Analysis
-
max time kernel
149s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
24/05/2024, 21:58
Static task
static1
Behavioral task
behavioral1
Sample
3a7929c93c3138aa1eea405dcc7b7880_NeikiAnalytics.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
3a7929c93c3138aa1eea405dcc7b7880_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
3a7929c93c3138aa1eea405dcc7b7880_NeikiAnalytics.exe
-
Size
71KB
-
MD5
3a7929c93c3138aa1eea405dcc7b7880
-
SHA1
7846ee6f43a068abf46c1c47fa589f0525abbf40
-
SHA256
5a9df43034147907719c5ad91ffa6543558434247b48059161746e1495b80eeb
-
SHA512
f19026b890165a07b66c885914cea2694b4f039954d692d80544d0800d7081af3ecdf0340f55b670957c5a189f6037860977460e1ff5913e8592881adf35c3bf
-
SSDEEP
1536:1teqKDlXvCDB04f5Gn/L8FlADNt3d1Hw8slqqkE:Olg35GTslA5t3/w8N2
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "25600" ipdeadev.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "25600" ipdeadev.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "25600" ipdeadev.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "25600" ipdeadev.exe -
Modifies Installed Components in the registry 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{554F5448-4350-4851-554F-544843504851}\01234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123 = "a" ipdeadev.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{554F5448-4350-4851-554F-544843504851}\IsInstalled = "1" ipdeadev.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{554F5448-4350-4851-554F-544843504851}\StubPath = "C:\\Windows\\system32\\adnatup.exe" ipdeadev.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{554F5448-4350-4851-554F-544843504851} ipdeadev.exe -
Sets file execution options in registry 2 TTPs 3 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\explorer.exe ipdeadev.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\explorer.exe\0123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890 = "a" ipdeadev.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\explorer.exe\Debugger = "C:\\Windows\\system32\\emsopok-cid.exe" ipdeadev.exe -
Executes dropped EXE 2 IoCs
pid Process 1744 ipdeadev.exe 1808 ipdeadev.exe -
Loads dropped DLL 3 IoCs
pid Process 2108 3a7929c93c3138aa1eea405dcc7b7880_NeikiAnalytics.exe 2108 3a7929c93c3138aa1eea405dcc7b7880_NeikiAnalytics.exe 1744 ipdeadev.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "25600" ipdeadev.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "25600" ipdeadev.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "25600" ipdeadev.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "25600" ipdeadev.exe -
Modifies WinLogon 2 TTPs 5 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\{BC84DF00-BC38-9902-8082-6FCBF2D87A0B} ipdeadev.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify ipdeadev.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\{BC84DF00-BC38-9902-8082-6FCBF2D87A0B}\012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345 = "a" ipdeadev.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\{BC84DF00-BC38-9902-8082-6FCBF2D87A0B}\DLLName = "C:\\Windows\\system32\\ekmoamoap.dll" ipdeadev.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\{BC84DF00-BC38-9902-8082-6FCBF2D87A0B}\Startup = "Startup" ipdeadev.exe -
Drops file in System32 directory 9 IoCs
description ioc Process File created C:\Windows\SysWOW64\ekmoamoap.dll ipdeadev.exe File created C:\Windows\SysWOW64\ipdeadev.exe 3a7929c93c3138aa1eea405dcc7b7880_NeikiAnalytics.exe File opened for modification C:\Windows\SysWOW64\adnatup.exe ipdeadev.exe File created C:\Windows\SysWOW64\adnatup.exe ipdeadev.exe File opened for modification C:\Windows\SysWOW64\ekmoamoap.dll ipdeadev.exe File opened for modification C:\Windows\SysWOW64\ipdeadev.exe ipdeadev.exe File opened for modification C:\Windows\SysWOW64\ipdeadev.exe 3a7929c93c3138aa1eea405dcc7b7880_NeikiAnalytics.exe File opened for modification C:\Windows\SysWOW64\emsopok-cid.exe ipdeadev.exe File created C:\Windows\SysWOW64\emsopok-cid.exe ipdeadev.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1744 ipdeadev.exe 1744 ipdeadev.exe 1744 ipdeadev.exe 1744 ipdeadev.exe 1808 ipdeadev.exe 1744 ipdeadev.exe 1744 ipdeadev.exe 1744 ipdeadev.exe 1744 ipdeadev.exe 1744 ipdeadev.exe 1744 ipdeadev.exe 1744 ipdeadev.exe 1744 ipdeadev.exe 1744 ipdeadev.exe 1744 ipdeadev.exe 1744 ipdeadev.exe 1744 ipdeadev.exe 1744 ipdeadev.exe 1744 ipdeadev.exe 1744 ipdeadev.exe 1744 ipdeadev.exe 1744 ipdeadev.exe 1744 ipdeadev.exe 1744 ipdeadev.exe 1744 ipdeadev.exe 1744 ipdeadev.exe 1744 ipdeadev.exe 1744 ipdeadev.exe 1744 ipdeadev.exe 1744 ipdeadev.exe 1744 ipdeadev.exe 1744 ipdeadev.exe 1744 ipdeadev.exe 1744 ipdeadev.exe 1744 ipdeadev.exe 1744 ipdeadev.exe 1744 ipdeadev.exe 1744 ipdeadev.exe 1744 ipdeadev.exe 1744 ipdeadev.exe 1744 ipdeadev.exe 1744 ipdeadev.exe 1744 ipdeadev.exe 1744 ipdeadev.exe 1744 ipdeadev.exe 1744 ipdeadev.exe 1744 ipdeadev.exe 1744 ipdeadev.exe 1744 ipdeadev.exe 1744 ipdeadev.exe 1744 ipdeadev.exe 1744 ipdeadev.exe 1744 ipdeadev.exe 1744 ipdeadev.exe 1744 ipdeadev.exe 1744 ipdeadev.exe 1744 ipdeadev.exe 1744 ipdeadev.exe 1744 ipdeadev.exe 1744 ipdeadev.exe 1744 ipdeadev.exe 1744 ipdeadev.exe 1744 ipdeadev.exe 1744 ipdeadev.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2108 3a7929c93c3138aa1eea405dcc7b7880_NeikiAnalytics.exe Token: SeDebugPrivilege 1744 ipdeadev.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2108 wrote to memory of 1744 2108 3a7929c93c3138aa1eea405dcc7b7880_NeikiAnalytics.exe 28 PID 2108 wrote to memory of 1744 2108 3a7929c93c3138aa1eea405dcc7b7880_NeikiAnalytics.exe 28 PID 2108 wrote to memory of 1744 2108 3a7929c93c3138aa1eea405dcc7b7880_NeikiAnalytics.exe 28 PID 2108 wrote to memory of 1744 2108 3a7929c93c3138aa1eea405dcc7b7880_NeikiAnalytics.exe 28 PID 1744 wrote to memory of 432 1744 ipdeadev.exe 5 PID 1744 wrote to memory of 1232 1744 ipdeadev.exe 21 PID 1744 wrote to memory of 1232 1744 ipdeadev.exe 21 PID 1744 wrote to memory of 1808 1744 ipdeadev.exe 29 PID 1744 wrote to memory of 1808 1744 ipdeadev.exe 29 PID 1744 wrote to memory of 1808 1744 ipdeadev.exe 29 PID 1744 wrote to memory of 1808 1744 ipdeadev.exe 29 PID 1744 wrote to memory of 1232 1744 ipdeadev.exe 21 PID 1744 wrote to memory of 1232 1744 ipdeadev.exe 21 PID 1744 wrote to memory of 1232 1744 ipdeadev.exe 21 PID 1744 wrote to memory of 1232 1744 ipdeadev.exe 21 PID 1744 wrote to memory of 1232 1744 ipdeadev.exe 21 PID 1744 wrote to memory of 1232 1744 ipdeadev.exe 21 PID 1744 wrote to memory of 1232 1744 ipdeadev.exe 21 PID 1744 wrote to memory of 1232 1744 ipdeadev.exe 21 PID 1744 wrote to memory of 1232 1744 ipdeadev.exe 21 PID 1744 wrote to memory of 1232 1744 ipdeadev.exe 21 PID 1744 wrote to memory of 1232 1744 ipdeadev.exe 21 PID 1744 wrote to memory of 1232 1744 ipdeadev.exe 21 PID 1744 wrote to memory of 1232 1744 ipdeadev.exe 21 PID 1744 wrote to memory of 1232 1744 ipdeadev.exe 21 PID 1744 wrote to memory of 1232 1744 ipdeadev.exe 21 PID 1744 wrote to memory of 1232 1744 ipdeadev.exe 21 PID 1744 wrote to memory of 1232 1744 ipdeadev.exe 21 PID 1744 wrote to memory of 1232 1744 ipdeadev.exe 21 PID 1744 wrote to memory of 1232 1744 ipdeadev.exe 21 PID 1744 wrote to memory of 1232 1744 ipdeadev.exe 21 PID 1744 wrote to memory of 1232 1744 ipdeadev.exe 21 PID 1744 wrote to memory of 1232 1744 ipdeadev.exe 21 PID 1744 wrote to memory of 1232 1744 