Analysis
-
max time kernel
149s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
22-05-2024 21:53
Static task
static1
Behavioral task
behavioral1
Sample
4534edabcb4897682c44ee20fafd0420_NeikiAnalytics.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
4534edabcb4897682c44ee20fafd0420_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
4534edabcb4897682c44ee20fafd0420_NeikiAnalytics.exe
-
Size
73KB
-
MD5
4534edabcb4897682c44ee20fafd0420
-
SHA1
1fcf02200e4dea2bae65634948125581dc00a8de
-
SHA256
f7dd8ee0bce237401e787a46a2bc56d8091c8cfc32f9e4fadb79f735b2d3c882
-
SHA512
dbf53b1fb0f45905d086e8e7d33d5d4ecbe3cd7ed75b64ec511f4bbf50aeaf75261ebe3b7c343c88f2bd1886cc7903fe81c90e16e89556d62db3823097d80c75
-
SSDEEP
768:x/naIuoI9Igg93neKR3j0zOkbAQ9w9tCn6bch2Hv04F6G6UWEnvyciQvoyHvhAH4:xFIolkbAz986b784UUWcaciQvoyHveRW
Malware Config
Signatures
-
Processes:
etbeaxor.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "25600" etbeaxor.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "25600" etbeaxor.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "25600" etbeaxor.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "25600" etbeaxor.exe -
Modifies Installed Components in the registry 2 TTPs 4 IoCs
Processes:
etbeaxor.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{53434647-4252-4254-5343-464742524254}\01234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123 = "a" etbeaxor.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{53434647-4252-4254-5343-464742524254}\IsInstalled = "1" etbeaxor.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{53434647-4252-4254-5343-464742524254}\StubPath = "C:\\Windows\\system32\\akbepooh.exe" etbeaxor.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{53434647-4252-4254-5343-464742524254} etbeaxor.exe -
Sets file execution options in registry 2 TTPs 3 IoCs
Processes:
etbeaxor.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\explorer.exe\Debugger = "C:\\Windows\\system32\\cfotab.exe" etbeaxor.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\explorer.exe etbeaxor.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\explorer.exe\0123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890 = "a" etbeaxor.exe -
Executes dropped EXE 2 IoCs
Processes:
etbeaxor.exeetbeaxor.exepid process 2408 etbeaxor.exe 2164 etbeaxor.exe -
Loads dropped DLL 3 IoCs
Processes:
4534edabcb4897682c44ee20fafd0420_NeikiAnalytics.exeetbeaxor.exepid process 2372 4534edabcb4897682c44ee20fafd0420_NeikiAnalytics.exe 2372 4534edabcb4897682c44ee20fafd0420_NeikiAnalytics.exe 2408 etbeaxor.exe -
Processes:
etbeaxor.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "25600" etbeaxor.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "25600" etbeaxor.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "25600" etbeaxor.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "25600" etbeaxor.exe -
Modifies WinLogon 2 TTPs 5 IoCs
Processes:
