Analysis

  • max time kernel
    149s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    17/05/2024, 05:47

General

  • Target

    b804873b65fb62aa4a0a6aee9d498b60_NeikiAnalytics.exe

  • Size

    68KB

  • MD5

    b804873b65fb62aa4a0a6aee9d498b60

  • SHA1

    6bb56d749adff9f28e59e3680beda026dbe327e7

  • SHA256

    70a06279f4acd7e61c42f10698377f1a2c76287f684cca8af85e583a5c8f6959

  • SHA512

    f3314b84269a2eaf92f5de1235a646a00d56fbf1ee6a145d549076923f1f48d17e95402110fa52d593dbf331edb0ffb5a1168983c52a382d515d2d17480d739d

  • SSDEEP

    1536:1teqKDlXvCDB04f5Gn/L8FlADNt3d1Hw80:Olg35GTslA5t3/w80

Malware Config

Signatures

  • Windows security bypass 2 TTPs 4 IoCs
  • Modifies Installed Components in the registry 2 TTPs 4 IoCs
  • Sets file execution options in registry 2 TTPs 3 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 3 IoCs
  • Windows security modification 2 TTPs 4 IoCs
  • Modifies WinLogon 2 TTPs 5 IoCs
  • Drops file in System32 directory 9 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\system32\winlogon.exe
    winlogon.exe
    1⤵
      PID:428
    • C:\Windows\Explorer.EXE
      C:\Windows\Explorer.EXE
      1⤵
        PID:1180
        • C:\Users\Admin\AppData\Local\Temp\b804873b65fb62aa4a0a6aee9d498b60_NeikiAnalytics.exe
          "C:\Users\Admin\AppData\Local\Temp\b804873b65fb62aa4a0a6aee9d498b60_NeikiAnalytics.exe"
          2⤵
          • Loads dropped DLL
          • Drops file in System32 directory
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:340
          • C:\Windows\SysWOW64\efboageab-edooc.exe
            "C:\Windows\system32\efboageab-edooc.exe"
            3⤵
            • Windows security bypass
            • Modifies Installed Components in the registry
            • Sets file execution options in registry
            • Executes dropped EXE
            • Loads dropped DLL
            • Windows security modification
            • Modifies WinLogon
            • Drops file in System32 directory
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:2892
            • C:\Windows\SysWOW64\efboageab-edooc.exe
              --k33p
              4⤵
              • Executes dropped EXE
              • Suspicious behavior: EnumeratesProcesses
              PID:2608

      Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Windows\SysWOW64\afxifec-edoot.dll

              Filesize

              5KB

              MD5

              f37b21c00fd81bd93c89ce741a88f183

              SHA1

              b2796500597c68e2f5638e1101b46eaf32676c1c

              SHA256

              76cf016fd77cb5a06c6ed4674ddc2345e8390c010cf344491a6e742baf2c0fb0

              SHA512

              252fe66dea9a4b9aebc5fd2f24434719cb25159ba51549d9de407f44b6a2f7bce6e071be02c4f2ad6aef588c77f12c00ed415eb54f96dec1b077326e101ce0f4

            • C:\Windows\SysWOW64\olmaguc.exe

              Filesize

              70KB

              MD5

              3fe2eb7cc9dffb54e78817a4e916a352

              SHA1

              20ddae0c3bc5ef2cc70cb3bfd38e60ba4acb2c79

              SHA256

              1e6e8dfb9eea6c7d939c4f573996705dfc70a55bba678d1c03e28bd96880508b

              SHA512

              9d00dcc5c8c08523ba82d48ded4814fa2cdc04f86cc06915f554be8f6370c82956f142c4dce3103575f39087a86a45ff57025704e068804c5a760fdeece21ec1

            • C:\Windows\SysWOW64\psegax-oused.exe

              Filesize

              71KB

              MD5

              18297087ea742bd80b77bfcd9073777b

              SHA1

              8ed1517affbaf2306ac67a673d3be353dd1a8b01

              SHA256

              77daf555e59cbf76c93b323d72aaaa1ee67546873eb17c1b1fb9166a84b22414

              SHA512

              627aab258f983e41df98960bc52e8534d4214d415a75d94cb120d0a727d32c2438789d2878509909314e8cc0c9498b107075b470d1d5723e8d452823cc67ce7e

            • \Windows\SysWOW64\efboageab-edooc.exe

              Filesize

              68KB

              MD5

              b804873b65fb62aa4a0a6aee9d498b60

              SHA1

              6bb56d749adff9f28e59e3680beda026dbe327e7

              SHA256

              70a06279f4acd7e61c42f10698377f1a2c76287f684cca8af85e583a5c8f6959

              SHA512

              f3314b84269a2eaf92f5de1235a646a00d56fbf1ee6a145d549076923f1f48d17e95402110fa52d593dbf331edb0ffb5a1168983c52a382d515d2d17480d739d

            • memory/340-9-0x0000000000400000-0x0000000000414000-memory.dmp

              Filesize

              80KB

            • memory/2608-56-0x0000000000400000-0x0000000000414000-memory.dmp

              Filesize

              80KB

            • memory/2892-55-0x0000000000400000-0x0000000000414000-memory.dmp

              Filesize

              80KB