Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
24/05/2024, 15:26
Static task
static1
Behavioral task
behavioral1
Sample
f9a50697567b96497b63231028e50ed0_NeikiAnalytics.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
f9a50697567b96497b63231028e50ed0_NeikiAnalytics.exe
Resource
win10v2004-20240426-en
General
-
Target
f9a50697567b96497b63231028e50ed0_NeikiAnalytics.exe
-
Size
70KB
-
MD5
f9a50697567b96497b63231028e50ed0
-
SHA1
574eccdfd9450aaa0cdbdbd59aa24a8721d226f0
-
SHA256
d84a1711469603ee1eb7a16f84decbfe5d7005f24bc0ecab93c38ac3b1ab1a76
-
SHA512
e4d013524c671bc4face36311c625585d01f70c4a8abdc259756adf1744c898c72dcad80975def1f33d2b77b70238cddb5f658d7ca355a3b177eac910372b94d
-
SSDEEP
1536:1teqKDlXvCDB04f5Gn/L8FlADNt3d1Hw8sl2D:Olg35GTslA5t3/w8hD
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "25600" ouscoobooh-uxoab.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "25600" ouscoobooh-uxoab.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "25600" ouscoobooh-uxoab.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "25600" ouscoobooh-uxoab.exe -
Modifies Installed Components in the registry 2 TTPs 4 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{4C4C5844-4845-5743-4C4C-584448455743}\IsInstalled = "1" ouscoobooh-uxoab.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{4C4C5844-4845-5743-4C4C-584448455743}\StubPath = "C:\\Windows\\system32\\bmirir.exe" ouscoobooh-uxoab.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{4C4C5844-4845-5743-4C4C-584448455743} ouscoobooh-uxoab.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{4C4C5844-4845-5743-4C4C-584448455743}\01234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123 = "a" ouscoobooh-uxoab.exe -
Sets file execution options in registry 2 TTPs 3 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\explorer.exe ouscoobooh-uxoab.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\explorer.exe\0123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890 = "a" ouscoobooh-uxoab.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\explorer.exe\Debugger = "C:\\Windows\\system32\\udxeamaf.exe" ouscoobooh-uxoab.exe -
Executes dropped EXE 2 IoCs
pid Process 3000 ouscoobooh-uxoab.exe 4260 ouscoobooh-uxoab.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "25600" ouscoobooh-uxoab.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "25600" ouscoobooh-uxoab.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "25600" ouscoobooh-uxoab.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "25600" ouscoobooh-uxoab.exe -
Modifies WinLogon 2 TTPs 5 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\{BC84DF00-BC38-9902-8082-6FCBF2D87A0B} ouscoobooh-uxoab.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify ouscoobooh-uxoab.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\{BC84DF00-BC38-9902-8082-6FCBF2D87A0B}\012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345 = "a" ouscoobooh-uxoab.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\{BC84DF00-BC38-9902-8082-6FCBF2D87A0B}\DLLName = "C:\\Windows\\system32\\ouddoocux-icum.dll" ouscoobooh-uxoab.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\{BC84DF00-BC38-9902-8082-6FCBF2D87A0B}\Startup = "Startup" ouscoobooh-uxoab.exe -