etbeaxor.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify etbeaxor.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\{BC84DF00-BC38-9902-8082-6FCBF2D87A0B}\012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345 = "a" etbeaxor.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\{BC84DF00-BC38-9902-8082-6FCBF2D87A0B}\DLLName = "C:\\Windows\\system32\\exloogoh.dll" etbeaxor.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\{BC84DF00-BC38-9902-8082-6FCBF2D87A0B}\Startup = "Startup" etbeaxor.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\{BC84DF00-BC38-9902-8082-6FCBF2D87A0B} etbeaxor.exe -
Drops file in System32 directory 9 IoCs
Processes:
etbeaxor.exe4534edabcb4897682c44ee20fafd0420_NeikiAnalytics.exedescription ioc process File opened for modification C:\Windows\SysWOW64\akbepooh.exe etbeaxor.exe File created C:\Windows\SysWOW64\akbepooh.exe etbeaxor.exe File opened for modification C:\Windows\SysWOW64\exloogoh.dll etbeaxor.exe File created C:\Windows\SysWOW64\exloogoh.dll etbeaxor.exe File opened for modification C:\Windows\SysWOW64\etbeaxor.exe 4534edabcb4897682c44ee20fafd0420_NeikiAnalytics.exe File created C:\Windows\SysWOW64\etbeaxor.exe 4534edabcb4897682c44ee20fafd0420_NeikiAnalytics.exe File created C:\Windows\SysWOW64\cfotab.exe etbeaxor.exe File opened for modification C:\Windows\SysWOW64\cfotab.exe etbeaxor.exe File opened for modification C:\Windows\SysWOW64\etbeaxor.exe etbeaxor.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
etbeaxor.exeetbeaxor.exepid process 2408 etbeaxor.exe 2408 etbeaxor.exe 2408 etbeaxor.exe 2408 etbeaxor.exe 2164 etbeaxor.exe 2408 etbeaxor.exe 2408 etbeaxor.exe 2408 etbeaxor.exe 2408 etbeaxor.exe 2408 etbeaxor.exe 2408 etbeaxor.exe 2408 etbeaxor.exe 2408 etbeaxor.exe 2408 etbeaxor.exe 2408 etbeaxor.exe 2408 etbeaxor.exe 2408 etbeaxor.exe 2408 etbeaxor.exe 2408 etbeaxor.exe 2408 etbeaxor.exe 2408 etbeaxor.exe 2408 etbeaxor.exe 2408 etbeaxor.exe 2408 etbeaxor.exe 2408 etbeaxor.exe 2408 etbeaxor.exe 2408 etbeaxor.exe 2408 etbeaxor.exe 2408 etbeaxor.exe 2408 etbeaxor.exe 2408 etbeaxor.exe 2408 etbeaxor.exe 2408 etbeaxor.exe 2408 etbeaxor.exe 2408 etbeaxor.exe 2408 etbeaxor.exe 2408 etbeaxor.exe 2408 etbeaxor.exe 2408 etbeaxor.exe 2408 etbeaxor.exe 2408 etbeaxor.exe 2408 etbeaxor.exe 2408 etbeaxor.exe 2408 etbeaxor.exe 2408 etbeaxor.exe 2408 etbeaxor.exe 2408 etbeaxor.exe 2408 etbeaxor.exe 2408 etbeaxor.exe 2408 etbeaxor.exe 2408 etbeaxor.exe 2408 etbeaxor.exe 2408 etbeaxor.exe 2408 etbeaxor.exe 2408 etbeaxor.exe 2408 etbeaxor.exe 2408 etbeaxor.exe 2408 etbeaxor.exe 2408 etbeaxor.exe 2408 etbeaxor.exe 2408 etbeaxor.exe 2408 etbeaxor.exe 2408 etbeaxor.exe 2408 etbeaxor.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
etbeaxor.exedescription pid process Token: SeDebugPrivilege 2408 etbeaxor.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