ipdeadev.exe 21 PID 1744 wrote to memory of 1232 1744 ipdeadev.exe 21 PID 1744 wrote to memory of 1232 1744 ipdeadev.exe 21 PID 1744 wrote to memory of 1232 1744 ipdeadev.exe 21 PID 1744 wrote to memory of 1232 1744 ipdeadev.exe 21 PID 1744 wrote to memory of 1232 1744 ipdeadev.exe 21 PID 1744 wrote to memory of 1232 1744 ipdeadev.exe 21 PID 1744 wrote to memory of 1232 1744 ipdeadev.exe 21 PID 1744 wrote to memory of 1232 1744 ipdeadev.exe 21 PID 1744 wrote to memory of 1232 1744 ipdeadev.exe 21 PID 1744 wrote to memory of 1232 1744 ipdeadev.exe 21 PID 1744 wrote to memory of 1232 1744 ipdeadev.exe 21 PID 1744 wrote to memory of 1232 1744 ipdeadev.exe 21 PID 1744 wrote to memory of 1232 1744 ipdeadev.exe 21 PID 1744 wrote to memory of 1232 1744 ipdeadev.exe 21 PID 1744 wrote to memory of 1232 1744 ipdeadev.exe 21 PID 1744 wrote to memory of 1232 1744 ipdeadev.exe 21 PID 1744 wrote to memory of 1232 1744 ipdeadev.exe 21 PID 1744 wrote to memory of 1232 1744 ipdeadev.exe 21 PID 1744 wrote to memory of 1232 1744 ipdeadev.exe 21 PID 1744 wrote to memory of 1232 1744 ipdeadev.exe 21 PID 1744 wrote to memory of 1232 1744 ipdeadev.exe 21 PID 1744 wrote to memory of 1232 1744 ipdeadev.exe 21 PID 1744 wrote to memory of 1232 1744 ipdeadev.exe 21 PID 1744 wrote to memory of 1232 1744 ipdeadev.exe 21 PID 1744 wrote to memory of 1232 1744 ipdeadev.exe 21 PID 1744 wrote to memory of 1232 1744 ipdeadev.exe 21 PID 1744 wrote to memory of 1232 1744 ipdeadev.exe 21 PID 1744 wrote to memory of 1232 1744 ipdeadev.exe 21 PID 1744 wrote to memory of 1232 1744 ipdeadev.exe 21 PID 1744 wrote to memory of 1232 1744 ipdeadev.exe 21
Processes
-
C:\Windows\system32\winlogon.exewinlogon.exe1⤵PID:432
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1232
-
C:\Users\Admin\AppData\Local\Temp\3a7929c93c3138aa1eea405dcc7b7880_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\3a7929c93c3138aa1eea405dcc7b7880_NeikiAnalytics.exe"2⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2108 -
C:\Windows\SysWOW64\ipdeadev.exe"C:\Windows\system32\ipdeadev.exe"3⤵
- Windows security bypass
- Modifies Installed Components in the registry
- Sets file execution options in registry
- Executes dropped EXE
- Loads dropped DLL
- Windows security modification
- Modifies WinLogon
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1744 -
C:\Windows\SysWOW64\ipdeadev.exe--k33p4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:1808
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
73KB
MD5561b09eb540b7ff0023310cbf0ad8674
SHA12955fca7902705869ee1b3216f850d691895af7f
SHA256217a359b168de8049c09db1659ddd87649a22e242252f00be60d2be98b66e2b5
SHA512c7f91558d446e2fc18bc822000a44b90b7064997b68ddea4f977e3bb10f56a4b232371391649758568e083c7ceb7622c9ecc9eca107977d849cda514b7059654
-
Filesize
5KB
MD5f37b21c00fd81bd93c89ce741a88f183
SHA1b2796500597c68e2f5638e1101b46eaf32676c1c
SHA25676cf016fd77cb5a06c6ed4674ddc2345e8390c010cf344491a6e742baf2c0fb0
SHA512252fe66dea9a4b9aebc5fd2f24434719cb25159ba51549d9de407f44b6a2f7bce6e071be02c4f2ad6aef588c77f12c00ed415eb54f96dec1b077326e101ce0f4
-
Filesize
74KB
MD51c84cddea350e2ba54cf2d2bdc079d6a
SHA17b82971fdc3d0e56f750afef36f30ec4c9efd1a7
SHA2565878ccc0d641a9f8d958bf508ec47fc6cea70fcd5e56bb9976a3152451176dab
SHA5128eb645821712922d4d8e7492e6d45fffcb5217628cd791b27a56f54b28df6b7e62073f798064150f97bef7e58e20aade3460ebf006e1471b5571cbb5135f7150
-
Filesize
71KB
MD53a7929c93c3138aa1eea405dcc7b7880
SHA17846ee6f43a068abf46c1c47fa589f0525abbf40
SHA2565a9df43034147907719c5ad91ffa6543558434247b48059161746e1495b80eeb
SHA512f19026b890165a07b66c885914cea2694b4f039954d692d80544d0800d7081af3ecdf0340f55b670957c5a189f6037860977460e1ff5913e8592881adf35c3bf