Drops file in System32 directory 9 IoCs
description ioc Process File created C:\Windows\SysWOW64\ouscoobooh-uxoab.exe f9a50697567b96497b63231028e50ed0_NeikiAnalytics.exe File opened for modification C:\Windows\SysWOW64\udxeamaf.exe ouscoobooh-uxoab.exe File created C:\Windows\SysWOW64\udxeamaf.exe ouscoobooh-uxoab.exe File opened for modification C:\Windows\SysWOW64\bmirir.exe ouscoobooh-uxoab.exe File created C:\Windows\SysWOW64\ouddoocux-icum.dll ouscoobooh-uxoab.exe File opened for modification C:\Windows\SysWOW64\ouscoobooh-uxoab.exe ouscoobooh-uxoab.exe File opened for modification C:\Windows\SysWOW64\ouscoobooh-uxoab.exe f9a50697567b96497b63231028e50ed0_NeikiAnalytics.exe File created C:\Windows\SysWOW64\bmirir.exe ouscoobooh-uxoab.exe File opened for modification C:\Windows\SysWOW64\ouddoocux-icum.dll ouscoobooh-uxoab.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3000 ouscoobooh-uxoab.exe 3000 ouscoobooh-uxoab.exe 3000 ouscoobooh-uxoab.exe 3000 ouscoobooh-uxoab.exe 3000 ouscoobooh-uxoab.exe 3000 ouscoobooh-uxoab.exe 3000 ouscoobooh-uxoab.exe 3000 ouscoobooh-uxoab.exe 4260 ouscoobooh-uxoab.exe 4260 ouscoobooh-uxoab.exe 3000 ouscoobooh-uxoab.exe 3000 ouscoobooh-uxoab.exe 3000 ouscoobooh-uxoab.exe 3000 ouscoobooh-uxoab.exe 3000 ouscoobooh-uxoab.exe 3000 ouscoobooh-uxoab.exe 3000 ouscoobooh-uxoab.exe 3000 ouscoobooh-uxoab.exe 3000 ouscoobooh-uxoab.exe 3000 ouscoobooh-uxoab.exe 3000 ouscoobooh-uxoab.exe 3000 ouscoobooh-uxoab.exe 3000 ouscoobooh-uxoab.exe 3000 ouscoobooh-uxoab.exe 3000 ouscoobooh-uxoab.exe 3000 ouscoobooh-uxoab.exe 3000 ouscoobooh-uxoab.exe 3000 ouscoobooh-uxoab.exe 3000 ouscoobooh-uxoab.exe 3000 ouscoobooh-uxoab.exe 3000 ouscoobooh-uxoab.exe 3000 ouscoobooh-uxoab.exe 3000 ouscoobooh-uxoab.exe 3000 ouscoobooh-uxoab.exe 3000 ouscoobooh-uxoab.exe 3000 ouscoobooh-uxoab.exe 3000 ouscoobooh-uxoab.exe 3000 ouscoobooh-uxoab.exe 3000 ouscoobooh-uxoab.exe 3000 ouscoobooh-uxoab.exe 3000 ouscoobooh-uxoab.exe 3000 ouscoobooh-uxoab.exe 3000 ouscoobooh-uxoab.exe 3000 ouscoobooh-uxoab.exe 3000 ouscoobooh-uxoab.exe 3000 ouscoobooh-uxoab.exe 3000 ouscoobooh-uxoab.exe 3000 ouscoobooh-uxoab.exe 3000 ouscoobooh-uxoab.exe 3000 ouscoobooh-uxoab.exe 3000 ouscoobooh-uxoab.exe 3000 ouscoobooh-uxoab.exe 3000 ouscoobooh-uxoab.exe 3000 ouscoobooh-uxoab.exe 3000 ouscoobooh-uxoab.exe 3000 ouscoobooh-uxoab.exe 3000 ouscoobooh-uxoab.exe 3000 ouscoobooh-uxoab.exe 3000 ouscoobooh-uxoab.exe 3000 ouscoobooh-uxoab.exe 3000 ouscoobooh-uxoab.exe 3000 ouscoobooh-uxoab.exe 3000 ouscoobooh-uxoab.exe 3000 ouscoobooh-uxoab.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3008 f9a50697567b96497b63231028e50ed0_NeikiAnalytics.exe Token: SeDebugPrivilege 3000 ouscoobooh-uxoab.