4534edabcb4897682c44ee20fafd0420_NeikiAnalytics.exeetbeaxor.exedescription pid process target process PID 2372 wrote to memory of 2408 2372 4534edabcb4897682c44ee20fafd0420_NeikiAnalytics.exe etbeaxor.exe PID 2372 wrote to memory of 2408 2372 4534edabcb4897682c44ee20fafd0420_NeikiAnalytics.exe etbeaxor.exe PID 2372 wrote to memory of 2408 2372 4534edabcb4897682c44ee20fafd0420_NeikiAnalytics.exe etbeaxor.exe PID 2372 wrote to memory of 2408 2372 4534edabcb4897682c44ee20fafd0420_NeikiAnalytics.exe etbeaxor.exe PID 2408 wrote to memory of 436 2408 etbeaxor.exe winlogon.exe PID 2408 wrote to memory of 1340 2408 etbeaxor.exe Explorer.EXE PID 2408 wrote to memory of 1340 2408 etbeaxor.exe Explorer.EXE PID 2408 wrote to memory of 2164 2408 etbeaxor.exe etbeaxor.exe PID 2408 wrote to memory of 2164 2408 etbeaxor.exe etbeaxor.exe PID 2408 wrote to memory of 2164 2408 etbeaxor.exe etbeaxor.exe PID 2408 wrote to memory of 2164 2408 etbeaxor.exe etbeaxor.exe PID 2408 wrote to memory of 1340 2408 etbeaxor.exe Explorer.EXE PID 2408 wrote to memory of 1340 2408 etbeaxor.exe Explorer.EXE PID 2408 wrote to memory of 1340 2408 etbeaxor.exe Explorer.EXE PID 2408 wrote to memory of 1340 2408 etbeaxor.exe Explorer.EXE PID 2408 wrote to memory of 1340 2408 etbeaxor.exe Explorer.EXE PID 2408 wrote to memory of 1340 2408 etbeaxor.exe Explorer.EXE PID 2408 wrote to memory of 1340 2408 etbeaxor.exe Explorer.EXE PID 2408 wrote to memory of 1340 2408 etbeaxor.exe Explorer.EXE PID 2408 wrote to memory of 1340 2408 etbeaxor.exe Explorer.EXE PID 2408 wrote to memory of 1340 2408 etbeaxor.exe Explorer.EXE PID 2408 wrote to memory of 1340 2408 etbeaxor.exe Explorer.EXE PID 2408 wrote to memory of 1340 2408 etbeaxor.exe Explorer.EXE PID 2408 wrote to memory of 1340 2408 etbeaxor.exe Explorer.EXE PID 2408 wrote to memory of 1340 2408 etbeaxor.exe Explorer.EXE PID 2408 wrote to memory of 1340 2408 etbeaxor.exe Explorer.EXE PID 2408 wrote to memory of 1340 2408 etbeaxor.exe Explorer.EXE PID 2408 wrote to memory of 1340 2408 etbeaxor.exe Explorer.EXE PID 2408 wrote to memory of 1340 2408 etbeaxor.exe Explorer.EXE PID 2408 wrote to memory of 1340 2408 etbeaxor.exe Explorer.EXE PID 2408 wrote to memory of 1340 2408 etbeaxor.exe Explorer.EXE PID 2408 wrote to memory of 1340 2408 etbeaxor.exe Explorer.EXE PID 2408 wrote to memory of 1340 2408 etbeaxor.exe Explorer.EXE PID 2408 wrote to memory of 1340 2408 etbeaxor.exe Explorer.EXE PID 2408 wrote to memory of 1340 2408 etbeaxor.exe Explorer.EXE PID 2408 wrote to memory of 1340 2408 etbeaxor.exe Explorer.EXE PID 2408 wrote to memory of 1340 2408 etbeaxor.exe Explorer.EXE PID 2408 wrote to memory of 1340 2408 etbeaxor.exe Explorer.EXE PID 2408 wrote to memory of 1340 2408 etbeaxor.exe Explorer.EXE PID 2408 wrote to memory of 1340 2408 etbeaxor.exe Explorer.EXE PID 2408 wrote to memory of 1340 2408 etbeaxor.exe Explorer.EXE PID 2408 wrote to memory of 1340 2408 etbeaxor.exe Explorer.EXE PID 2408 wrote to memory of 1340 2408 etbeaxor.exe Explorer.EXE PID 2408 wrote to memory of 1340 2408 etbeaxor.exe Explorer.EXE PID 2408 wrote to memory of 1340 2408 etbeaxor.exe Explorer.EXE PID 2408 wrote to memory of 1340 2408 etbeaxor.exe Explorer.EXE PID 2408 wrote to memory of 1340 2408 etbeaxor.exe Explorer.EXE PID 2408 wrote to memory of 1340 2408 etbeaxor.exe Explorer.EXE PID 2408 wrote to memory of 1340 