Analysis

  • max time kernel
    149s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22-05-2024 20:58

General

  • Target

    3a0884155b093d86d2fd7a957b86d9d0_NeikiAnalytics.exe

  • Size

    73KB

  • MD5

    3a0884155b093d86d2fd7a957b86d9d0

  • SHA1

    517632742ad845a0f62f1d9134812315388e8a74

  • SHA256

    383722fa543a205cf1425e74e4edecbf4c76f5bf25ad03a620161f6fca95d7d2

  • SHA512

    60eee780325fc5500953d8c9378d0e5e4866aa62e0a32f7140c2b7ebe0553bd4d4655d152c330cf91c429f2a396da4e053d79bb33acc41a1c126da4a9778583c

  • SSDEEP

    1536:xl6p585dpr3KCUGCsqq2ku2S+Se0uyMWmiCeiq+uKQy6+2OOSGwm6S+yaG2quiCv:f6XY/3KCUGCsqq2ku2S+Se0uyMWmiCec

Malware Config

Signatures

  • Windows security bypass 2 TTPs 4 IoCs
  • Modifies Installed Components in the registry 2 TTPs 4 IoCs
  • Sets file execution options in registry 2 TTPs 3 IoCs
  • Executes dropped EXE 2 IoCs
  • Windows security modification 2 TTPs 4 IoCs
  • Modifies WinLogon 2 TTPs 5 IoCs
  • Drops file in System32 directory 9 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\system32\winlogon.exe
    winlogon.exe
    1⤵
      PID:612
    • C:\Windows\Explorer.EXE
      C:\Windows\Explorer.EXE
      1⤵
        PID:3452
        • C:\Users\Admin\AppData\Local\Temp\3a0884155b093d86d2fd7a957b86d9d0_NeikiAnalytics.exe
          "C:\Users\Admin\AppData\Local\Temp\3a0884155b093d86d2fd7a957b86d9d0_NeikiAnalytics.exe"
          2⤵
          • Drops file in System32 directory
          • Suspicious use of WriteProcessMemory
          PID:3596
          • C:\Windows\SysWOW64\oxnoagim.exe
            "C:\Windows\SysWOW64\oxnoagim.exe"
            3⤵
            • Windows security bypass
            • Modifies Installed Components in the registry
            • Sets file execution options in registry
            • Executes dropped EXE
            • Windows security modification
            • Modifies WinLogon
            • Drops file in System32 directory
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:1856
            • C:\Windows\SysWOW64\oxnoagim.exe
              --k33p
              4⤵
              • Executes dropped EXE
              • Suspicious behavior: EnumeratesProcesses
              PID:184

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Windows\SysWOW64\abrepooc.exe

        Filesize

        73KB

        MD5

        c68eb79fbac5249d1a85f503f80944dc

        SHA1

        0039f471d9ef0f0f4fc42c5710567e3cc60134ed

        SHA256

        975f6e3d59782c2c4c4e3957186f924cd3b01f6ad8693b876e9893cf739e55e8

        SHA512

        9357b338cf06764ddc49bcc47b33c49f925ae03410a937a14d8ce95bcdb271b68df788101e3690cb365fc1f5b1452cda635d7c579b3f88df48f20793ae2c8ed4

      • C:\Windows\SysWOW64\engimeam-ted.exe

        Filesize

        74KB

        MD5

        0e8feb6ffc8041a605e271ba486dc070

        SHA1

        200a4dedae73df5aa188ca72885c8b1755a18938

        SHA256

        2a49cea67ec7f1f20fff4eb12f67a3da0d74b3f5d322b95f202514bd0903b439

        SHA512

        80e79002f23847e428d6dd5238cfd0ae365137c16875f798f888adaa0cd3af9448a1911dae024e3e30007808f885e137203682ae2dacd20c968d2e73202c4729

      • C:\Windows\SysWOW64\oubfooxec.dll

        Filesize

        5KB

        MD5

        f37b21c00fd81bd93c89ce741a88f183

        SHA1

        b2796500597c68e2f5638e1101b46eaf32676c1c

        SHA256

        76cf016fd77cb5a06c6ed4674ddc2345e8390c010cf344491a6e742baf2c0fb0

        SHA512

        252fe66dea9a4b9aebc5fd2f24434719cb25159ba51549d9de407f44b6a2f7bce6e071be02c4f2ad6aef588c77f12c00ed415eb54f96dec1b077326e101ce0f4

      • C:\Windows\SysWOW64\oxnoagim.exe

        Filesize

        71KB

        MD5

        a530c84c6da81fdff14b5553832c05df

        SHA1

        3be26b331202a8112f599b8f9f371310c0d155cf

        SHA256

        c87a0b7b92a9c5ab28072806d9c3e59b51d954c48cf29cc8c6e192e04cb6a950

        SHA512

        ba33829ee612c3480e1cf580d5a16531d7299a504920febe96abc312af685223d317929a7ccb3255ebf5e87b319adec1a0ff6cd706fc1523ac22ffd8dbcede11

      • memory/184-48-0x0000000000400000-0x0000000000414000-memory.dmp

        Filesize

        80KB

      • memory/1856-47-0x0000000000400000-0x0000000000414000-memory.dmp

        Filesize

        80KB

      • memory/3596-3-0x0000000000400000-0x0000000000403000-memory.dmp

        Filesize

        12KB