Analysis
-
max time kernel
149s -
max time network
123s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
22-05-2024 22:00
Static task
static1
Behavioral task
behavioral1
Sample
46bc3fdaaba1df17bfa2b307f3cca530_NeikiAnalytics.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
46bc3fdaaba1df17bfa2b307f3cca530_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
46bc3fdaaba1df17bfa2b307f3cca530_NeikiAnalytics.exe
-
Size
73KB
-
MD5
46bc3fdaaba1df17bfa2b307f3cca530
-
SHA1
67f09a0f8aeea26c9a6c7c064e6d6c5e7ad4c21b
-
SHA256
3c8e9e73fef15cb004f4eaee359a31f7bf3cdbb3139062a6c9174f53e6c31860
-
SHA512
3d7e87e19b40225bdb934afa6b2076debc6202f657db4a3e7bc815480df8d17cc59ba6ed0193e76282d5e4c4c58d5110a1e2c4031c0abc4bbba0f7ab30a0c36d
-
SSDEEP
1536:xE52iwhqb1tqObPvZkcUbSpx7/wteyNjLS:20PhqZ/TvZtYSXceKnS
Malware Config
Signatures
-
Processes:
arvageg.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "25600" arvageg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "25600" arvageg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "25600" arvageg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "25600" arvageg.exe -
Modifies Installed Components in the registry 2 TTPs 4 IoCs
Processes:
arvageg.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{4256524B-4950-5453-4256-524B49505453} arvageg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{4256524B-4950-5453-4256-524B49505453}\01234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123 = "a" arvageg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{4256524B-4950-5453-4256-524B49505453}\IsInstalled = "1" arvageg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{4256524B-4950-5453-4256-524B49505453}\StubPath = "C:\\Windows\\system32\\igbemit.exe" arvageg.exe -
Sets file execution options in registry 2 TTPs 3 IoCs
Processes:
arvageg.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\explorer.exe arvageg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\explorer.exe\0123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890 = "a" arvageg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\explorer.exe\Debugger = "C:\\Windows\\system32\\ibguvoop.exe" arvageg.exe -
Executes dropped EXE 2 IoCs
Processes:
arvageg.exearvageg.exepid process 2168 arvageg.exe 940 arvageg.exe -
Processes:
arvageg.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "25600" arvageg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "25600" arvageg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "25600" arvageg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "25600" arvageg.exe -
Modifies WinLogon 2 TTPs 5 IoCs
Processes:
arvageg.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\{BC84DF00-BC38-9902-8082-6FCBF2D87A0B}\012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345 = "a" arvageg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\{BC84DF00-BC38-9902-8082-6FCBF2D87A0B}\DLLName = "C:\\Windows\\system32\\eadxeakom-easur.dll" arvageg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\{BC84DF00-BC38-9902-8082-6FCBF2D87A0B}\Startup = "Startup" arvageg.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\{BC84DF00-BC38-9902-8082-6FCBF2D87A0B} arvageg.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify arvageg.exe -
Drops file in System32 directory 9 IoCs
Processes:
arvageg.exe46bc3fdaaba1df17bfa2b307f3cca530_NeikiAnalytics.exedescription ioc process File opened for modification C:\Windows\SysWOW64\igbemit.exe arvageg.exe File opened for modification C:\Windows\SysWOW64\eadxeakom-easur.dll arvageg.exe File created C:\Windows\SysWOW64\eadxeakom-easur.dll arvageg.exe File opened for modification C:\Windows\SysWOW64\arvageg.exe 46bc3fdaaba1df17bfa2b307f3cca530_NeikiAnalytics.exe File opened for modification C:\Windows\SysWOW64\ibguvoop.exe arvageg.exe File created C:\Windows\SysWOW64\ibguvoop.exe arvageg.exe File created C:\Windows\SysWOW64\arvageg.exe 46bc3fdaaba1df17bfa2b307f3cca530_NeikiAnalytics.exe File created C:\Windows\SysWOW64\igbemit.exe arvageg.exe File opened for modification C:\Windows\SysWOW64\arvageg.exe arvageg.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
