Analysis
-
max time kernel
149s -
max time network
100s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
23-05-2024 01:38
Static task
static1
Behavioral task
behavioral1
Sample
6f2553f210ed8f1197dce823c8fa2610_NeikiAnalytics.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
6f2553f210ed8f1197dce823c8fa2610_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
6f2553f210ed8f1197dce823c8fa2610_NeikiAnalytics.exe
-
Size
72KB
-
MD5
6f2553f210ed8f1197dce823c8fa2610
-
SHA1
dd493659d3c6bd2c3c72425bafe500720459fc14
-
SHA256
a1a8fd4e02e99b90ecba45fb655b97e41f18da54272a9dca8c9252c2862336db
-
SHA512
0d6b2ece364a5685e55b1c9e656cc0bfa7a6550ae4f456016a27e78655a5ebe41f772a9380ccd287cc2589566acda5456cf13c765efde094f453d6248b61d40b
-
SSDEEP
1536:xAyToPledgGkAlSt9yzkwUk6Nr5kEHIwA69:3hgRAlStYzkrJNFkEH99
Malware Config
Signatures
-
Processes:
osridev.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "25600" osridev.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "25600" osridev.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "25600" osridev.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "25600" osridev.exe -
Modifies Installed Components in the registry 2 TTPs 4 IoCs
Processes:
osridev.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{47534147-4d48-4351-4753-41474D484351} osridev.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{47534147-4d48-4351-4753-41474D484351}\01234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123 = "a" osridev.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{47534147-4d48-4351-4753-41474D484351}\IsInstalled = "1" osridev.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{47534147-4d48-4351-4753-41474D484351}\StubPath = "C:\\Windows\\system32\\agduream-cooc.exe" osridev.exe -
Sets file execution options in registry 2 TTPs 3 IoCs
Processes:
osridev.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\explorer.exe osridev.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\explorer.exe\0123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890 = "a" osridev.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\explorer.exe\Debugger = "C:\\Windows\\system32\\eavvoatead.exe" osridev.exe -
Executes dropped EXE 2 IoCs
Processes:
osridev.exeosridev.exepid process 3044 osridev.exe 3204 osridev.exe -
Processes:
osridev.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "25600" osridev.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "25600" osridev.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "25600" osridev.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "25600" osridev.exe -
Modifies WinLogon 2 TTPs 5 IoCs
Processes:
osridev.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\{BC84DF00-BC38-9902-8082-6FCBF2D87A0B} osridev.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify osridev.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\{BC84DF00-BC38-9902-8082-6FCBF2D87A0B}\012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345 = "a" osridev.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\{BC84DF00-BC38-9902-8082-6FCBF2D87A0B}\DLLName = "C:\\Windows\\system32\\eahgotem-itac.dll" osridev.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\{BC84DF00-BC38-9902-8082-6FCBF2D87A0B}\Startup = "Startup" osridev.exe -
Drops file in System32 directory 9 IoCs
Processes:
osridev.exe6f2553f210ed8f1197dce823c8fa2610_NeikiAnalytics.exedescription ioc process File opened for modification C:\Windows\SysWOW64\eahgotem-itac.dll osridev.exe File created C:\Windows\SysWOW64\eahgotem-itac.dll osridev.exe File opened for modification C:\Windows\SysWOW64\eavvoatead.exe osridev.exe File created C:\Windows\SysWOW64\osridev.exe 6f2553f210ed8f1197dce823c8fa2610_NeikiAnalytics.exe File created C:\Windows\SysWOW64\eavvoatead.exe osridev.exe File opened for modification C:\Windows\SysWOW64\agduream-cooc.exe osridev.exe File created C:\Windows\SysWOW64\agduream-cooc.exe osridev.exe File opened for modification C:\Windows\SysWOW64\osridev.exe osridev.exe File opened for modification C:\Windows\SysWOW64\osridev.exe 6f2553f210ed8f1197dce823c8fa2610_NeikiAnalytics.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
