Analysis

  • max time kernel
    149s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240220-en
  • resource tags

    arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system
  • submitted
    16-05-2024 09:03

General

  • Target

    cfc18f737e79e5585c76e1fd8e527060_NeikiAnalytics.exe

  • Size

    72KB

  • MD5

    cfc18f737e79e5585c76e1fd8e527060

  • SHA1

    6187a128e3cde9c4d8e1d939ec8fb429f0b9fe74

  • SHA256

    95b3d51e4dab6499c46b16831e6fa6eccb24962065cd4f713aaf28d3ce3c3d0f

  • SHA512

    9d9dabfce37a7c53afcb4aaa283adac6a50462b601c3b5f485f1dc7e21020a7ac791bdf61690fda684c4e99bd8ba3756b30bd81e46e3c07ab31c011d1372f3fc

  • SSDEEP

    1536:xGrOhMC7Nb20g6HKF02z5HKgeBGmW9arzj:wrOhRvN2sGmtnj

Malware Config

Signatures

  • Windows security bypass 2 TTPs 4 IoCs
  • Modifies Installed Components in the registry 2 TTPs 4 IoCs
  • Sets file execution options in registry 2 TTPs 3 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 3 IoCs
  • Windows security modification 2 TTPs 4 IoCs
  • Modifies WinLogon 2 TTPs 5 IoCs
  • Drops file in System32 directory 9 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\system32\winlogon.exe
    winlogon.exe
    1⤵
      PID:432
    • C:\Windows\Explorer.EXE
      C:\Windows\Explorer.EXE
      1⤵
        PID:1072
        • C:\Users\Admin\AppData\Local\Temp\cfc18f737e79e5585c76e1fd8e527060_NeikiAnalytics.exe
          "C:\Users\Admin\AppData\Local\Temp\cfc18f737e79e5585c76e1fd8e527060_NeikiAnalytics.exe"
          2⤵
          • Loads dropped DLL
          • Drops file in System32 directory
          • Suspicious use of WriteProcessMemory
          PID:1728
          • C:\Windows\SysWOW64\elceasir.exe
            "C:\Windows\SysWOW64\elceasir.exe"
            3⤵
            • Windows security bypass
            • Modifies Installed Components in the registry
            • Sets file execution options in registry
            • Executes dropped EXE
            • Loads dropped DLL
            • Windows security modification
            • Modifies WinLogon
            • Drops file in System32 directory
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:1884
            • C:\Windows\SysWOW64\elceasir.exe
              --k33p
              4⤵
              • Executes dropped EXE
              • Suspicious behavior: EnumeratesProcesses
              PID:888

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Windows\SysWOW64\aldamop.exe

        Filesize

        73KB

        MD5

        bac4aa65513675078cd529a5a9997d99

        SHA1

        540cf6d2581f7013450cef95ab9d79216eb4e017

        SHA256

        442980339bb53eaa1f41132b92e00e5fadd2feb194d3b3a11d283ad43d3d7e6b

        SHA512

        bc04194271fa0493a78bd731501658348064c477bf2e941b91c9f357a20204c0b3d4911abb7f12db6bce630aebe4075e7bfc3538a07d7dd5c10e520cef74966e

      • C:\Windows\SysWOW64\kdoasif.dll

        Filesize

        5KB

        MD5

        f37b21c00fd81bd93c89ce741a88f183

        SHA1

        b2796500597c68e2f5638e1101b46eaf32676c1c

        SHA256

        76cf016fd77cb5a06c6ed4674ddc2345e8390c010cf344491a6e742baf2c0fb0

        SHA512

        252fe66dea9a4b9aebc5fd2f24434719cb25159ba51549d9de407f44b6a2f7bce6e071be02c4f2ad6aef588c77f12c00ed415eb54f96dec1b077326e101ce0f4

      • C:\Windows\SysWOW64\uhcuneam-ougat.exe

        Filesize

        72KB

        MD5

        1db6829f2a7d02d63df3d379ed8865c1

        SHA1

        2cd1d0959471400cac5407c6eabbd57c8d22e75e

        SHA256

        39c7493a0a9d0929d712772be8864113768dfd74a9f4288482e8b48b266c4aca

        SHA512

        26db2bd557dbe50136f368d9081e964e7002ec411862de980002a195ecd280b5f3eead91c205b62a83f0cdd50b196ecebe6cca17462feb70c0be1e08d837b2a2

      • \Windows\SysWOW64\elceasir.exe

        Filesize

        70KB

        MD5

        1090555cf271acdf2264c16a065b369e

        SHA1

        cef114b0e56388144184bfbe3edd7a855b1c3a0e

        SHA256

        178ef0208acb6e4c8a8df1d618120c85659482a17c10a9259251e30ce2c8fdd1

        SHA512

        d6df98908a0ecc6651c0395b7539aff57878bca042e09bee1ff421c99fbba30e34f9b6b1c5b7615674898e0900d67e9e223d29062da550e0fc5fcde2ff43464e

      • memory/888-54-0x0000000000400000-0x0000000000414000-memory.dmp

        Filesize

        80KB

      • memory/1728-7-0x0000000000400000-0x0000000000403000-memory.dmp

        Filesize

        12KB

      • memory/1884-53-0x0000000000400000-0x0000000000414000-memory.dmp

        Filesize

        80KB