 orkoavit-ufoas.exe 56 PID 5016 wrote to memory of 3448 5016 orkoavit-ufoas.exe 56 PID 5016 wrote to memory of 3448 5016 orkoavit-ufoas.exe 56 PID 5016 wrote to memory of 3448 5016 orkoavit-ufoas.exe 56 PID 5016 wrote to memory of 3448 5016 orkoavit-ufoas.exe 56 PID 5016 wrote to memory of 3448 5016 orkoavit-ufoas.exe 56 PID 5016 wrote to memory of 3448 5016 orkoavit-ufoas.exe 56 PID 5016 wrote to memory of 3448 5016 orkoavit-ufoas.exe 56 PID 5016 wrote to memory of 3448 5016 orkoavit-ufoas.exe 56 PID 5016 wrote to memory of 3448 5016 orkoavit-ufoas.exe 56 PID 5016 wrote to memory of 3448 5016 orkoavit-ufoas.exe 56 PID 5016 wrote to memory of 3448 5016 orkoavit-ufoas.exe 56 PID 5016 wrote to memory of 3448 5016 orkoavit-ufoas.exe 56 PID 5016 wrote to memory of 3448 5016 orkoavit-ufoas.exe 56 PID 5016 wrote to memory of 3448 5016 orkoavit-ufoas.exe 56 PID 5016 wrote to memory of 3448 5016 orkoavit-ufoas.exe 56 PID 5016 wrote to memory of 3448 5016 orkoavit-ufoas.exe 56 PID 5016 wrote to memory of 3448 5016 orkoavit-ufoas.exe 56 PID 5016 wrote to memory of 3448 5016 orkoavit-ufoas.exe 56 PID 5016 wrote to memory of 3448 5016 orkoavit-ufoas.exe 56 PID 5016 wrote to memory of 3448 5016 orkoavit-ufoas.exe 56 PID 5016 wrote to memory of 3448 5016 orkoavit-ufoas.exe 56 PID 5016 wrote to memory of 3448 5016 orkoavit-ufoas.exe 56 PID 5016 wrote to memory of 3448 5016 orkoavit-ufoas.exe 56 PID 5016 wrote to memory of 3448 5016 orkoavit-ufoas.exe 56 PID 5016 wrote to memory of 3448 5016 orkoavit-ufoas.exe 56 PID 5016 wrote to memory of 3448 5016 orkoavit-ufoas.exe 56 PID 5016 wrote to memory of 3448 5016 orkoavit-ufoas.exe 56 PID 5016 wrote to memory of 3448 5016 orkoavit-ufoas.exe 56 PID 5016 wrote to memory of 3448 5016 orkoavit-ufoas.exe 56 PID 5016 wrote to memory of 3448 5016 orkoavit-ufoas.exe 56 PID 5016 wrote to memory of 3448 5016 orkoavit-ufoas.exe 56 PID 5016 wrote to memory of 3448 5016 orkoavit-ufoas.exe 56 PID 5016 wrote to memory of 3448 5016 orkoavit-ufoas.exe 56 PID 5016 wrote to memory of 3448 5016 orkoavit-ufoas.exe 56 PID 5016 wrote to memory of 3448 5016 orkoavit-ufoas.exe 56 PID 5016 wrote to memory of 3448 5016 orkoavit-ufoas.exe 56
Processes
-
C:\Windows\system32\winlogon.exewinlogon.exe1⤵PID:616
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3448
-
C:\Users\Admin\AppData\Local\Temp\80d1d610a8cf71539e9f035f1e13ee30_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\80d1d610a8cf71539e9f035f1e13ee30_NeikiAnalytics.exe"2⤵
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4364 -
C:\Windows\SysWOW64\orkoavit-ufoas.exe"C:\Windows\system32\orkoavit-ufoas.exe"3⤵
- Windows security bypass
- Modifies Installed Components in the registry
- Sets file execution options in registry
- Executes dropped EXE
- Windows security modification
- Modifies WinLogon
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5016 -
C:\Windows\SysWOW64\orkoavit-ufoas.exe--k33p4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:1480
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5KB
MD5f37b21c00fd81bd93c89ce741a88f183
SHA1b2796500597c68e2f5638e1101b46eaf32676c1c
SHA25676cf016fd77cb5a06c6ed4674ddc2345e8390c010cf344491a6e742baf2c0fb0
SHA512252fe66dea9a4b9aebc5fd2f24434719cb25159ba51549d9de407f44b6a2f7bce6e071be02c4f2ad6aef588c77f12c00ed415eb54f96dec1b077326e101ce0f4
-
Filesize
74KB
MD5d300f13eb8d6e37d07352dd2f85b516c
SHA117580d429b5d98da513b33d9ec440ae742837681
SHA25656948f404678f8b8040ce932eee7668362976f79f6c8bf58d9b76a9b614e1243
SHA5126fdc955fd924d93f1a889f24c7688939826a65776179aff2d2c396f3b72b612a11e7433769b2c67d5bbbbad3e665bc0f48ed7f1986467542c5297a181fb54be4
-
Filesize
71KB
MD580d1d610a8cf71539e9f035f1e13ee30
SHA1884310809f99ce8f7bd1b0771a9e6ce3afedf448
SHA25680e83c0a1b591526fdf5ead39511afd6e4f43bac36c9803afe62ce10484c7f59
SHA512d8191dca188a35aeec15b5dd00895b66db2044cd86d42832863b1a7e7b0350cce31726a81bc5c2c3819d4cb4af13a6aa7edb3a1739523a84d3f56700ecf79b7e
-
Filesize
73KB
MD5ccb1c3211cb6925fea8960ae16f92ee4
SHA124bf5c99594ee114436e18901255891f4bfc2f13
SHA256450c1844aee1fa2f2eed79c28855b9b53d0fc2d8edbfa3e6ab95a1d657c13b33
SHA512f9529cf4a28860acf14cd2a146fb3bab7f78e7258abeb1574653526c604c736ff0feb50d9ac624c0c79f71f25893105db36376babe649e876baf64f78e95f88b