Analysis
-
max time kernel
149s -
max time network
100s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
12/05/2024, 18:59
Static task
static1
Behavioral task
behavioral1
Sample
435de6d7d44b9215581fcf94506fabc0_NeikiAnalytics.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
435de6d7d44b9215581fcf94506fabc0_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
435de6d7d44b9215581fcf94506fabc0_NeikiAnalytics.exe
-
Size
73KB
-
MD5
435de6d7d44b9215581fcf94506fabc0
-
SHA1
9cbae3fd696615691e3fcafe5b46ed0e78e2613c
-
SHA256
cf6d2ebde36b67d9762736bffbc12ff3411944b136693f5983aab7c6cfb8ea10
-
SHA512
9e54b0db2b3daf3e766318391734247f684a9755043325b9882343c2205ee11ba5dd4085f432f495bc415efc8afe4eafeb3fa3eccf5961ceb8f944cb6274a415
-
SSDEEP
1536:xDytoYTXnoFxGjYUsWIYUzubBMiIt4S/7SCEZQcRKCO9VYQKKKuNTv:eFTh9MiW4euTQcIVVYHeNj
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "25600" knogob.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "25600" knogob.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "25600" knogob.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "25600" knogob.exe -
Modifies Installed Components in the registry 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{47534147-4d48-4351-4753-41474D484351} knogob.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{47534147-4d48-4351-4753-41474D484351}\01234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123 = "a" knogob.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{47534147-4d48-4351-4753-41474D484351}\IsInstalled = "1" knogob.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{47534147-4d48-4351-4753-41474D484351}\StubPath = "C:\\Windows\\system32\\ouglugeat.exe" knogob.exe -
Sets file execution options in registry 2 TTPs 3 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\explorer.exe knogob.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\explorer.exe\0123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890 = "a" knogob.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\explorer.exe\Debugger = "C:\\Windows\\system32\\mcegex-atix.exe" knogob.exe -
Executes dropped EXE 2 IoCs
pid Process 1724 knogob.exe 2748 knogob.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "25600" knogob.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "25600" knogob.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "25600" knogob.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "25600" knogob.exe -
Modifies WinLogon 2 TTPs 5 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\{BC84DF00-BC38-9902-8082-6FCBF2D87A0B} knogob.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify knogob.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\{BC84DF00-BC38-9902-8082-6FCBF2D87A0B}\012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345 = "a" knogob.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\{BC84DF00-BC38-9902-8082-6FCBF2D87A0B}\DLLName = "C:\\Windows\\system32\\ehranim-outat.dll" knogob.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\{BC84DF00-BC38-9902-8082-6FCBF2D87A0B}\Startup = "Startup" knogob.exe -
