Analysis

  • max time kernel
    149s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09/05/2024, 15:43

General

  • Target

    78ff5d18ee442c74671bf3f88c7406c0_NeikiAnalytics.exe

  • Size

    2.0MB

  • MD5

    78ff5d18ee442c74671bf3f88c7406c0

  • SHA1

    d9e464cf6f889cc5d95b4376767c82223b05c72d

  • SHA256

    2fc4b7f994c168fbc8022c85d643c7367b98d45937e1df93dc85e19ebca54e3d

  • SHA512

    7b78c27f7296188119853e834b2da70fd9fe6af96e13d545c965aecd2e1c00c236e658f6a49d19635844608bb2e703083baedf172d13fe0dec67229341866091

  • SSDEEP

    49152:OFUcx88PWPOpX0SFxv7TuPQ5E5MyY9ryGc:O+K88uPCHHv2PQ5HpyGc

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of SetWindowsHookEx 10 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • Uses Volume Shadow Copy WMI provider

    The Volume Shadow Copy service is used to manage backups/snapshots.

  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\78ff5d18ee442c74671bf3f88c7406c0_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\78ff5d18ee442c74671bf3f88c7406c0_NeikiAnalytics.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3288
    • C:\Users\Admin\AppData\Local\Temp\4640.tmp
      "C:\Users\Admin\AppData\Local\Temp\4640.tmp" --splashC:\Users\Admin\AppData\Local\Temp\78ff5d18ee442c74671bf3f88c7406c0_NeikiAnalytics.exe 60E42230EDF4E31A6659776427FFB88102AC6F5311C5B5DC769829CEBE4C2E514FB01B4A5D72B092757C23957B24BDB1016D5910141153AAEC6A6833FDCCB7B8
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Modifies registry class
      • Suspicious behavior: RenamesItself
      • Suspicious use of WriteProcessMemory
      PID:1364
      • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
        "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\78ff5d18ee442c74671bf3f88c7406c0_NeikiAnalytics.docx" /o ""
        3⤵
        • Checks processor information in registry
        • Enumerates system info in registry
        • Suspicious behavior: AddClipboardFormatListener
        • Suspicious use of SetWindowsHookEx
        PID:3816

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\4640.tmp

    Filesize

    2.0MB

    MD5

    21692ea6ff75cf2993d936c5190b8988

    SHA1

    4ccfb6a027eb66f82a1e74a58ec6f4f8f381b3a2

    SHA256

    ac30cb25fc87f73250e9e5086eb289e3b2b2c634b62bdebe88650cfba06c5fd5

    SHA512

    7c98ea18c6aec18de53f6709d03c157716854afdf908312b8c7843ad4f416a5d6a1d3cf4a45a176b8bff5e5d27065d0276379c72944950b573ef64d56a35ee0b

  • C:\Users\Admin\AppData\Local\Temp\78ff5d18ee442c74671bf3f88c7406c0_NeikiAnalytics.docx

    Filesize

    19KB

    MD5

    4046ff080673cffac6529512b8d3bdbb

    SHA1

    d3cbc39065b7a55e995fa25397da2140bdac80c1

    SHA256

    f0c1b360c0b24b5450a79138650e6ee254afae6ce8f6c68da7d1f32f91582680

    SHA512

    453f70730b7560e3d3e23ddfa0fe74e014753f8b34b45254c1c0cf5fec0546a2b8b109a4f9d096e91711b6d02cb383a7136c2cb7bd6600d0598acf7c90c25418

  • memory/1364-5-0x0000000000400000-0x0000000000606000-memory.dmp

    Filesize

    2.0MB

  • memory/3288-0-0x0000000000400000-0x0000000000606000-memory.dmp

    Filesize

    2.0MB

  • memory/3816-11-0x00007FFE93B90000-0x00007FFE93BA0000-memory.dmp

    Filesize

    64KB

  • memory/3816-22-0x00007FFED3B10000-0x00007FFED3D05000-memory.dmp

    Filesize

    2.0MB

  • memory/3816-16-0x00007FFE93B90000-0x00007FFE93BA0000-memory.dmp

    Filesize

    64KB

  • memory/3816-18-0x00007FFE93B90000-0x00007FFE93BA0000-memory.dmp

    Filesize

    64KB

  • memory/3816-13-0x00007FFE93B90000-0x00007FFE93BA0000-memory.dmp

    Filesize

    64KB

  • memory/3816-12-0x00007FFE93B90000-0x00007FFE93BA0000-memory.dmp

    Filesize

    64KB

  • memory/3816-14-0x00007FFED3BAD000-0x00007FFED3BAE000-memory.dmp

    Filesize

    4KB

  • memory/3816-15-0x00007FFED3B10000-0x00007FFED3D05000-memory.dmp

    Filesize

    2.0MB

  • memory/3816-19-0x00007FFED3B10000-0x00007FFED3D05000-memory.dmp

    Filesize

    2.0MB

  • memory/3816-17-0x00007FFED3B10000-0x00007FFED3D05000-memory.dmp

    Filesize

    2.0MB

  • memory/3816-24-0x00007FFED3B10000-0x00007FFED3D05000-memory.dmp

    Filesize

    2.0MB

  • memory/3816-23-0x00007FFED3B10000-0x00007FFED3D05000-memory.dmp

    Filesize

    2.0MB

  • memory/3816-21-0x00007FFED3B10000-0x00007FFED3D05000-memory.dmp

    Filesize

    2.0MB

  • memory/3816-25-0x00007FFE91990000-0x00007FFE919A0000-memory.dmp

    Filesize

    64KB

  • memory/3816-20-0x00007FFED3B10000-0x00007FFED3D05000-memory.dmp

    Filesize

    2.0MB

  • memory/3816-26-0x00007FFE91990000-0x00007FFE919A0000-memory.dmp

    Filesize

    64KB

  • memory/3816-39-0x0000020F3BED0000-0x0000020F3BFC4000-memory.dmp

    Filesize

    976KB

  • memory/3816-44-0x00007FFED3B10000-0x00007FFED3D05000-memory.dmp

    Filesize

    2.0MB