Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    31/05/2024, 02:18

General

  • Target

    731e4f57d9398ac88418d44074fc3ba0_NeikiAnalytics.exe

  • Size

    71KB

  • MD5

    731e4f57d9398ac88418d44074fc3ba0

  • SHA1

    25b51e3c21dce79c7043d1698834e934965f33ab

  • SHA256

    a900f7b3fabd4d1ee470dc1137bf8ae77b0e4a0ceb3351bad61db58a8fee5ac2

  • SHA512

    2ac0fd59e2b1455def5f27ec1672bef6110d5b094e89cf575601a5bc43c3711bd1ef7f07838468e051487f1b531fee3184944014a98fd14c0680f1eef146a72e

  • SSDEEP

    1536:1teqKDlXvCDB04f5Gn/L8FlADNt3d1Hw8slx9:Olg35GTslA5t3/w88

Malware Config

Signatures

  • Windows security bypass 2 TTPs 4 IoCs
  • Modifies Installed Components in the registry 2 TTPs 4 IoCs
  • Sets file execution options in registry 2 TTPs 3 IoCs
  • Executes dropped EXE 2 IoCs
  • Windows security modification 2 TTPs 4 IoCs
  • Modifies WinLogon 2 TTPs 5 IoCs
  • Drops file in System32 directory 9 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\system32\winlogon.exe
    winlogon.exe
    1⤵
      PID:612
    • C:\Windows\Explorer.EXE
      C:\Windows\Explorer.EXE
      1⤵
        PID:3516
        • C:\Users\Admin\AppData\Local\Temp\731e4f57d9398ac88418d44074fc3ba0_NeikiAnalytics.exe
          "C:\Users\Admin\AppData\Local\Temp\731e4f57d9398ac88418d44074fc3ba0_NeikiAnalytics.exe"
          2⤵
          • Drops file in System32 directory
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:2492
          • C:\Windows\SysWOW64\uhnodoar.exe
            "C:\Windows\system32\uhnodoar.exe"
            3⤵
            • Windows security bypass
            • Modifies Installed Components in the registry
            • Sets file execution options in registry
            • Executes dropped EXE
            • Windows security modification
            • Modifies WinLogon
            • Drops file in System32 directory
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:4308
            • C:\Windows\SysWOW64\uhnodoar.exe
              --k33p
              4⤵
              • Executes dropped EXE
              • Suspicious behavior: EnumeratesProcesses
              PID:4656

      Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Windows\SysWOW64\atdukar.exe

              Filesize

              74KB

              MD5

              6b8519c7df3321435ddb31308e785977

              SHA1

              92966049fa07d8bbad06aa2580ebe1e450322ef1

              SHA256

              f5ca1f8bff9f07e0d977048ed62be5fbb6d2eca04580e2ce5bb90d23b70000a2

              SHA512

              85be161fa32288f7e93f9d5325b61f9f25ec9c077126032d285197ddd98a79e1cc1d24f4199125364b8d58c0086275080e3332b6635cbb735af19188b6547f52

            • C:\Windows\SysWOW64\ouhmamoah.dll

              Filesize

              5KB

              MD5

              f37b21c00fd81bd93c89ce741a88f183

              SHA1

              b2796500597c68e2f5638e1101b46eaf32676c1c

              SHA256

              76cf016fd77cb5a06c6ed4674ddc2345e8390c010cf344491a6e742baf2c0fb0

              SHA512

              252fe66dea9a4b9aebc5fd2f24434719cb25159ba51549d9de407f44b6a2f7bce6e071be02c4f2ad6aef588c77f12c00ed415eb54f96dec1b077326e101ce0f4

            • C:\Windows\SysWOW64\uhnodoar.exe

              Filesize

              71KB

              MD5

              731e4f57d9398ac88418d44074fc3ba0

              SHA1

              25b51e3c21dce79c7043d1698834e934965f33ab

              SHA256

              a900f7b3fabd4d1ee470dc1137bf8ae77b0e4a0ceb3351bad61db58a8fee5ac2

              SHA512

              2ac0fd59e2b1455def5f27ec1672bef6110d5b094e89cf575601a5bc43c3711bd1ef7f07838468e051487f1b531fee3184944014a98fd14c0680f1eef146a72e

            • C:\Windows\SysWOW64\umdeavib.exe

              Filesize

              75KB

              MD5

              7d4f2b6bf9828a264de6516a1f918658

              SHA1

              55da010208956971136b7aef0aa5c1c520ae83be

              SHA256

              d7e5ade7c1ee840b8644dd6a71f8826c50acecd96533ee2298e5dd0b3fd44a76

              SHA512

              f75ad5bbd8fc3175e9d4b7fa023094cf64c245a8919ba2b85f476b94196ce004f03aed4233b8b422d5f1310d03ca5c467da17e45e1a43b85097199967753eae6

            • memory/2492-5-0x0000000000400000-0x0000000000414000-memory.dmp

              Filesize

              80KB

            • memory/4308-49-0x0000000000400000-0x0000000000414000-memory.dmp

              Filesize

              80KB

            • memory/4656-50-0x0000000000400000-0x0000000000414000-memory.dmp

              Filesize

              80KB