Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09/05/2024, 21:52

General

  • Target

    07bb684d2561f42227ff680daa0efb10_NeikiAnalytics.exe

  • Size

    33KB

  • MD5

    07bb684d2561f42227ff680daa0efb10

  • SHA1

    2ee2aa1eff1308f4d4cd51bcf7725b4d1e791a4f

  • SHA256

    f819458675200704ff9590737da7ff1aff912565a817e57ed4c8fe05f0b01284

  • SHA512

    bf0378897c7ff3962849ccf76c807f853a9d2889b3020afc8a05bb4a0e3a2e1330d1142ba2284258ffacc20bf190e5fdc48bef06a92e40d91c47cca7cb242c49

  • SSDEEP

    192:eRZS9rSaod2YhFk1pwnDh2yM7PJgrzjR3OmaR/XHLFaMxbZ8S6Ad2uV2jNP+sdhK:wScaozzwEDkyM7R0zVUzwMdSSRAXzI8Y

Score
7/10
upx

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\07bb684d2561f42227ff680daa0efb10_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\07bb684d2561f42227ff680daa0efb10_NeikiAnalytics.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:2804
    • C:\Users\Admin\AppData\Local\Temp\hromi.exe
      "C:\Users\Admin\AppData\Local\Temp\hromi.exe"
      2⤵
      • Executes dropped EXE
      PID:1064

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\hromi.exe

    Filesize

    33KB

    MD5

    99ed43c87dc5a2ff324b3499f45b6344

    SHA1

    527651c79ae7a4d72aed092e127390e2d2369ada

    SHA256

    33748c56ed5a5b5d12ea3b1a8693126c57998e5ebeb464ab6614060e5c0067dc

    SHA512

    0a904158348250f171ce6f50d6445997a76f710a8354655c172e203c4f3692f27262f510290d5e70b8cc81a1f5488c0b1ba67322d883e61c801ac5463f44af45

  • memory/2804-0-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2804-9-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB