Analysis
-
max time kernel
149s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
16/05/2024, 02:49
Static task
static1
Behavioral task
behavioral1
Sample
84d6ba5f5bedd7fa9e47eb923ee5f500_NeikiAnalytics.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
84d6ba5f5bedd7fa9e47eb923ee5f500_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
84d6ba5f5bedd7fa9e47eb923ee5f500_NeikiAnalytics.exe
-
Size
73KB
-
MD5
84d6ba5f5bedd7fa9e47eb923ee5f500
-
SHA1
ba78f99d399a27b4dc2e5befafaec4f8e06427f4
-
SHA256
a07472479bacef5ea4e123c735e385b0f06cbe3cd748c28f8ff79f90f891d143
-
SHA512
657755905aea0093ad83f4deb99c9ffdd45528c3ea3b8a7d88487dd64450541acd76035b1cf843ee6082173479cdb52cc38d52083087b397f902b377f715b8e6
-
SSDEEP
1536:xUnHNbMNaFo7LlSChua7GfKezrsP7LGjch:8bMcFo330kJezKLGwh
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "25600" evfumeah-ouseab.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "25600" evfumeah-ouseab.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "25600" evfumeah-ouseab.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "25600" evfumeah-ouseab.exe -
Modifies Installed Components in the registry 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{554F5448-4350-4851-554F-544843504851} evfumeah-ouseab.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{554F5448-4350-4851-554F-544843504851}\01234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123 = "a" evfumeah-ouseab.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{554F5448-4350-4851-554F-544843504851}\IsInstalled = "1" evfumeah-ouseab.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{554F5448-4350-4851-554F-544843504851}\StubPath = "C:\\Windows\\system32\\agxoahax.exe" evfumeah-ouseab.exe -
Sets file execution options in registry 2 TTPs 3 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\explorer.exe evfumeah-ouseab.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\explorer.exe\0123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890 = "a" evfumeah-ouseab.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\explorer.exe\Debugger = "C:\\Windows\\system32\\uxveakoox.exe" evfumeah-ouseab.exe -
Executes dropped EXE 2 IoCs
pid Process 2004 evfumeah-ouseab.exe 2580 evfumeah-ouseab.exe -
Loads dropped DLL 3 IoCs
pid Process 1616 84d6ba5f5bedd7fa9e47eb923ee5f500_NeikiAnalytics.exe 1616 84d6ba5f5bedd7fa9e47eb923ee5f500_NeikiAnalytics.exe 2004 evfumeah-ouseab.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "25600" evfumeah-ouseab.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "25600" evfumeah-ouseab.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "25600" evfumeah-ouseab.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "25600" evfumeah-ouseab.exe -
