Analysis

  • max time kernel
    149s
  • max time network
    127s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    16/05/2024, 10:18

General

  • Target

    da4b431a4111bf64b3ae26a48cf46d70_NeikiAnalytics.exe

  • Size

    70KB

  • MD5

    da4b431a4111bf64b3ae26a48cf46d70

  • SHA1

    61857d55019e6c6376ab1c9a678a772a87eedaa4

  • SHA256

    7d2feb91f1a8c9298e2bf9186fb08cc0f3c734397e6415837e7ea6d30e98cc1b

  • SHA512

    97a4380bcfc294de5a1d85829ffcd93a31488997f87c29ba0b2c3cb50c26d8524a60d74002c59105132b3e4213ac4f6ecb390ef635b5cbdb8ea2b835f510e7ea

  • SSDEEP

    1536:1teqKDlXvCDB04f5Gn/L8FlADNt3d1Hw8slw:Olg35GTslA5t3/w8L

Malware Config

Signatures

  • Windows security bypass 2 TTPs 4 IoCs
  • Modifies Installed Components in the registry 2 TTPs 4 IoCs
  • Sets file execution options in registry 2 TTPs 3 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 3 IoCs
  • Windows security modification 2 TTPs 4 IoCs
  • Modifies WinLogon 2 TTPs 5 IoCs
  • Drops file in System32 directory 9 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\system32\winlogon.exe
    winlogon.exe
    1⤵
      PID:432
    • C:\Windows\Explorer.EXE
      C:\Windows\Explorer.EXE
      1⤵
        PID:1208
        • C:\Users\Admin\AppData\Local\Temp\da4b431a4111bf64b3ae26a48cf46d70_NeikiAnalytics.exe
          "C:\Users\Admin\AppData\Local\Temp\da4b431a4111bf64b3ae26a48cf46d70_NeikiAnalytics.exe"
          2⤵
          • Loads dropped DLL
          • Drops file in System32 directory
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:2040
          • C:\Windows\SysWOW64\adtehar.exe
            "C:\Windows\system32\adtehar.exe"
            3⤵
            • Windows security bypass
            • Modifies Installed Components in the registry
            • Sets file execution options in registry
            • Executes dropped EXE
            • Loads dropped DLL
            • Windows security modification
            • Modifies WinLogon
            • Drops file in System32 directory
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:2236
            • C:\Windows\SysWOW64\adtehar.exe
              --k33p
              4⤵
              • Executes dropped EXE
              • Suspicious behavior: EnumeratesProcesses
              PID:2076

      Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Windows\SysWOW64\adtehar.exe

              Filesize

              70KB

              MD5

              da4b431a4111bf64b3ae26a48cf46d70

              SHA1

              61857d55019e6c6376ab1c9a678a772a87eedaa4

              SHA256

              7d2feb91f1a8c9298e2bf9186fb08cc0f3c734397e6415837e7ea6d30e98cc1b

              SHA512

              97a4380bcfc294de5a1d85829ffcd93a31488997f87c29ba0b2c3cb50c26d8524a60d74002c59105132b3e4213ac4f6ecb390ef635b5cbdb8ea2b835f510e7ea

            • C:\Windows\SysWOW64\bgekes-umom.exe

              Filesize

              72KB

              MD5

              91328e5d39b1d6844bb895d5b50e0303

              SHA1

              4cd14e8bb13dc897ca1e5ffc8f20fb9654b43b8c

              SHA256

              9894328ed2a9b7c540a12b7048ecef7554bd231d4c20525e6253df93c826d3d3

              SHA512

              637080adfe67c7a056ff4757e31224b9cbfa6a30675eef729880d1773c2c44e259997176a82590a23f59c603a590aec3f473e0decb46ee33617a2487c2681e98

            • C:\Windows\SysWOW64\ealvoovep.exe

              Filesize

              73KB

              MD5

              c68f8d28cc80dd77db8a90e05daa1831

              SHA1

              499feb187b28047a3970cf007c303beaac98e4e9

              SHA256

              73d97712396d4c89e9158abc0856423b6c728f36b3736c7070df3fcd45bc10bf

              SHA512

              69789bef3526b70882a3df8e6926ef2a577a8e8f977b10274061d4fbc938d004a325e87ffb04286e97a91553b75ac69d507ef80bd73d0b0d742219214299a555

            • C:\Windows\SysWOW64\ekseavih.dll

              Filesize

              5KB

              MD5

              f37b21c00fd81bd93c89ce741a88f183

              SHA1

              b2796500597c68e2f5638e1101b46eaf32676c1c

              SHA256

              76cf016fd77cb5a06c6ed4674ddc2345e8390c010cf344491a6e742baf2c0fb0

              SHA512

              252fe66dea9a4b9aebc5fd2f24434719cb25159ba51549d9de407f44b6a2f7bce6e071be02c4f2ad6aef588c77f12c00ed415eb54f96dec1b077326e101ce0f4

            • memory/2040-9-0x0000000000400000-0x0000000000414000-memory.dmp

              Filesize

              80KB

            • memory/2076-56-0x0000000000400000-0x0000000000414000-memory.dmp

              Filesize

              80KB

            • memory/2236-55-0x0000000000400000-0x0000000000414000-memory.dmp

              Filesize

              80KB