Analysis

  • max time kernel
    149s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27/05/2024, 04:42

General

  • Target

    1f7487bdebd83d45e1430c6b48b31250_NeikiAnalytics.exe

  • Size

    72KB

  • MD5

    1f7487bdebd83d45e1430c6b48b31250

  • SHA1

    b70e0271b69ea0a1647a6eea1c696f44d0a3d258

  • SHA256

    ab874beb65d3b8e73738b800c00c8095bc1cc85f08697f08390632c27500f3dd

  • SHA512

    c4393c5185e189221b8b23cecfa6e4f913d8a1f36a0f499c82dace29c95edbf9d972da936ce649915d0388a62458f1057d3fccce3d1de698fa7ad4e1ade7f57d

  • SSDEEP

    768:x/nEuhThEUAvMgvvd9WhTOng8X6m2AYS1rg1YJZLIgwRdPxCdYLndQxzGp5hhJy+:xs0evMm+tgg1XS181xbGgdjhh9ZoPbK

Malware Config

Signatures

  • Windows security bypass 2 TTPs 4 IoCs
  • Modifies Installed Components in the registry 2 TTPs 4 IoCs
  • Sets file execution options in registry 2 TTPs 3 IoCs
  • Executes dropped EXE 2 IoCs
  • Windows security modification 2 TTPs 4 IoCs
  • Modifies WinLogon 2 TTPs 5 IoCs
  • Drops file in System32 directory 9 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\system32\winlogon.exe
    winlogon.exe
    1⤵
      PID:612
    • C:\Windows\Explorer.EXE
      C:\Windows\Explorer.EXE
      1⤵
        PID:3436
        • C:\Users\Admin\AppData\Local\Temp\1f7487bdebd83d45e1430c6b48b31250_NeikiAnalytics.exe
          "C:\Users\Admin\AppData\Local\Temp\1f7487bdebd83d45e1430c6b48b31250_NeikiAnalytics.exe"
          2⤵
          • Drops file in System32 directory
          • Suspicious use of WriteProcessMemory
          PID:1496
          • C:\Windows\SysWOW64\outkumoov.exe
            "C:\Windows\SysWOW64\outkumoov.exe"
            3⤵
            • Windows security bypass
            • Modifies Installed Components in the registry
            • Sets file execution options in registry
            • Executes dropped EXE
            • Windows security modification
            • Modifies WinLogon
            • Drops file in System32 directory
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:5116
            • C:\Windows\SysWOW64\outkumoov.exe
              --k33p
              4⤵
              • Executes dropped EXE
              • Suspicious behavior: EnumeratesProcesses
              PID:4652

      Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Windows\SysWOW64\eadgooxot-icum.exe

              Filesize

              73KB

              MD5

              df4d89b8ab92ff29741d6b14b2baf211

              SHA1

              6c51eede3d2c11df375ed0eb1af7f5b0f448087d

              SHA256

              8f50504d07d289933d7043ca422f95d2b3d7f08b9396abbd8a1395934f1a00af

              SHA512

              cb223499eaadcc4657cef5b3faacb1dc2a9c893beb5543a9b05886c8ecd40000ba88d18402e1bdded35c92cdea4cb729259be4ee4dc9d6be780c254cea5bc271

            • C:\Windows\SysWOW64\inrooved.exe

              Filesize

              72KB

              MD5

              bbcac2edbfd207dbfb292b7aa32025d1

              SHA1

              23cbf4f18ed795a9bffce9dfa90b10c4f1ebd7b7

              SHA256

              100117cd72a1b188bc1e7334397d2d91b5f8d87388a24f157e800262d53595c7

              SHA512

              8e64e6f92b07398be0254f34c140f6935d5ff41d147699673d3ac5543db28cefb4796b11000e8c18b7ce30290766783516ebef84bbba4733709c14fa6b107d24

            • C:\Windows\SysWOW64\otlixog.dll

              Filesize

              5KB

              MD5

              f37b21c00fd81bd93c89ce741a88f183

              SHA1

              b2796500597c68e2f5638e1101b46eaf32676c1c

              SHA256

              76cf016fd77cb5a06c6ed4674ddc2345e8390c010cf344491a6e742baf2c0fb0

              SHA512

              252fe66dea9a4b9aebc5fd2f24434719cb25159ba51549d9de407f44b6a2f7bce6e071be02c4f2ad6aef588c77f12c00ed415eb54f96dec1b077326e101ce0f4

            • C:\Windows\SysWOW64\outkumoov.exe

              Filesize

              70KB

              MD5

              e3f06eadd61cb0a8dd94d4862c57524e

              SHA1

              9c90cefecf253d903084b088cc5f05e71c8b3c68

              SHA256

              5dca1946cd4deee3537037520772fe3fb482ffdea11f50283c1d0b67806aaf2e

              SHA512

              1860352518fb77922ca138655e3cfa0db8febf84a7b70de297e255f9a13f5fec46c83cb64c5f5c85403bf9674a7dc80430a1569fb005cece119996dd018c3fab

            • memory/1496-3-0x0000000000400000-0x0000000000403000-memory.dmp

              Filesize

              12KB

            • memory/4652-48-0x0000000000400000-0x0000000000414000-memory.dmp

              Filesize

              80KB

            • memory/5116-47-0x0000000000400000-0x0000000000414000-memory.dmp

              Filesize

              80KB