Modifies WinLogon 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\{BC84DF00-BC38-9902-8082-6FCBF2D87A0B}\DLLName = "C:\\Windows\\system32\\udkoveag-axum.dll" evfumeah-ouseab.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\{BC84DF00-BC38-9902-8082-6FCBF2D87A0B}\Startup = "Startup" evfumeah-ouseab.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\{BC84DF00-BC38-9902-8082-6FCBF2D87A0B} evfumeah-ouseab.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify evfumeah-ouseab.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\{BC84DF00-BC38-9902-8082-6FCBF2D87A0B}\012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345 = "a" evfumeah-ouseab.exe -
Drops file in System32 directory 9 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\udkoveag-axum.dll evfumeah-ouseab.exe File created C:\Windows\SysWOW64\evfumeah-ouseab.exe 84d6ba5f5bedd7fa9e47eb923ee5f500_NeikiAnalytics.exe File created C:\Windows\SysWOW64\uxveakoox.exe evfumeah-ouseab.exe File opened for modification C:\Windows\SysWOW64\agxoahax.exe evfumeah-ouseab.exe File created C:\Windows\SysWOW64\agxoahax.exe evfumeah-ouseab.exe File created C:\Windows\SysWOW64\udkoveag-axum.dll evfumeah-ouseab.exe File opened for modification C:\Windows\SysWOW64\evfumeah-ouseab.exe evfumeah-ouseab.exe File opened for modification C:\Windows\SysWOW64\evfumeah-ouseab.exe 84d6ba5f5bedd7fa9e47eb923ee5f500_NeikiAnalytics.exe File opened for modification C:\Windows\SysWOW64\uxveakoox.exe evfumeah-ouseab.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2004 evfumeah-ouseab.exe 2004 evfumeah-ouseab.exe 2004 evfumeah-ouseab.exe 2004 evfumeah-ouseab.exe 2580 evfumeah-ouseab.exe 2004 evfumeah-ouseab.exe 2004 evfumeah-ouseab.exe 2004 evfumeah-ouseab.exe 2004 evfumeah-ouseab.exe 2004 evfumeah-ouseab.exe 2004 evfumeah-ouseab.exe 2004 evfumeah-ouseab.exe 2004 evfumeah-ouseab.exe 2004 evfumeah-ouseab.exe 2004 evfumeah-ouseab.exe 2004 evfumeah-ouseab.exe 2004 evfumeah-ouseab.exe 2004 evfumeah-ouseab.exe 2004 evfumeah-ouseab.exe 2004 evfumeah-ouseab.exe 2004 evfumeah-ouseab.exe 2004 evfumeah-ouseab.exe 2004 evfumeah-ouseab.exe 2004 evfumeah-ouseab.exe 2004 evfumeah-ouseab.exe 2004 evfumeah-ouseab.exe 2004 evfumeah-ouseab.exe 2004 evfumeah-ouseab.exe 2004 evfumeah-ouseab.exe 2004 evfumeah-ouseab.exe 2004 evfumeah-ouseab.exe 2004 evfumeah-ouseab.exe 2004 evfumeah-ouseab.exe 2004 evfumeah-ouseab.exe 2004 evfumeah-ouseab.exe 2004 evfumeah-ouseab.exe 2004 evfumeah-ouseab.exe 2004 evfumeah-ouseab.exe 2004 evfumeah-ouseab.exe 2004 evfumeah-ouseab.exe 2004 evfumeah-ouseab.exe 2004 evfumeah-ouseab.exe 2004 evfumeah-ouseab.exe 2004 evfumeah-ouseab.exe 2004 evfumeah-ouseab.exe 2004 evfumeah-ouseab.exe 2004 evfumeah-ouseab.exe 2004 evfumeah-ouseab.exe 2004 evfumeah-ouseab.exe 2004 evfumeah-ouseab.exe 2004 evfumeah-ouseab.exe 2004 evfumeah-ouseab.exe 2004 evfumeah-ouseab.exe 2004 evfumeah-ouseab.exe 2004 evfumeah-ouseab.exe 2004 evfumeah-ouseab.exe 2004 evfumeah-ouseab.exe 2004 evfumeah-ouseab.exe 2004 evfumeah-ouseab.exe 2004 evfumeah-ouseab.exe 2004 evfumeah-ouseab.exe 2004 evfumeah-ouseab.exe 2004 evfumeah-ouseab.exe 2004 evfumeah-ouseab.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2004 evfumeah-ouseab.