2408 etbeaxor.exe Explorer.EXE PID 2408 wrote to memory of 1340 2408 etbeaxor.exe Explorer.EXE PID 2408 wrote to memory of 1340 2408 etbeaxor.exe Explorer.EXE PID 2408 wrote to memory of 1340 2408 etbeaxor.exe Explorer.EXE PID 2408 wrote to memory of 1340 2408 etbeaxor.exe Explorer.EXE PID 2408 wrote to memory of 1340 2408 etbeaxor.exe Explorer.EXE PID 2408 wrote to memory of 1340 2408 etbeaxor.exe Explorer.EXE PID 2408 wrote to memory of 1340 2408 etbeaxor.exe Explorer.EXE PID 2408 wrote to memory of 1340 2408 etbeaxor.exe Explorer.EXE PID 2408 wrote to memory of 1340 2408 etbeaxor.exe Explorer.EXE PID 2408 wrote to memory of 1340 2408 etbeaxor.exe Explorer.EXE PID 2408 wrote to memory of 1340 2408 etbeaxor.exe Explorer.EXE PID 2408 wrote to memory of 1340 2408 etbeaxor.exe Explorer.EXE PID 2408 wrote to memory of 1340 2408 etbeaxor.exe Explorer.EXE PID 2408 wrote to memory of 1340 2408 etbeaxor.exe Explorer.EXE PID 2408 wrote to memory of 1340 2408 etbeaxor.exe Explorer.EXE
Processes
-
C:\Windows\system32\winlogon.exewinlogon.exe1⤵PID:436
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1340
-
C:\Users\Admin\AppData\Local\Temp\4534edabcb4897682c44ee20fafd0420_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\4534edabcb4897682c44ee20fafd0420_NeikiAnalytics.exe"2⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2372 -
C:\Windows\SysWOW64\etbeaxor.exe"C:\Windows\SysWOW64\etbeaxor.exe"3⤵
- Windows security bypass
- Modifies Installed Components in the registry
- Sets file execution options in registry
- Executes dropped EXE
- Loads dropped DLL
- Windows security modification
- Modifies WinLogon
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2408 -
C:\Windows\SysWOW64\etbeaxor.exe--k33p4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2164
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
73KB
MD5dbd9bd529fd9f8b7bbc02a07c4cae104
SHA18c1aaadb6d77e49d2caeb1ae747085a4f8e66a01
SHA25695d46743ef8a47ddd81e6d47c5f076c958bb813385a7bcd62737ee61fc7afdda
SHA5128791034819c384596b89a1e04eec97c7ede79fd23b330d7e89139875e54d06b1d69f3b40e1b020048d214b974f1de0f573f5ef9e063f70594961f3a22e16bea6
-
Filesize
74KB
MD5fcfddacadf752ca4387a039783bf292e
SHA1a0f61569b19b6eae489ca3275ad6c8a605d21a56
SHA25656a3b5eadd79daf141f9a599c9615af59145b3af44a6ff9d3c35023fb6d7b843
SHA5128627031925eae95e68937e15fb486b554b3e623f4fc780269717528742a693f627d44b9b502119d8e8d1afc20a32c7d8cc8001a1e8a32d452191251836380222
-
Filesize
5KB
MD5f37b21c00fd81bd93c89ce741a88f183
SHA1b2796500597c68e2f5638e1101b46eaf32676c1c
SHA25676cf016fd77cb5a06c6ed4674ddc2345e8390c010cf344491a6e742baf2c0fb0
SHA512252fe66dea9a4b9aebc5fd2f24434719cb25159ba51549d9de407f44b6a2f7bce6e071be02c4f2ad6aef588c77f12c00ed415eb54f96dec1b077326e101ce0f4
-
Filesize
71KB
MD582c8f91bdcfde095a6585221ec750d8b
SHA1935fc2ac59d5ce99cea23365edc343541c40decf
SHA256646b63631f58a132f5f51879cadde324303cde76cd55aa6fa80b587d5ff77ca8
SHA5129259e7ec17e58679b94a6a2d0ab701082897319d6402a1cd66dbb75f9f168cbd26951cf0f1f36903bd0c56f4e77e332142ffd99c3a7dc39026fa483c70e95da7