Analysis

  • max time kernel
    149s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    17/05/2024, 06:21

General

  • Target

    befeff2817748b241bd14107aab3eae0_NeikiAnalytics.exe

  • Size

    67KB

  • MD5

    befeff2817748b241bd14107aab3eae0

  • SHA1

    8d5d9b207b130e474bfe9d7feae4d54490fc1901

  • SHA256

    b2953aaca858b8f23b85d60c7f8f1e4e1312adf6b881e2c876d672dca5d91ca0

  • SHA512

    8be2f96018903b8f6d4f02866119a9edf1ce5abc72a61153e513f5897bad150838eef3154c96d6800c7d97a4a5e4f67dd5db55798d4f0f276b37e8108667f881

  • SSDEEP

    1536:1teqKDlXvCDB04f5Gn/L8FlADNt3d1+dwq:ulg35GTslA5t3Gdwq

Malware Config

Signatures

  • Windows security bypass 2 TTPs 4 IoCs
  • Modifies Installed Components in the registry 2 TTPs 4 IoCs
  • Sets file execution options in registry 2 TTPs 3 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 3 IoCs
  • Windows security modification 2 TTPs 4 IoCs
  • Modifies WinLogon 2 TTPs 5 IoCs
  • Drops file in System32 directory 9 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\befeff2817748b241bd14107aab3eae0_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\befeff2817748b241bd14107aab3eae0_NeikiAnalytics.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in System32 directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1688
    • C:\Windows\SysWOW64\uvbeduc.exe
      "C:\Windows\system32\uvbeduc.exe"
      2⤵
      • Windows security bypass
      • Modifies Installed Components in the registry
      • Sets file execution options in registry
      • Executes dropped EXE
      • Loads dropped DLL
      • Windows security modification
      • Modifies WinLogon
      • Drops file in System32 directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1236
      • C:\Windows\SysWOW64\uvbeduc.exe
        ùù¿çç¤
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        PID:1772

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\ahxoseam.exe

    Filesize

    69KB

    MD5

    f952885b1a98ebd3d925995e08148943

    SHA1

    9ca34f80403d6f557a1d2680afdc1445a5903033

    SHA256

    8a409b9c6c9a9e31939ea66a09a04d9a3f36368dbb0e2886fcbc750132b35158

    SHA512

    4ea00d9c9323e48413f405ad7eec33e1b37238a26365d28b51bd7b8ee1c58e9789a09a42112cdc29caf30a6495dfea520e75a07b7fae077e3ba3c7794d982fc0

  • C:\Windows\SysWOW64\enketen-aded.dll

    Filesize

    5KB

    MD5

    f37b21c00fd81bd93c89ce741a88f183

    SHA1

    b2796500597c68e2f5638e1101b46eaf32676c1c

    SHA256

    76cf016fd77cb5a06c6ed4674ddc2345e8390c010cf344491a6e742baf2c0fb0

    SHA512

    252fe66dea9a4b9aebc5fd2f24434719cb25159ba51549d9de407f44b6a2f7bce6e071be02c4f2ad6aef588c77f12c00ed415eb54f96dec1b077326e101ce0f4

  • C:\Windows\SysWOW64\ougpeakoat.exe

    Filesize

    70KB

    MD5

    10867e4ab27deda41700154f3e36f464

    SHA1

    23f1be4232cfaa75b6dd383d0de79d437f7f04df

    SHA256

    1f412c908c43a56af28dfa1d24e36e1f9ec480c96963e50a3cc7348ab2289523

    SHA512

    f127c639c0d7e9a13476294f4ae75894b07b1949f389098db1ac6bc2666b7976ad35c3cfa4257bd96a1277c57f9d9a744b8e5fd43d32d0607c69cae09ebf1a79

  • \Windows\SysWOW64\uvbeduc.exe

    Filesize

    67KB

    MD5

    befeff2817748b241bd14107aab3eae0

    SHA1

    8d5d9b207b130e474bfe9d7feae4d54490fc1901

    SHA256

    b2953aaca858b8f23b85d60c7f8f1e4e1312adf6b881e2c876d672dca5d91ca0

    SHA512

    8be2f96018903b8f6d4f02866119a9edf1ce5abc72a61153e513f5897bad150838eef3154c96d6800c7d97a4a5e4f67dd5db55798d4f0f276b37e8108667f881

  • memory/1236-55-0x0000000000400000-0x0000000000414000-memory.dmp

    Filesize

    80KB

  • memory/1688-9-0x0000000000400000-0x0000000000414000-memory.dmp

    Filesize

    80KB

  • memory/1772-56-0x0000000000400000-0x0000000000414000-memory.dmp

    Filesize

    80KB