arvageg.exearvageg.exepid process 2168 arvageg.exe 2168 arvageg.exe 2168 arvageg.exe 2168 arvageg.exe 2168 arvageg.exe 2168 arvageg.exe 2168 arvageg.exe 2168 arvageg.exe 940 arvageg.exe 940 arvageg.exe 2168 arvageg.exe 2168 arvageg.exe 2168 arvageg.exe 2168 arvageg.exe 2168 arvageg.exe 2168 arvageg.exe 2168 arvageg.exe 2168 arvageg.exe 2168 arvageg.exe 2168 arvageg.exe 2168 arvageg.exe 2168 arvageg.exe 2168 arvageg.exe 2168 arvageg.exe 2168 arvageg.exe 2168 arvageg.exe 2168 arvageg.exe 2168 arvageg.exe 2168 arvageg.exe 2168 arvageg.exe 2168 arvageg.exe 2168 arvageg.exe 2168 arvageg.exe 2168 arvageg.exe 2168 arvageg.exe 2168 arvageg.exe 2168 arvageg.exe 2168 arvageg.exe 2168 arvageg.exe 2168 arvageg.exe 2168 arvageg.exe 2168 arvageg.exe 2168 arvageg.exe 2168 arvageg.exe 2168 arvageg.exe 2168 arvageg.exe 2168 arvageg.exe 2168 arvageg.exe 2168 arvageg.exe 2168 arvageg.exe 2168 arvageg.exe 2168 arvageg.exe 2168 arvageg.exe 2168 arvageg.exe 2168 arvageg.exe 2168 arvageg.exe 2168 arvageg.exe 2168 arvageg.exe 2168 arvageg.exe 2168 arvageg.exe 2168 arvageg.exe 2168 arvageg.exe 2168 arvageg.exe 2168 arvageg.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
arvageg.exedescription pid process Token: SeDebugPrivilege 2168 arvageg.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
46bc3fdaaba1df17bfa2b307f3cca530_NeikiAnalytics.exearvageg.exedescription pid process target process PID 1328 wrote to memory of 2168 1328 46bc3fdaaba1df17bfa2b307f3cca530_NeikiAnalytics.exe arvageg.exe PID 1328 wrote to memory of 2168 1328 46bc3fdaaba1df17bfa2b307f3cca530_NeikiAnalytics.exe arvageg.exe PID 1328 wrote to memory of 2168 1328 46bc3fdaaba1df17bfa2b307f3cca530_NeikiAnalytics.exe arvageg.exe PID 2168 wrote to memory of 940 2168 arvageg.exe arvageg.exe PID 2168 wrote to memory of 940 2168 arvageg.exe arvageg.exe PID 2168 wrote to memory of 940 2168 arvageg.exe arvageg.exe PID 2168 wrote to memory of 616 2168 arvageg.exe winlogon.exe PID 2168 wrote to memory of 3580 2168 arvageg.exe Explorer.EXE PID 2168 wrote to memory of 3580 2168 arvageg.exe Explorer.EXE PID 2168 wrote to memory of 3580 2168 arvageg.exe Explorer.EXE PID 2168 wrote to memory of 3580 2168 arvageg.exe Explorer.EXE PID 2168 wrote to memory of 3580 2168 arvageg.exe Explorer.EXE PID 2168 wrote to memory of 3580 2168 arvageg.exe Explorer.EXE PID 2168 wrote to memory of 3580 2168 arvageg.exe Explorer.EXE PID 2168 wrote to memory of 3580 2168 arvageg.exe Explorer.EXE PID 2168 wrote to memory of 3580 2168 arvageg.exe Explorer.EXE PID 2168 wrote to memory of 3580 2168 arvageg.exe Explorer.EXE PID 2168 wrote to memory of 3580 2168 arvageg.exe Explorer.EXE PID 2168 wrote to memory of 3580 2168 arvageg.exe Explorer.EXE PID 2168 wrote to memory of 3580 2168 arvageg.exe Explorer.EXE PID 2168 wrote to memory of 3580 2168 arvageg.exe Explorer.EXE PID 2168 wrote to memory of 3580 2168 arvageg.exe Explorer.EXE PID 2168 wrote to memory of 3580 2168 arvageg.exe Explorer.EXE PID 2168 wrote to memory of 3580 2168 arvageg.exe Explorer.EXE PID 2168 wrote to memory of 3580 2168 arvageg.exe Explorer.EXE PID 2168 wrote to memory of 3580 2168 arvageg.exe Explorer.EXE PID 2168 wrote to memory of 3580 2168 arvageg.exe Explorer.EXE PID 2168 wrote to memory of 3580 2168 arvageg.exe Explorer.EXE PID 2168 wrote to memory of 3580 2168 arvageg.exe Explorer.EXE PID 2168 wrote to memory of 3580 2168 arvageg.exe Explorer.EXE PID 2168 wrote to memory of 3580 2168 arvageg.exe Explorer.EXE PID 2168 wrote to memory of 3580 2168 arvageg.exe Explorer.EXE PID 2168 wrote to memory of 3580 2168 arvageg.exe Explorer.EXE PID 2168 wrote to memory of 3580 2168 arvageg.exe Explorer.EXE PID 2168 wrote to