Analysis

  • max time kernel
    149s
  • max time network
    107s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09/05/2024, 14:37

General

  • Target

    60fd599e3d2c3b87195b839f8a25d810_NeikiAnalytics.exe

  • Size

    248KB

  • MD5

    60fd599e3d2c3b87195b839f8a25d810

  • SHA1

    4fe8f3dd8f36954aeccd82ccfc7540c594f13313

  • SHA256

    f8ee6cb18fa76f204738d6a427ba1d5eb1d7f7516c03cdd7c763cd017350b79f

  • SHA512

    9f13d2f60dbbbc46f0fd1ef93e7f66f476e30540ac23f38ce8c214adb2736e7e3cd7d8379bb62d32e36a510a827eb6d6ee37ca18e2b462723bd5f4790ef26fc2

  • SSDEEP

    1536:Kwgu3c9YtkmU9blk81NM6MoAUK1bWYxYZ8Q6iwkSQ7A/XZKl/YWAISDKowoz/GHj:Xgu3k+Uhlk83AzxYkijDcdeDf

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 50 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\60fd599e3d2c3b87195b839f8a25d810_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\60fd599e3d2c3b87195b839f8a25d810_NeikiAnalytics.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2992
    • C:\Users\Admin\neuhuur.exe
      "C:\Users\Admin\neuhuur.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:308

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\neuhuur.exe

          Filesize

          248KB

          MD5

          1cad7a357b19419c809843904197569e

          SHA1

          e9d386537af89b0f1d121fb4169be1a1fd7ae3ef

          SHA256

          83387e281dde9d714b73485feb5bf0566b14476a36f5ea372cc2fc56660f6b12

          SHA512

          7bdb0b087e4e02def1f63c7a909cb4172acddfe16a5b8e24a2c8ea4d166d2f32df8f9d443fa6a8ff618a833f9b072277595069951813f371c3e51fad3f5b3de1

        • memory/308-33-0x0000000000400000-0x000000000045A000-memory.dmp

          Filesize

          360KB

        • memory/2992-0-0x0000000000400000-0x000000000045A000-memory.dmp

          Filesize

          360KB