Analysis
-
max time kernel
149s -
max time network
134s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
09/05/2024, 19:06
Static task
static1
Behavioral task
behavioral1
Sample
ceebec2b90dfd315fce88ceb46d4fe30_NeikiAnalytics.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
ceebec2b90dfd315fce88ceb46d4fe30_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
ceebec2b90dfd315fce88ceb46d4fe30_NeikiAnalytics.exe
-
Size
24KB
-
MD5
ceebec2b90dfd315fce88ceb46d4fe30
-
SHA1
98ec0c7e5b660ca459830d0e3fc1edd92f1dc8d5
-
SHA256
a84d7b952f9f5fec097ae727b9867b7c2796d021dfd2e4a06ecc3b89c792851d
-
SHA512
e8dc08dc9507b702858bafebdc26bed047030be1a3c62b12cf23820c03ca28fe60c3e526dd60ec0e7f2ea6cdcd7e8bcbf169ebb36800d9bbf2e6c79897e27f59
-
SSDEEP
384:TPHWv6AMlEDPOEo6YpOELjggggggLvggggggggUaocCU+IF:TmvHfYggggggLvggggggggUaocN+IF
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation ceebec2b90dfd315fce88ceb46d4fe30_NeikiAnalytics.exe -
Executes dropped EXE 1 IoCs
pid Process 1956 btkba.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2824 wrote to memory of 1956 2824 ceebec2b90dfd315fce88ceb46d4fe30_NeikiAnalytics.exe 89 PID 2824 wrote to memory of 1956 2824 ceebec2b90dfd315fce88ceb46d4fe30_NeikiAnalytics.exe 89 PID 2824 wrote to memory of 1956 2824 ceebec2b90dfd315fce88ceb46d4fe30_NeikiAnalytics.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\ceebec2b90dfd315fce88ceb46d4fe30_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\ceebec2b90dfd315fce88ceb46d4fe30_NeikiAnalytics.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2824 -
C:\Users\Admin\AppData\Local\Temp\btkba.exe"C:\Users\Admin\AppData\Local\Temp\btkba.exe"2⤵
- Executes dropped EXE
PID:1956
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --field-trial-handle=4152,i,6166776566165096562,4582328833313060853,262144 --variations-seed-version --mojo-platform-channel-handle=3464 /prefetch:81⤵PID:2324
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
24KB
MD5f81ea200dd4a27cb109ffd48a75fd38f
SHA1c585c5e626ff4a5ac7ee9eda36b2a727dbe6b195
SHA256ae1aaff8b09d104478671967c50d574052c2bb0c296ed40b8e2b949a441c26fe
SHA512b801267deb28a1b2a157a8bb9ce38fa82aabae1489f6913c347b0660fc1b8671fa5fe711656617d958ee31440f9e16ac3e557de69a9476764702f59d5c55a39c