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3008 wrote to memory of 3000 3008 f9a50697567b96497b63231028e50ed0_NeikiAnalytics.exe 82 PID 3008 wrote to memory of 3000 3008 f9a50697567b96497b63231028e50ed0_NeikiAnalytics.exe 82 PID 3008 wrote to memory of 3000 3008 f9a50697567b96497b63231028e50ed0_NeikiAnalytics.exe 82 PID 3000 wrote to memory of 4260 3000 ouscoobooh-uxoab.exe 83 PID 3000 wrote to memory of 4260 3000 ouscoobooh-uxoab.exe 83 PID 3000 wrote to memory of 4260 3000 ouscoobooh-uxoab.exe 83 PID 3000 wrote to memory of 612 3000 ouscoobooh-uxoab.exe 5 PID 3000 wrote to memory of 3432 3000 ouscoobooh-uxoab.exe 56 PID 3000 wrote to memory of 3432 3000 ouscoobooh-uxoab.exe 56 PID 3000 wrote to memory of 3432 3000 ouscoobooh-uxoab.exe 56 PID 3000 wrote to memory of 3432 3000 ouscoobooh-uxoab.exe 56 PID 3000 wrote to memory of 3432 3000 ouscoobooh-uxoab.exe 56 PID 3000 wrote to memory of 3432 3000 ouscoobooh-uxoab.exe 56 PID 3000 wrote to memory of 3432 3000 ouscoobooh-uxoab.exe 56 PID 3000 wrote to memory of 3432 3000 ouscoobooh-uxoab.exe 56 PID 3000 wrote to memory of 3432 3000 ouscoobooh-uxoab.exe 56 PID 3000 wrote to memory of 3432 3000 ouscoobooh-uxoab.exe 56 PID 3000 wrote to memory of 3432 3000 ouscoobooh-uxoab.exe 56 PID 3000 wrote to memory of 3432 3000 ouscoobooh-uxoab.exe 56 PID 3000 wrote to memory of 3432 3000 ouscoobooh-uxoab.exe 56 PID 3000 wrote to memory of 3432 3000 ouscoobooh-uxoab.exe 56 PID 3000 wrote to memory of 3432 3000 ouscoobooh-uxoab.exe 56 PID 3000 wrote to memory of 3432 3000 ouscoobooh-uxoab.exe 56 PID 3000 wrote to memory of 3432 3000 ouscoobooh-uxoab.exe 56 PID 3000 wrote to memory of 3432 3000 ouscoobooh-uxoab.exe 56 PID 3000 wrote to memory of 3432 3000 ouscoobooh-uxoab.exe 56 PID 3000 wrote to memory of 3432 3000 ouscoobooh-uxoab.exe 56 PID 3000 wrote to memory of 3432 3000 ouscoobooh-uxoab.exe 56 PID 3000 wrote to memory of 3432 3000 ouscoobooh-uxoab.exe 56 PID 3000 wrote to memory of 3432 3000 ouscoobooh-uxoab.exe 56 PID 3000 wrote to memory of 3432 3000 ouscoobooh-uxoab.exe 56 PID 3000 wrote to memory of 3432 3000 ouscoobooh-uxoab.exe 56 PID 3000 wrote to memory of 3432 3000 ouscoobooh-uxoab.exe 56 PID 3000 wrote to memory of 3432 3000 ouscoobooh-uxoab.exe 56 PID 3000 wrote to memory of 3432 3000 ouscoobooh-uxoab.exe 56 PID 3000 wrote to memory of 3432 3000 ouscoobooh-uxoab.exe 56 PID 3000 wrote to memory of 3432 3000 ouscoobooh-uxoab.exe 56 PID 3000 wrote to memory of 3432 3000 ouscoobooh-uxoab.exe 56 PID 3000 wrote to memory of 3432 3000 ouscoobooh-uxoab.exe 56 PID 3000 wrote to memory of 3432 3000 ouscoobooh-uxoab.exe 56 PID 3000 wrote to memory of 3432 3000 ouscoobooh-uxoab.exe 56 PID 3000 wrote to memory of 3432 3000 ouscoobooh-uxoab.exe 56 PID 3000 wrote to memory of 3432 3000 ouscoobooh-uxoab.exe 56 PID 3000 wrote to memory of 3432 3000 ouscoobooh-uxoab.exe 56 PID 3000 wrote to memory of 3432 3000 ouscoobooh-uxoab.exe 56 PID 3000 wrote to memory of 3432 3000 ouscoobooh-uxoab.exe 56 PID 3000 wrote to memory of 3432 3000 ouscoobooh-uxoab.exe 56 PID 3000 wrote to memory of 3432 3000 ouscoobooh-uxoab.exe 56 PID 3000 wrote to memory