memory of 3580 2168 arvageg.exe Explorer.EXE PID 2168 wrote to memory of 3580 2168 arvageg.exe Explorer.EXE PID 2168 wrote to memory of 3580 2168 arvageg.exe Explorer.EXE PID 2168 wrote to memory of 3580 2168 arvageg.exe Explorer.EXE PID 2168 wrote to memory of 3580 2168 arvageg.exe Explorer.EXE PID 2168 wrote to memory of 3580 2168 arvageg.exe Explorer.EXE PID 2168 wrote to memory of 3580 2168 arvageg.exe Explorer.EXE PID 2168 wrote to memory of 3580 2168 arvageg.exe Explorer.EXE PID 2168 wrote to memory of 3580 2168 arvageg.exe Explorer.EXE PID 2168 wrote to memory of 3580 2168 arvageg.exe Explorer.EXE PID 2168 wrote to memory of 3580 2168 arvageg.exe Explorer.EXE PID 2168 wrote to memory of 3580 2168 arvageg.exe Explorer.EXE PID 2168 wrote to memory of 3580 2168 arvageg.exe Explorer.EXE PID 2168 wrote to memory of 3580 2168 arvageg.exe Explorer.EXE PID 2168 wrote to memory of 3580 2168 arvageg.exe Explorer.EXE PID 2168 wrote to memory of 3580 2168 arvageg.exe Explorer.EXE PID 2168 wrote to memory of 3580 2168 arvageg.exe Explorer.EXE PID 2168 wrote to memory of 3580 2168 arvageg.exe Explorer.EXE PID 2168 wrote to memory of 3580 2168 arvageg.exe Explorer.EXE PID 2168 wrote to memory of 3580 2168 arvageg.exe Explorer.EXE PID 2168 wrote to memory of 3580 2168 arvageg.exe Explorer.EXE PID 2168 wrote to memory of 3580 2168 arvageg.exe Explorer.EXE PID 2168 wrote to memory of 3580 2168 arvageg.exe Explorer.EXE PID 2168 wrote to memory of 3580 2168 arvageg.exe Explorer.EXE PID 2168 wrote to memory of 3580 2168 arvageg.exe Explorer.EXE PID 2168 wrote to memory of 3580 2168 arvageg.exe Explorer.EXE PID 2168 wrote to memory of 3580 2168 arvageg.exe Explorer.EXE PID 2168 wrote to memory of 3580 2168 arvageg.exe Explorer.EXE PID 2168 wrote to memory of 3580 2168 arvageg.exe Explorer.EXE PID 2168 wrote to memory of 3580 2168 arvageg.exe Explorer.EXE
Processes
-
C:\Windows\system32\winlogon.exewinlogon.exe1⤵PID:616
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3580
-
C:\Users\Admin\AppData\Local\Temp\46bc3fdaaba1df17bfa2b307f3cca530_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\46bc3fdaaba1df17bfa2b307f3cca530_NeikiAnalytics.exe"2⤵
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1328 -
C:\Windows\SysWOW64\arvageg.exe"C:\Windows\SysWOW64\arvageg.exe"3⤵
- Windows security bypass
- Modifies Installed Components in the registry
- Sets file execution options in registry
- Executes dropped EXE
- Windows security modification
- Modifies WinLogon
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2168 -
C:\Windows\SysWOW64\arvageg.exe--k33p4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:940
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD53b8f8a1b220eec744f8e6c78a25fda71
SHA1043dfe138d3e07347ed8950b1d5cd085f0267e92
SHA256ecabc85aa4e2f1d4b123d95e69ad897e27f79810dad7ad3c813f2d35b1412b0d
SHA512e40f6b42e837e1be723d15da51160ce1e1f0a43582b94464e6340a419450c7b959a04ad04b10035883df69db232c5f4e5d11c6690daddd105fe092ea356d9ce2
-
Filesize
5KB
MD5f37b21c00fd81bd93c89ce741a88f183
SHA1b2796500597c68e2f5638e1101b46eaf32676c1c
SHA25676cf016fd77cb5a06c6ed4674ddc2345e8390c010cf344491a6e742baf2c0fb0
SHA512252fe66dea9a4b9aebc5fd2f24434719cb25159ba51549d9de407f44b6a2f7bce6e071be02c4f2ad6aef588c77f12c00ed415eb54f96dec1b077326e101ce0f4
-
Filesize
74KB
MD577f79948a89669b2f76abff60266e9b8
SHA1f2cb0cdbb78c663790814b0195864537ea26ed80
SHA2560dd3de90c424a2e2cc4299ac6a3a15266f34e8bf5ef879ab92ec22887f4ee7bb
SHA512191b676c9485555180917081db2dd49cef4717db1d0a9dc9e2b319405ecefbffd6a1cc91e0ec531fd307d35011302b17b8bb86d2c364ab59d8ae6cc6710e8911
-
Filesize
73KB
MD5470da15631269f9fb75c6161a5e329aa
SHA11b286defcd965e4632d6b321e6010ff8a6662910
SHA256250e7507528e0b065709ad89a9e964521c892d7fd0f33e90a3edff6e2adfdacc
SHA5123f70efd6f81fb73cfb4abd7815968e2e2d4851962fe3d662b8b5f455a65251c8dcc718d8039a1fac53851bc4785d0806c2cd3444662f57e61c3da6676e64e4c8