Analysis

  • max time kernel
    149s
  • max time network
    134s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09/05/2024, 19:06

General

  • Target

    ceebec2b90dfd315fce88ceb46d4fe30_NeikiAnalytics.exe

  • Size

    24KB

  • MD5

    ceebec2b90dfd315fce88ceb46d4fe30

  • SHA1

    98ec0c7e5b660ca459830d0e3fc1edd92f1dc8d5

  • SHA256

    a84d7b952f9f5fec097ae727b9867b7c2796d021dfd2e4a06ecc3b89c792851d

  • SHA512

    e8dc08dc9507b702858bafebdc26bed047030be1a3c62b12cf23820c03ca28fe60c3e526dd60ec0e7f2ea6cdcd7e8bcbf169ebb36800d9bbf2e6c79897e27f59

  • SSDEEP

    384:TPHWv6AMlEDPOEo6YpOELjggggggLvggggggggUaocCU+IF:TmvHfYggggggLvggggggggUaocN+IF

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ceebec2b90dfd315fce88ceb46d4fe30_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\ceebec2b90dfd315fce88ceb46d4fe30_NeikiAnalytics.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:2824
    • C:\Users\Admin\AppData\Local\Temp\btkba.exe
      "C:\Users\Admin\AppData\Local\Temp\btkba.exe"
      2⤵
      • Executes dropped EXE
      PID:1956
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --field-trial-handle=4152,i,6166776566165096562,4582328833313060853,262144 --variations-seed-version --mojo-platform-channel-handle=3464 /prefetch:8
    1⤵
      PID:2324

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\btkba.exe

            Filesize

            24KB

            MD5

            f81ea200dd4a27cb109ffd48a75fd38f

            SHA1

            c585c5e626ff4a5ac7ee9eda36b2a727dbe6b195

            SHA256

            ae1aaff8b09d104478671967c50d574052c2bb0c296ed40b8e2b949a441c26fe

            SHA512

            b801267deb28a1b2a157a8bb9ce38fa82aabae1489f6913c347b0660fc1b8671fa5fe711656617d958ee31440f9e16ac3e557de69a9476764702f59d5c55a39c

          • memory/1956-15-0x0000000000400000-0x000000000040B000-memory.dmp

            Filesize

            44KB

          • memory/1956-16-0x0000000000400000-0x000000000040B000-memory.dmp

            Filesize

            44KB

          • memory/2824-0-0x0000000000400000-0x000000000040B000-memory.dmp

            Filesize

            44KB

          • memory/2824-2-0x0000000000401000-0x0000000000402000-memory.dmp

            Filesize

            4KB

          • memory/2824-14-0x0000000000400000-0x000000000040B000-memory.dmp

            Filesize

            44KB