of 3432 3000 ouscoobooh-uxoab.exe 56 PID 3000 wrote to memory of 3432 3000 ouscoobooh-uxoab.exe 56 PID 3000 wrote to memory of 3432 3000 ouscoobooh-uxoab.exe 56 PID 3000 wrote to memory of 3432 3000 ouscoobooh-uxoab.exe 56 PID 3000 wrote to memory of 3432 3000 ouscoobooh-uxoab.exe 56 PID 3000 wrote to memory of 3432 3000 ouscoobooh-uxoab.exe 56 PID 3000 wrote to memory of 3432 3000 ouscoobooh-uxoab.exe 56 PID 3000 wrote to memory of 3432 3000 ouscoobooh-uxoab.exe 56 PID 3000 wrote to memory of 3432 3000 ouscoobooh-uxoab.exe 56 PID 3000 wrote to memory of 3432 3000 ouscoobooh-uxoab.exe 56 PID 3000 wrote to memory of 3432 3000 ouscoobooh-uxoab.exe 56 PID 3000 wrote to memory of 3432 3000 ouscoobooh-uxoab.exe 56 PID 3000 wrote to memory of 3432 3000 ouscoobooh-uxoab.exe 56 PID 3000 wrote to memory of 3432 3000 ouscoobooh-uxoab.exe 56 PID 3000 wrote to memory of 3432 3000 ouscoobooh-uxoab.exe 56 PID 3000 wrote to memory of 3432 3000 ouscoobooh-uxoab.exe 56
Processes
-
C:\Windows\system32\winlogon.exewinlogon.exe1⤵PID:612
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3432
-
C:\Users\Admin\AppData\Local\Temp\f9a50697567b96497b63231028e50ed0_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\f9a50697567b96497b63231028e50ed0_NeikiAnalytics.exe"2⤵
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3008 -
C:\Windows\SysWOW64\ouscoobooh-uxoab.exe"C:\Windows\system32\ouscoobooh-uxoab.exe"3⤵
- Windows security bypass
- Modifies Installed Components in the registry
- Sets file execution options in registry
- Executes dropped EXE
- Windows security modification
- Modifies WinLogon
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3000 -
C:\Windows\SysWOW64\ouscoobooh-uxoab.exe--k33p4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:4260
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
72KB
MD5312d56dc034624c9a8c17e6e6989f580
SHA112d1962b7b95864f5660c4ba15b587b80bcb18fb
SHA2568ebdbedfd703fef42fc73be4788ebd32c7279971cfa6768fb809165b97dae1cf
SHA512dd88db81cdd2a3cbab0171852dbd4a9ba52e1e54718e6c70327c0d00684148ab16f98829e9ef97e1d909eedf4865acc91a898585cf96452808582c272df51170
-
Filesize
5KB
MD5f37b21c00fd81bd93c89ce741a88f183
SHA1b2796500597c68e2f5638e1101b46eaf32676c1c
SHA25676cf016fd77cb5a06c6ed4674ddc2345e8390c010cf344491a6e742baf2c0fb0
SHA512252fe66dea9a4b9aebc5fd2f24434719cb25159ba51549d9de407f44b6a2f7bce6e071be02c4f2ad6aef588c77f12c00ed415eb54f96dec1b077326e101ce0f4
-
Filesize
70KB
MD5f9a50697567b96497b63231028e50ed0
SHA1574eccdfd9450aaa0cdbdbd59aa24a8721d226f0
SHA256d84a1711469603ee1eb7a16f84decbfe5d7005f24bc0ecab93c38ac3b1ab1a76
SHA512e4d013524c671bc4face36311c625585d01f70c4a8abdc259756adf1744c898c72dcad80975def1f33d2b77b70238cddb5f658d7ca355a3b177eac910372b94d
-
Filesize
73KB
MD5ecb0a43fae593becdf7502f3c701ee2a
SHA14a5a4954d563bafd77881b007048bd2cd4e05940
SHA256d6cb3f49fd6bb27f7da9ddcb43821caf4783ddaf3b1e4ddda7d2c70ed9e59205
SHA5126ce77d0e87b4dba6e64cdc6cebbc83d5f15b99e08c894aa271ddef5efb844671a488ba4a181b196e8a9a2d904c889bbacb857d674735148314b4421f44c89b38