Drops file in System32 directory 9 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\knogob.exe knogob.exe File opened for modification C:\Windows\SysWOW64\knogob.exe 435de6d7d44b9215581fcf94506fabc0_NeikiAnalytics.exe File created C:\Windows\SysWOW64\ouglugeat.exe knogob.exe File opened for modification C:\Windows\SysWOW64\ehranim-outat.dll knogob.exe File opened for modification C:\Windows\SysWOW64\ouglugeat.exe knogob.exe File created C:\Windows\SysWOW64\ehranim-outat.dll knogob.exe File created C:\Windows\SysWOW64\knogob.exe 435de6d7d44b9215581fcf94506fabc0_NeikiAnalytics.exe File opened for modification C:\Windows\SysWOW64\mcegex-atix.exe knogob.exe File created C:\Windows\SysWOW64\mcegex-atix.exe knogob.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1724 knogob.exe 1724 knogob.exe 1724 knogob.exe 1724 knogob.exe 1724 knogob.exe 1724 knogob.exe 1724 knogob.exe 1724 knogob.exe 2748 knogob.exe 2748 knogob.exe 1724 knogob.exe 1724 knogob.exe 1724 knogob.exe 1724 knogob.exe 1724 knogob.exe 1724 knogob.exe 1724 knogob.exe 1724 knogob.exe 1724 knogob.exe 1724 knogob.exe 1724 knogob.exe 1724 knogob.exe 1724 knogob.exe 1724 knogob.exe 1724 knogob.exe 1724 knogob.exe 1724 knogob.exe 1724 knogob.exe 1724 knogob.exe 1724 knogob.exe 1724 knogob.exe 1724 knogob.exe 1724 knogob.exe 1724 knogob.exe 1724 knogob.exe 1724 knogob.exe 1724 knogob.exe 1724 knogob.exe 1724 knogob.exe 1724 knogob.exe 1724 knogob.exe 1724 knogob.exe 1724 knogob.exe 1724 knogob.exe 1724 knogob.exe 1724 knogob.exe 1724 knogob.exe 1724 knogob.exe 1724 knogob.exe 1724 knogob.exe 1724 knogob.exe 1724 knogob.exe 1724 knogob.exe 1724 knogob.exe 1724 knogob.exe 1724 knogob.exe 1724 knogob.exe 1724 knogob.exe 1724 knogob.exe 1724 knogob.exe 1724 knogob.exe 1724 knogob.exe 1724 knogob.exe 1724 knogob.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1724 knogob.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4576 wrote to memory of 1724 4576 435de6d7d44b9215581fcf94506fabc0_NeikiAnalytics.exe 83 PID 4576 wrote to memory of 1724 4576 435de6d7d44b9215581fcf94506fabc0_NeikiAnalytics.exe 83 PID 4576 wrote to memory of 1724 4576 435de6d7d44b9215581fcf94506fabc0_NeikiAnalytics.exe 83 PID 1724 wrote to memory of 2748 1724 knogob.exe 84 PID 1724 wrote to memory of 2748 1724 knogob.exe 84 PID 1724 wrote to memory of 2748 1724 knogob.exe 84 PID 1724 wrote to memory of 612 1724 knogob.exe 5 PID 1724 wrote to memory of 3440 1724 knogob.exe 56 PID 1724 wrote to memory of 3440 1724 knogob.exe 56 PID 1724 wrote to memory of 3440 1724 knogob.exe 56 PID 1724 wrote to memory of 3440 1724 knogob.exe 56 PID 1724 wrote to memory of 3440 1724 knogob.exe 56 PID 1724 wrote to memory of 3440 1724 knogob.exe 56 PID 1724 wrote to memory of 3440 1724 knogob.exe 56 PID 1724 wrote to memory of 3440 1724 knogob.exe 56 PID 1724 wrote to memory of 3440 1724 knogob.exe 56 PID 1724 wrote to memory of 3440 1724 knogob.exe 56 PID 1724 wrote to memory of 3440 1724 knogob.exe 56 PID 1724 wrote to memory of 3440 1724 knogob.exe 56 PID 1724 wrote to memory of 3440 1724 knogob.exe 56 PID 1724 wrote to memory of 3440 1724 knogob.exe 56 PID 1724 wrote to memory of 3440 1724 knogob.exe 56 PID 1724 wrote to memory of 3440 1724 knogob.exe 56 PID 1724 wrote to memory of 3440 1724 knogob.exe 56 PID 1724 wrote to memory of 3440 1724 knogob.exe 56 PID 1724 wrote to memory of 3440 1724 knogob.exe 56 PID 1724 wrote to memory of 3440 1724 knogob.exe 56 PID 1724 wrote to memory of 3440 1724 knogob.exe 56 PID 1724 wrote to memory of 3440 1724 knogob.exe 56 PID 1724 wrote to memory of 3440 1724 knogob.exe 56 PID 1724 wrote to memory of 3440 1724 knogob.exe 56 PID 1724 wrote to memory of 3440 1724 knogob.exe 56 PID 1724 wrote to memory of 3440 1724 knogob.exe 56 PID 1724 wrote to memory of 3440 1724 knogob.exe 56 PID 1724 wrote to memory of 3440 1724 knogob.exe 56 PID 1724 wrote to memory of 3440 1724 knogob.exe 