osridev.exeosridev.exepid process 3044 osridev.exe 3044 osridev.exe 3044 osridev.exe 3044 osridev.exe 3044 osridev.exe 3044 osridev.exe 3044 osridev.exe 3044 osridev.exe 3204 osridev.exe 3204 osridev.exe 3044 osridev.exe 3044 osridev.exe 3044 osridev.exe 3044 osridev.exe 3044 osridev.exe 3044 osridev.exe 3044 osridev.exe 3044 osridev.exe 3044 osridev.exe 3044 osridev.exe 3044 osridev.exe 3044 osridev.exe 3044 osridev.exe 3044 osridev.exe 3044 osridev.exe 3044 osridev.exe 3044 osridev.exe 3044 osridev.exe 3044 osridev.exe 3044 osridev.exe 3044 osridev.exe 3044 osridev.exe 3044 osridev.exe 3044 osridev.exe 3044 osridev.exe 3044 osridev.exe 3044 osridev.exe 3044 osridev.exe 3044 osridev.exe 3044 osridev.exe 3044 osridev.exe 3044 osridev.exe 3044 osridev.exe 3044 osridev.exe 3044 osridev.exe 3044 osridev.exe 3044 osridev.exe 3044 osridev.exe 3044 osridev.exe 3044 osridev.exe 3044 osridev.exe 3044 osridev.exe 3044 osridev.exe 3044 osridev.exe 3044 osridev.exe 3044 osridev.exe 3044 osridev.exe 3044 osridev.exe 3044 osridev.exe 3044 osridev.exe 3044 osridev.exe 3044 osridev.exe 3044 osridev.exe 3044 osridev.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
osridev.exedescription pid process Token: SeDebugPrivilege 3044 osridev.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
6f2553f210ed8f1197dce823c8fa2610_NeikiAnalytics.exeosridev.exedescription pid process target process PID 1812 wrote to memory of 3044 1812 6f2553f210ed8f1197dce823c8fa2610_NeikiAnalytics.exe osridev.exe PID 1812 wrote to memory of 3044 1812 6f2553f210ed8f1197dce823c8fa2610_NeikiAnalytics.exe osridev.exe PID 1812 wrote to memory of 3044 1812 6f2553f210ed8f1197dce823c8fa2610_NeikiAnalytics.exe osridev.exe PID 3044 wrote to memory of 612 3044 osridev.exe winlogon.exe PID 3044 wrote to memory of 3440 3044 osridev.exe Explorer.EXE PID 3044 wrote to memory of 3204 3044 osridev.exe osridev.exe PID 3044 wrote to memory of 3204 3044 osridev.exe osridev.exe PID 3044 wrote to memory of 3204 3044 osridev.exe osridev.exe PID 3044 wrote to memory of 3440 3044 osridev.exe Explorer.EXE PID 3044 wrote to memory of 3440 3044 osridev.exe Explorer.EXE PID 3044 wrote to memory of 3440 3044 osridev.exe Explorer.EXE PID 3044 wrote to memory of 3440 3044 osridev.exe Explorer.EXE PID 3044 wrote to memory of 3440 3044 osridev.exe Explorer.EXE PID 3044 wrote to memory of 3440 3044 osridev.exe Explorer.EXE PID 3044 wrote to memory of 3440 3044 osridev.exe Explorer.EXE PID 3044 wrote to memory of 3440 3044 osridev.exe Explorer.EXE PID 3044 wrote to memory of 3440 3044 osridev.exe Explorer.EXE PID 3044 wrote to memory of 3440 3044 osridev.exe Explorer.EXE PID 3044 wrote to memory of 3440 3044 osridev.exe Explorer.EXE PID 3044 wrote to memory of 3440 3044 osridev.exe Explorer.EXE PID 3044 wrote to memory of 3440 3044 osridev.exe Explorer.EXE PID 3044 wrote to memory of 3440 3044 osridev.exe Explorer.EXE PID 3044 wrote to memory of 3440 3044 osridev.exe Explorer.EXE PID 3044 wrote to memory of 3440 3044 osridev.exe Explorer.EXE PID 3044 wrote to memory of 3440 3044 osridev.exe Explorer.EXE PID 3044 wrote to memory of 3440 3044 osridev.exe Explorer.EXE PID 3044 wrote to memory of 3440 3044 osridev.exe Explorer.EXE PID 3044 wrote to memory of 3440 3044 osridev.exe Explorer.EXE PID 3044 wrote to memory of 3440 3044 osridev.exe Explorer.EXE PID 3044 wrote to memory of 3440 3044 osridev.exe Explorer.EXE PID 3044 wrote to memory of 3440 3044 osridev.exe Explorer.EXE PID 3044 wrote to memory of 3440 3044 osridev.exe Explorer.EXE PID 3044 wrote to memory of 3440 3044 osridev.exe Explorer.EXE PID 3044 wrote to memory of 3440 3044 osridev.exe Explorer.EXE PID 3044 wrote to memory of 3440 3044 osridev.exe Explorer.EXE PID 3044 wrote to memory of 3440 3044 osridev.exe Explorer.EXE PID 3044 wrote to memory of 3440 3044 osridev.exe Explorer.EXE