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1616 wrote to memory of 2004 1616 84d6ba5f5bedd7fa9e47eb923ee5f500_NeikiAnalytics.exe 28 PID 1616 wrote to memory of 2004 1616 84d6ba5f5bedd7fa9e47eb923ee5f500_NeikiAnalytics.exe 28 PID 1616 wrote to memory of 2004 1616 84d6ba5f5bedd7fa9e47eb923ee5f500_NeikiAnalytics.exe 28 PID 1616 wrote to memory of 2004 1616 84d6ba5f5bedd7fa9e47eb923ee5f500_NeikiAnalytics.exe 28 PID 2004 wrote to memory of 432 2004 evfumeah-ouseab.exe 5 PID 2004 wrote to memory of 1192 2004 evfumeah-ouseab.exe 21 PID 2004 wrote to memory of 1192 2004 evfumeah-ouseab.exe 21 PID 2004 wrote to memory of 2580 2004 evfumeah-ouseab.exe 29 PID 2004 wrote to memory of 2580 2004 evfumeah-ouseab.exe 29 PID 2004 wrote to memory of 2580 2004 evfumeah-ouseab.exe 29 PID 2004 wrote to memory of 2580 2004 evfumeah-ouseab.exe 29 PID 2004 wrote to memory of 1192 2004 evfumeah-ouseab.exe 21 PID 2004 wrote to memory of 1192 2004 evfumeah-ouseab.exe 21 PID 2004 wrote to memory of 1192 2004 evfumeah-ouseab.exe 21 PID 2004 wrote to memory of 1192 2004 evfumeah-ouseab.exe 21 PID 2004 wrote to memory of 1192 2004 evfumeah-ouseab.exe 21 PID 2004 wrote to memory of 1192 2004 evfumeah-ouseab.exe 21 PID 2004 wrote to memory of 1192 2004 evfumeah-ouseab.exe 21 PID 2004 wrote to memory of 1192 2004 evfumeah-ouseab.exe 21 PID 2004 wrote to memory of 1192 2004 evfumeah-ouseab.exe 21 PID 2004 wrote to memory of 1192 2004 evfumeah-ouseab.exe 21 PID 2004 wrote to memory of 1192 2004 evfumeah-ouseab.exe 21 PID 2004 wrote to memory of 1192 2004 evfumeah-ouseab.exe 21 PID 2004 wrote to memory of 1192 2004 evfumeah-ouseab.exe 21 PID 2004 wrote to memory of 1192 2004 evfumeah-ouseab.exe 21 PID 2004 wrote to memory of 1192 2004 evfumeah-ouseab.exe 21 PID 2004 wrote to memory of 1192 2004 evfumeah-ouseab.exe 21 PID 2004 wrote to memory of 1192 2004 evfumeah-ouseab.exe 21 PID 2004 wrote to memory of 1192 2004 evfumeah-ouseab.exe 21 PID 2004 wrote to memory of 1192 2004 evfumeah-ouseab.exe 21 PID 2004 wrote to memory of 1192 2004 evfumeah-ouseab.exe 21 PID 2004 wrote to memory of 1192 2004 evfumeah-ouseab.exe 21 PID 2004 wrote to memory of 1192 2004 evfumeah-ouseab.exe 21 PID 2004 wrote to memory of 1192 2004 evfumeah-ouseab.exe 21 PID 2004 wrote to memory of 1192 2004 evfumeah-ouseab.exe 21 PID 2004 wrote to memory of 1192 2004 evfumeah-ouseab.exe 21 PID 2004 wrote to memory of 1192 2004 evfumeah-ouseab.exe 21 PID 2004 wrote to memory of 1192 2004 evfumeah-ouseab.exe 21 PID 2004 wrote to memory of 1192 2004 evfumeah-ouseab.exe 21 PID 2004 wrote to memory of 1192 2004 evfumeah-ouseab.exe 21 PID 2004 wrote to memory of 1192 2004 evfumeah-ouseab.exe 21 PID 2004 wrote to memory of 1192 2004 evfumeah-ouseab.exe 21 PID 2004 wrote to memory of 1192 2004 evfumeah-ouseab.exe 21 PID 2004 wrote to memory of 1192 2004 evfumeah-ouseab.exe 21 PID 2004 wrote to memory of 1192 2004 evfumeah-ouseab.exe 21 PID 2004 wrote to memory of 1192 2004 evfumeah-ouseab.exe 21 PID 2004 wrote to memory of 1192 2004 evfumeah-ouseab.exe 21 PID 2004 wrote to memory of 1192 2004 evfumeah-ouseab.exe 21 PID 2004 wrote to memory of 1192 