56 PID 1724 wrote to memory of 3440 1724 knogob.exe 56 PID 1724 wrote to memory of 3440 1724 knogob.exe 56 PID 1724 wrote to memory of 3440 1724 knogob.exe 56 PID 1724 wrote to memory of 3440 1724 knogob.exe 56 PID 1724 wrote to memory of 3440 1724 knogob.exe 56 PID 1724 wrote to memory of 3440 1724 knogob.exe 56 PID 1724 wrote to memory of 3440 1724 knogob.exe 56 PID 1724 wrote to memory of 3440 1724 knogob.exe 56 PID 1724 wrote to memory of 3440 1724 knogob.exe 56 PID 1724 wrote to memory of 3440 1724 knogob.exe 56 PID 1724 wrote to memory of 3440 1724 knogob.exe 56 PID 1724 wrote to memory of 3440 1724 knogob.exe 56 PID 1724 wrote to memory of 3440 1724 knogob.exe 56 PID 1724 wrote to memory of 3440 1724 knogob.exe 56 PID 1724 wrote to memory of 3440 1724 knogob.exe 56 PID 1724 wrote to memory of 3440 1724 knogob.exe 56 PID 1724 wrote to memory of 3440 1724 knogob.exe 56 PID 1724 wrote to memory of 3440 1724 knogob.exe 56 PID 1724 wrote to memory of 3440 1724 knogob.exe 56 PID 1724 wrote to memory of 3440 1724 knogob.exe 56 PID 1724 wrote to memory of 3440 1724 knogob.exe 56 PID 1724 wrote to memory of 3440 1724 knogob.exe 56 PID 1724 wrote to memory of 3440 1724 knogob.exe 56 PID 1724 wrote to memory of 3440 1724 knogob.exe 56 PID 1724 wrote to memory of 3440 1724 knogob.exe 56 PID 1724 wrote to memory of 3440 1724 knogob.exe 56 PID 1724 wrote to memory of 3440 1724 knogob.exe 56 PID 1724 wrote to memory of 3440 1724 knogob.exe 56
Processes
-
C:\Windows\system32\winlogon.exewinlogon.exe1⤵PID:612
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3440
-
C:\Users\Admin\AppData\Local\Temp\435de6d7d44b9215581fcf94506fabc0_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\435de6d7d44b9215581fcf94506fabc0_NeikiAnalytics.exe"2⤵
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:4576 -
C:\Windows\SysWOW64\knogob.exe"C:\Windows\SysWOW64\knogob.exe"3⤵
- Windows security bypass
- Modifies Installed Components in the registry
- Sets file execution options in registry
- Executes dropped EXE
- Windows security modification
- Modifies WinLogon
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1724 -
C:\Windows\SysWOW64\knogob.exe--k33p4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2748
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5KB
MD5f37b21c00fd81bd93c89ce741a88f183
SHA1b2796500597c68e2f5638e1101b46eaf32676c1c
SHA25676cf016fd77cb5a06c6ed4674ddc2345e8390c010cf344491a6e742baf2c0fb0
SHA512252fe66dea9a4b9aebc5fd2f24434719cb25159ba51549d9de407f44b6a2f7bce6e071be02c4f2ad6aef588c77f12c00ed415eb54f96dec1b077326e101ce0f4
-
Filesize
70KB
MD5c5781720128f2855f42a6f1d201c08fa
SHA1c9ad0483d7cad16435c6b4386df28c2d24194ecc
SHA256d89b69cfb4f9b169e640d085c7b6ada7e5a00c938c13954f0f1207ea763b4169
SHA5124051baf3977edfdefd787255c778628d7b95f0ae5120501fcc215408accdecaffc72488cbfa876f741233afc18c90ac3a9a92c68ecae6d4deed39335f9359f6d
-
Filesize
74KB
MD582d52b60fe8615636ca7508fcd6ab9aa
SHA1c762f06f1d0a57df027196fe01b69381e3f35fc4
SHA256f2db8e423d032c263de650a29b8ac97e1ca91935869c5edccf70d7e74ae0744c
SHA512a9afa6199c1920e34b91c20b117eaea23615245e91ac7e1a32423b749646b5ad5c01cd7ed9681222d1da951120a4c3761498509e2ec63b127279194346f1c6f5
-
Filesize
73KB
MD594e3bfad2fba98b80b06bb05fd01d9d8
SHA10f1a297b6bbd91b51719d2420f30baaa6d6ce9c8
SHA256b67ede7bc4b3a8cf0ac31e9acdeb1501b3fec1a34f7efae4931f00118c5f10fd
SHA51232ece6c52536821abea8999a36936d20dd361ccbb362e202933ffe5569af3143537ff248fbf8ef1ab1842b587469ad76347c974224fecf13644d861a8aae4891