Analysis

  • max time kernel
    149s
  • max time network
    146s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11-05-2024 12:22

General

  • Target

    026281498999d944f7a72ec151c2fd50_NeikiAnalytics.exe

  • Size

    70KB

  • MD5

    026281498999d944f7a72ec151c2fd50

  • SHA1

    8d329d232804af77e093379d987d187db3224ba0

  • SHA256

    68b13f28eb7c157beced1f6f8c8ad6b1fa2b669c1b97e9635ed0472b08ba0801

  • SHA512

    1d9da23a582410ccf95ca650e908b4d1b8fd68ff555cac8179c912032e81b6cbaa1fd7c76790e5e3b0230a6afbd741ac7e4eddc0b5c648f431f44894abb51070

  • SSDEEP

    1536:1teqKDlXvCDB04f5Gn/L8FlADNt3d1Hw8n:Olg35GTslA5t3/w8n

Malware Config

Signatures

  • Windows security bypass 2 TTPs 4 IoCs
  • Modifies Installed Components in the registry 2 TTPs 4 IoCs
  • Sets file execution options in registry 2 TTPs 3 IoCs
  • Executes dropped EXE 2 IoCs
  • Windows security modification 2 TTPs 4 IoCs
  • Modifies WinLogon 2 TTPs 5 IoCs
  • Drops file in System32 directory 9 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\system32\winlogon.exe
    winlogon.exe
    1⤵
      PID:604
    • C:\Windows\Explorer.EXE
      C:\Windows\Explorer.EXE
      1⤵
        PID:3456
        • C:\Users\Admin\AppData\Local\Temp\026281498999d944f7a72ec151c2fd50_NeikiAnalytics.exe
          "C:\Users\Admin\AppData\Local\Temp\026281498999d944f7a72ec151c2fd50_NeikiAnalytics.exe"
          2⤵
          • Drops file in System32 directory
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:5104
          • C:\Windows\SysWOW64\encadeb.exe
            "C:\Windows\system32\encadeb.exe"
            3⤵
            • Windows security bypass
            • Modifies Installed Components in the registry
            • Sets file execution options in registry
            • Executes dropped EXE
            • Windows security modification
            • Modifies WinLogon
            • Drops file in System32 directory
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:2868
            • C:\Windows\SysWOW64\encadeb.exe
              --k33p
              4⤵
              • Executes dropped EXE
              • Suspicious behavior: EnumeratesProcesses
              PID:4952

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Windows\SysWOW64\encadeb.exe

        Filesize

        70KB

        MD5

        026281498999d944f7a72ec151c2fd50

        SHA1

        8d329d232804af77e093379d987d187db3224ba0

        SHA256

        68b13f28eb7c157beced1f6f8c8ad6b1fa2b669c1b97e9635ed0472b08ba0801

        SHA512

        1d9da23a582410ccf95ca650e908b4d1b8fd68ff555cac8179c912032e81b6cbaa1fd7c76790e5e3b0230a6afbd741ac7e4eddc0b5c648f431f44894abb51070

      • C:\Windows\SysWOW64\icgukeaf-efum.exe

        Filesize

        72KB

        MD5

        c49f2c5dd7032432309659f98202214d

        SHA1

        bf2243239c0ca0f4849a8056286861c560ecfa18

        SHA256

        7f74ce3ed8c3c1688bb981094cfbeb437ee37df75f047a1e8ce2b9681dc9bdb4

        SHA512

        d6c804abf8f642cc17b43e55fbf35f76fc933d996d650a7c6165a73f82d91b0b2f883e8e55ee188bc809fe75e7498edb28efe7ffc328e8a71fa72cd3e1364fd6

      • C:\Windows\SysWOW64\ixtofoat-oudor.exe

        Filesize

        73KB

        MD5

        c6b97f8a9f15b6c502f6300b5d32e2b4

        SHA1

        08fb900e19d09840328632a07e20f640807a5955

        SHA256

        ad852dade7fc55b9b5fde13941d7c5e683e9cef0ba87107a7bc68979ae6ae27f

        SHA512

        c3b793c4722bbfd935fff8dd0149d4c2dc76bd926ffae6918319cc99424aef1f10b3678989bdb4503fad2b767e9cc9a9f8bc6174b1aa7a15dab2858b11a7ff73

      • C:\Windows\SysWOW64\uhsoorex-adac.dll

        Filesize

        5KB

        MD5

        f37b21c00fd81bd93c89ce741a88f183

        SHA1

        b2796500597c68e2f5638e1101b46eaf32676c1c

        SHA256

        76cf016fd77cb5a06c6ed4674ddc2345e8390c010cf344491a6e742baf2c0fb0

        SHA512

        252fe66dea9a4b9aebc5fd2f24434719cb25159ba51549d9de407f44b6a2f7bce6e071be02c4f2ad6aef588c77f12c00ed415eb54f96dec1b077326e101ce0f4

      • memory/2868-49-0x0000000000400000-0x0000000000414000-memory.dmp

        Filesize

        80KB

      • memory/4952-50-0x0000000000400000-0x0000000000414000-memory.dmp

        Filesize

        80KB

      • memory/5104-5-0x0000000000400000-0x0000000000414000-memory.dmp

        Filesize

        80KB