2004 evfumeah-ouseab.exe 21 PID 2004 wrote to memory of 1192 2004 evfumeah-ouseab.exe 21 PID 2004 wrote to memory of 1192 2004 evfumeah-ouseab.exe 21 PID 2004 wrote to memory of 1192 2004 evfumeah-ouseab.exe 21 PID 2004 wrote to memory of 1192 2004 evfumeah-ouseab.exe 21 PID 2004 wrote to memory of 1192 2004 evfumeah-ouseab.exe 21 PID 2004 wrote to memory of 1192 2004 evfumeah-ouseab.exe 21 PID 2004 wrote to memory of 1192 2004 evfumeah-ouseab.exe 21 PID 2004 wrote to memory of 1192 2004 evfumeah-ouseab.exe 21 PID 2004 wrote to memory of 1192 2004 evfumeah-ouseab.exe 21 PID 2004 wrote to memory of 1192 2004 evfumeah-ouseab.exe 21 PID 2004 wrote to memory of 1192 2004 evfumeah-ouseab.exe 21 PID 2004 wrote to memory of 1192 2004 evfumeah-ouseab.exe 21 PID 2004 wrote to memory of 1192 2004 evfumeah-ouseab.exe 21 PID 2004 wrote to memory of 1192 2004 evfumeah-ouseab.exe 21 PID 2004 wrote to memory of 1192 2004 evfumeah-ouseab.exe 21
Processes
-
C:\Windows\system32\winlogon.exewinlogon.exe1⤵PID:432
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1192
-
C:\Users\Admin\AppData\Local\Temp\84d6ba5f5bedd7fa9e47eb923ee5f500_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\84d6ba5f5bedd7fa9e47eb923ee5f500_NeikiAnalytics.exe"2⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1616 -
C:\Windows\SysWOW64\evfumeah-ouseab.exe"C:\Windows\SysWOW64\evfumeah-ouseab.exe"3⤵
- Windows security bypass
- Modifies Installed Components in the registry
- Sets file execution options in registry
- Executes dropped EXE
- Loads dropped DLL
- Windows security modification
- Modifies WinLogon
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2004 -
C:\Windows\SysWOW64\evfumeah-ouseab.exe--k33p4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2580
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
73KB
MD5b772b30dda638cb4a5b93c246b0b945f
SHA11af8fc90a211f55a421c7ec1cb3137c746b5d8b4
SHA2566de6bddb99cb1181dbca340d91ff279f861e292302cdb3870f169c501413cfe2
SHA512d0dc6bc348ae94e701fc6ebdf7d2a26d303fd36acb1ea5384b06cf6c9a98f303992dd132c2375a0e8a6dcd9a715a3559efc77d028aba4f08e79cfbfce842501d
-
Filesize
5KB
MD5f37b21c00fd81bd93c89ce741a88f183
SHA1b2796500597c68e2f5638e1101b46eaf32676c1c
SHA25676cf016fd77cb5a06c6ed4674ddc2345e8390c010cf344491a6e742baf2c0fb0
SHA512252fe66dea9a4b9aebc5fd2f24434719cb25159ba51549d9de407f44b6a2f7bce6e071be02c4f2ad6aef588c77f12c00ed415eb54f96dec1b077326e101ce0f4
-
Filesize
74KB
MD56afa9abf05749669409966a775102347
SHA1facdf45af5c63657444e0f12d454e9f6207b7683
SHA25660840b3a9e673e716892174a8ffbdf3a65167b1320f5183aef94d3cc69a9d8ef
SHA512edea78426405eed7d456a95c8957348a94d71238561559470380a671083c814381b5ed879e7215875fd53924e61e43f83923778ca0df8eacbe2a3c28a41bef9f
-
Filesize
71KB
MD596cf42bb65235f978130584404401fa9
SHA1cf270f2f368b21e9642c77bb9564713d13383ea3
SHA25679eab96163a4d3535f122f5ea79e315de5e7f9b0e28c49e1c01eebbbaf7a0279
SHA512c762d29daf68977a8eb00fea6eaba5f204f457ae9b438a56a083b2ed2425bb2d88f53685e753f77cf56b508f0bcc9bd98e5098f093b04f47aae55f065812a44c