Analysis

  • max time kernel
    149s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    16/05/2024, 21:25

General

  • Target

    3a8284b1e0cd05dec8d18566b995d3b0_NeikiAnalytics.exe

  • Size

    72KB

  • MD5

    3a8284b1e0cd05dec8d18566b995d3b0

  • SHA1

    2e0d564348860ee111e6d5488756b2c5d61c78db

  • SHA256

    81eeee84e42e95031a1db2f7e4550426fcb631ba336d5c92914deeee2316dabd

  • SHA512

    18b0d059cbc3fbcfdf0b33b4f8c7b26d7b09def603666cee82ab16dd0616dd530bbaf9ecfc2ab3744733763c8fe0f76353948f73085d69123cf6127c78d81b6c

  • SSDEEP

    1536:xU1Po/bQ+2Ovwd7o7mUj2JB1I32MZ1Rb/NW/Cxjtme1Mef0c:61PoTQ+2Ovwd7o7m02z1I32MnRzqIf1h

Malware Config

Signatures

  • Windows security bypass 2 TTPs 4 IoCs
  • Modifies Installed Components in the registry 2 TTPs 4 IoCs
  • Sets file execution options in registry 2 TTPs 3 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 3 IoCs
  • Windows security modification 2 TTPs 4 IoCs
  • Modifies WinLogon 2 TTPs 5 IoCs
  • Drops file in System32 directory 9 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\system32\winlogon.exe
    winlogon.exe
    1⤵
      PID:432
    • C:\Windows\Explorer.EXE
      C:\Windows\Explorer.EXE
      1⤵
        PID:1192
        • C:\Users\Admin\AppData\Local\Temp\3a8284b1e0cd05dec8d18566b995d3b0_NeikiAnalytics.exe
          "C:\Users\Admin\AppData\Local\Temp\3a8284b1e0cd05dec8d18566b995d3b0_NeikiAnalytics.exe"
          2⤵
          • Loads dropped DLL
          • Drops file in System32 directory
          • Suspicious use of WriteProcessMemory
          PID:2208
          • C:\Windows\SysWOW64\klofin-anat.exe
            "C:\Windows\SysWOW64\klofin-anat.exe"
            3⤵
            • Windows security bypass
            • Modifies Installed Components in the registry
            • Sets file execution options in registry
            • Executes dropped EXE
            • Loads dropped DLL
            • Windows security modification
            • Modifies WinLogon
            • Drops file in System32 directory
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:1968
            • C:\Windows\SysWOW64\klofin-anat.exe
              --k33p
              4⤵
              • Executes dropped EXE
              • Suspicious behavior: EnumeratesProcesses
              PID:3020

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Windows\SysWOW64\expeasoc-oudom.exe

        Filesize

        72KB

        MD5

        98efe7e54d2f8e7b91d26b21fe7a4e24

        SHA1

        211c8f311d46603016c0516bb6c16c5941a137bf

        SHA256

        baef2a378c09f31ee20636bae55b0d5a83a79c1a57fba9e8ac4aff1498eb53d6

        SHA512

        31417e96a37b7b6062f3da4e9b5a3582455536aa708c171fe168714c7ed2a23deaff72862cbd2c29bad1010b0f4361767d446481994b9ce37e62e66b69a44976

      • C:\Windows\SysWOW64\icloohub.exe

        Filesize

        73KB

        MD5

        9b856ecd7c5fb651d0e3fd172ed3611d

        SHA1

        51bfaeffd72bb4976c00fdd519a3fb5cc360fa05

        SHA256

        8dc8ba152b5c15b305a3fa65ea090f2b44a7c3fcdc6dec7621f9083f2d0ec62c

        SHA512

        1b126fbdaea6bebdd20936ed762665c071479382b32fbe087f61d6166292c624f44ed3455193b4addd5aef4d9c3a4973aaaa0f6864c8735b6e19089628bbebb2

      • C:\Windows\SysWOW64\oubbopoap-omom.dll

        Filesize

        5KB

        MD5

        f37b21c00fd81bd93c89ce741a88f183

        SHA1

        b2796500597c68e2f5638e1101b46eaf32676c1c

        SHA256

        76cf016fd77cb5a06c6ed4674ddc2345e8390c010cf344491a6e742baf2c0fb0

        SHA512

        252fe66dea9a4b9aebc5fd2f24434719cb25159ba51549d9de407f44b6a2f7bce6e071be02c4f2ad6aef588c77f12c00ed415eb54f96dec1b077326e101ce0f4

      • \Windows\SysWOW64\klofin-anat.exe

        Filesize

        70KB

        MD5

        a29108faaca0558f3d9eee37681bd77e

        SHA1

        becf81f97ce3fe33d3b82575bc34edd3d4ee80e1

        SHA256

        9bb182fb8360c8a5b13aac95d9b4daaae82df5714475694650cd827c5f82b542

        SHA512

        18bc222ca34490825033895e7d65b02550e6144dd9947f213709b88dc0dd0bd23cc4a5bb5306ac0656444092f60a6a8376837fcfdd0f27c2373fa8e766cbf3b9

      • memory/1968-53-0x0000000000400000-0x0000000000414000-memory.dmp

        Filesize

        80KB

      • memory/2208-7-0x0000000000400000-0x0000000000403000-memory.dmp

        Filesize

        12KB

      • memory/3020-54-0x0000000000400000-0x0000000000414000-memory.dmp

        Filesize

        80KB