Analysis

  • max time kernel
    149s
  • max time network
    122s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    17/05/2024, 04:24

General

  • Target

    a6a14f5176482c701789eede974e0990_NeikiAnalytics.exe

  • Size

    71KB

  • MD5

    a6a14f5176482c701789eede974e0990

  • SHA1

    93edaff702bd0e90f6dd8ca0955bbc1e13ffd77e

  • SHA256

    27762376d4d38040dfeade3b2d86927a8bc2451ee4586aa40a59fcfd2cf4e593

  • SHA512

    69520251a7aafe7ae65c12c5128baeb32974e1eca396c2487ab96bdf8f2f8d16b6ee242710ccf9dbba892aca15023426c45f38418aa7833f2cf7ddd1a4dc91b8

  • SSDEEP

    1536:1teqKDlXvCDB04f5Gn/L8FlADNt3d1Hw8slXsX:Olg35GTslA5t3/w8B

Malware Config

Signatures

  • Windows security bypass 2 TTPs 4 IoCs
  • Modifies Installed Components in the registry 2 TTPs 4 IoCs
  • Sets file execution options in registry 2 TTPs 3 IoCs
  • Executes dropped EXE 2 IoCs
  • Windows security modification 2 TTPs 4 IoCs
  • Modifies WinLogon 2 TTPs 5 IoCs
  • Drops file in System32 directory 9 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\system32\winlogon.exe
    winlogon.exe
    1⤵
      PID:612
    • C:\Windows\Explorer.EXE
      C:\Windows\Explorer.EXE
      1⤵
        PID:3500
        • C:\Users\Admin\AppData\Local\Temp\a6a14f5176482c701789eede974e0990_NeikiAnalytics.exe
          "C:\Users\Admin\AppData\Local\Temp\a6a14f5176482c701789eede974e0990_NeikiAnalytics.exe"
          2⤵
          • Drops file in System32 directory
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:964
          • C:\Windows\SysWOW64\oukcitis-omat.exe
            "C:\Windows\system32\oukcitis-omat.exe"
            3⤵
            • Windows security bypass
            • Modifies Installed Components in the registry
            • Sets file execution options in registry
            • Executes dropped EXE
            • Windows security modification
            • Modifies WinLogon
            • Drops file in System32 directory
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:912
            • C:\Windows\SysWOW64\oukcitis-omat.exe
              --k33p
              4⤵
              • Executes dropped EXE
              • Suspicious behavior: EnumeratesProcesses
              PID:3628

      Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Windows\SysWOW64\afmotad-dooc.exe

              Filesize

              74KB

              MD5

              fc2b549121ccc55953b22f58bfa586a9

              SHA1

              adfeda07482e588b1f35f028171be1361f83acbc

              SHA256

              225672aebd1d369a1a59d8385681b2eb17b1f9671f49cbf00f39ad5fdb20008c

              SHA512

              76d08fb907514ccaf6403811e18018fce932f5b65fd39b6c8ba74db1009c39307a572999e853b19f76a4d38e3859b10b0653d487fc9c70d23a1a1f4e61e8bf9f

            • C:\Windows\SysWOW64\endeanoav.dll

              Filesize

              5KB

              MD5

              f37b21c00fd81bd93c89ce741a88f183

              SHA1

              b2796500597c68e2f5638e1101b46eaf32676c1c

              SHA256

              76cf016fd77cb5a06c6ed4674ddc2345e8390c010cf344491a6e742baf2c0fb0

              SHA512

              252fe66dea9a4b9aebc5fd2f24434719cb25159ba51549d9de407f44b6a2f7bce6e071be02c4f2ad6aef588c77f12c00ed415eb54f96dec1b077326e101ce0f4

            • C:\Windows\SysWOW64\oukcitis-omat.exe

              Filesize

              71KB

              MD5

              a6a14f5176482c701789eede974e0990

              SHA1

              93edaff702bd0e90f6dd8ca0955bbc1e13ffd77e

              SHA256

              27762376d4d38040dfeade3b2d86927a8bc2451ee4586aa40a59fcfd2cf4e593

              SHA512

              69520251a7aafe7ae65c12c5128baeb32974e1eca396c2487ab96bdf8f2f8d16b6ee242710ccf9dbba892aca15023426c45f38418aa7833f2cf7ddd1a4dc91b8

            • C:\Windows\SysWOW64\tseaban-uteas.exe

              Filesize

              73KB

              MD5

              782ec439419c637d107c6fc0320cd611

              SHA1

              8b3b93554753130127581ccd3fb96f718fc8b930

              SHA256

              bc851acffd609ee1bc2ffc88bb3cbf86b685eeadaf0e7a2fd6655c600c173acf

              SHA512

              84e740064f8dd439c7b275d18a302e40a258bc0b382a3f64aa3e4288c625dbc8f109b138b1fc94700c2d402d035ad41a7f23ce24b4479d1a4e0e2cbbf0deae60

            • memory/912-49-0x0000000000400000-0x0000000000414000-memory.dmp

              Filesize

              80KB

            • memory/964-5-0x0000000000400000-0x0000000000414000-memory.dmp

              Filesize

              80KB

            • memory/3628-50-0x0000000000400000-0x0000000000414000-memory.dmp

              Filesize

              80KB