PID 3044 wrote to memory of 3440 3044 osridev.exe Explorer.EXE PID 3044 wrote to memory of 3440 3044 osridev.exe Explorer.EXE PID 3044 wrote to memory of 3440 3044 osridev.exe Explorer.EXE PID 3044 wrote to memory of 3440 3044 osridev.exe Explorer.EXE PID 3044 wrote to memory of 3440 3044 osridev.exe Explorer.EXE PID 3044 wrote to memory of 3440 3044 osridev.exe Explorer.EXE PID 3044 wrote to memory of 3440 3044 osridev.exe Explorer.EXE PID 3044 wrote to memory of 3440 3044 osridev.exe Explorer.EXE PID 3044 wrote to memory of 3440 3044 osridev.exe Explorer.EXE PID 3044 wrote to memory of 3440 3044 osridev.exe Explorer.EXE PID 3044 wrote to memory of 3440 3044 osridev.exe Explorer.EXE PID 3044 wrote to memory of 3440 3044 osridev.exe Explorer.EXE PID 3044 wrote to memory of 3440 3044 osridev.exe Explorer.EXE PID 3044 wrote to memory of 3440 3044 osridev.exe Explorer.EXE PID 3044 wrote to memory of 3440 3044 osridev.exe Explorer.EXE PID 3044 wrote to memory of 3440 3044 osridev.exe Explorer.EXE PID 3044 wrote to memory of 3440 3044 osridev.exe Explorer.EXE PID 3044 wrote to memory of 3440 3044 osridev.exe Explorer.EXE PID 3044 wrote to memory of 3440 3044 osridev.exe Explorer.EXE PID 3044 wrote to memory of 3440 3044 osridev.exe Explorer.EXE PID 3044 wrote to memory of 3440 3044 osridev.exe Explorer.EXE PID 3044 wrote to memory of 3440 3044 osridev.exe Explorer.EXE PID 3044 wrote to memory of 3440 3044 osridev.exe Explorer.EXE PID 3044 wrote to memory of 3440 3044 osridev.exe Explorer.EXE PID 3044 wrote to memory of 3440 3044 osridev.exe Explorer.EXE PID 3044 wrote to memory of 3440 3044 osridev.exe Explorer.EXE PID 3044 wrote to memory of 3440 3044 osridev.exe Explorer.EXE
Processes
-
C:\Windows\system32\winlogon.exewinlogon.exe1⤵
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
-
C:\Users\Admin\AppData\Local\Temp\6f2553f210ed8f1197dce823c8fa2610_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\6f2553f210ed8f1197dce823c8fa2610_NeikiAnalytics.exe"2⤵
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\osridev.exe"C:\Windows\SysWOW64\osridev.exe"3⤵
- Windows security bypass
- Modifies Installed Components in the registry
- Sets file execution options in registry
- Executes dropped EXE
- Windows security modification
- Modifies WinLogon
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\osridev.exe--k33p4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Windows\SysWOW64\agduream-cooc.exeFilesize
72KB
MD549e77fbc5663346ec91874179f74beea
SHA147eccdebc4e92f7999302ad5bbbe165e5d1cd3ec
SHA256b208c9b7406153514e82487f8730b99050aa717d24fcab3d8aa1bc1c1e24c511
SHA512799832ffa0b864a109f31a0a504f610ce1664c2efc9f5be5a0f2f00a255285d943095b71e750d73dcb661b717d34a7916495c42b9b30bee13300dba956f19a49
-
C:\Windows\SysWOW64\eahgotem-itac.dllFilesize
5KB
MD5f37b21c00fd81bd93c89ce741a88f183
SHA1b2796500597c68e2f5638e1101b46eaf32676c1c
SHA25676cf016fd77cb5a06c6ed4674ddc2345e8390c010cf344491a6e742baf2c0fb0
SHA512252fe66dea9a4b9aebc5fd2f24434719cb25159ba51549d9de407f44b6a2f7bce6e071be02c4f2ad6aef588c77f12c00ed415eb54f96dec1b077326e101ce0f4
-
C:\Windows\SysWOW64\eavvoatead.exeFilesize
73KB
MD5331de9968973958ee711471f087b02eb
SHA1fee57bb3c83973984834e1dcd1ec08688b9ff0b8
SHA2560b79777f0f00bd8c7f24e7a8fe752f7b299eea187c495f88e1f83a18821d3674
SHA512666ed137b50ce6a411879634522e0b265e42ab3964c17a8aae46cbefb73e0a06376caf3585c3672983c59c90136e66c6c472c6cb745d6136e6fea0c9c1ffd3e4
-
C:\Windows\SysWOW64\osridev.exeFilesize
70KB
MD5a6ecfcac40acf05f0792752f5b8ed694
SHA13bd5d0d0d5c92b8cb9f999b1a341005d04cce95c
SHA2563e33dec04c9b7f01b83b1f6e8b19897b9c300db500e88cfad0a19b4ae6aedbb2
SHA51279457cac4bba237cfc796202d4594f84b5e44a3684fd90866a012b79ed07dc0a96f415b696730f24c9e5191e8a39e224f3b924d44c555bfdb4c5fdd5474a4bb7
-
memory/1812-2-0x0000000000400000-0x0000000000403000-memory.dmpFilesize
12KB
-
memory/3044-47-0x0000000000400000-0x0000000000414000-memory.dmpFilesize
80KB
-
memory/3204-48-0x0000000000400000-0x0000000000414000-memory.dmpFilesize
80KB