Analysis
-
max time kernel
152s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
09/05/2024, 19:58
Static task
static1
Behavioral task
behavioral1
Sample
e363ac06ac2209a7c27186ad2351e3a0_NeikiAnalytics.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
e363ac06ac2209a7c27186ad2351e3a0_NeikiAnalytics.exe
Resource
win10v2004-20240226-en
General
-
Target
e363ac06ac2209a7c27186ad2351e3a0_NeikiAnalytics.exe
-
Size
58KB
-
MD5
e363ac06ac2209a7c27186ad2351e3a0
-
SHA1
d96cbe2ad7edcf586387d8e296ade9d8dd213a6d
-
SHA256
e30d634c17a4094ba5013f88c892dcb079df4a037d20caf47296515ac9680b5e
-
SHA512
3bcd06e3a995d767098185f4772c2adb673f2e331b680d3f4b88caf2b1fe42350b7e817392c2a0cd82c90e9b2232b295ece7b86bc71903411c1ea23fb9a8c6a7
-
SSDEEP
768:9qSqC8+N5ozQQ8ncwxWmNXMX3cX8wtgtzpAXpX8/X/7CUrfbtSqklP3:9rqfzQQ8amN8835mv7CUroqklP3
Malware Config
Extracted
Protocol: ftp- Host:
ftp.tripod.com - Port:
21 - Username:
onthelinux - Password:
741852abc
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation e363ac06ac2209a7c27186ad2351e3a0_NeikiAnalytics.exe -
Executes dropped EXE 1 IoCs
pid Process 2128 jusched.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\5f9eacf7\jusched.exe e363ac06ac2209a7c27186ad2351e3a0_NeikiAnalytics.exe File created C:\Program Files (x86)\5f9eacf7\5f9eacf7 e363ac06ac2209a7c27186ad2351e3a0_NeikiAnalytics.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2128 jusched.exe 2128 jusched.exe 2128 jusched.exe 2128 jusched.exe 2128 jusched.exe 2128 jusched.exe 2128 jusched.exe 2128 jusched.exe 2128 jusched.exe 2128 jusched.exe 2128 jusched.exe 2128 jusched.exe 2128 jusched.exe 2128 jusched.exe 2128 jusched.exe 2128 jusched.exe 2128 jusched.exe 2128 jusched.exe 2128 jusched.exe 2128 jusched.exe 2128 jusched.exe 2128 jusched.exe 2128 jusched.exe 2128 jusched.exe 2128 jusched.exe 2128 jusched.exe 2128 jusched.exe 2128 jusched.exe 2128 jusched.exe 2128 jusched.exe 2128 jusched.exe 2128 jusched.exe 2128 jusched.exe 2128 jusched.exe 2128 jusched.exe 2128 jusched.exe 2128 jusched.exe 2128 jusched.exe 2128 jusched.exe 2128 jusched.exe 2128 jusched.exe 2128 jusched.exe 2128 jusched.exe 2128 jusched.exe 2128 jusched.exe 2128 jusched.exe 2128 jusched.exe 2128 jusched.exe 2128 jusched.exe 2128 jusched.exe 2128 jusched.exe 2128 jusched.exe 2128 jusched.exe 2128 jusched.exe 2128 jusched.exe 2128 jusched.exe 2128 jusched.exe 2128 jusched.exe 2128 jusched.exe 2128 jusched.exe 2128 jusched.exe 2128 jusched.exe 2128 jusched.exe 2128 jusched.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3252 wrote to memory of 2128 3252 e363ac06ac2209a7c27186ad2351e3a0_NeikiAnalytics.exe 91 PID 3252 wrote to memory of 2128 3252 e363ac06ac2209a7c27186ad2351e3a0_NeikiAnalytics.exe 91 PID 3252 wrote to memory of 2128 3252 e363ac06ac2209a7c27186ad2351e3a0_NeikiAnalytics.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\e363ac06ac2209a7c27186ad2351e3a0_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\e363ac06ac2209a7c27186ad2351e3a0_NeikiAnalytics.exe"1⤵
- Checks computer location settings
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:3252 -
C:\Program Files (x86)\5f9eacf7\jusched.exe"C:\Program Files (x86)\5f9eacf7\jusched.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2128
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3600 --field-trial-handle=2180,i,12780723798465539942,12010519452607841069,262144 --variations-seed-version /prefetch:81⤵PID:3992
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
13B
MD5f253efe302d32ab264a76e0ce65be769
SHA1768685ca582abd0af2fbb57ca37752aa98c9372b
SHA25649dca65f362fee401292ed7ada96f96295eab1e589c52e4e66bf4aedda715fdd
SHA5121990d20b462406bbadb22ba43f1ed9d0db6b250881d4ac89ad8cf6e43ca92b2fd31c3a15be1e6e149e42fdb46e58122c15bc7869a82c9490656c80df69fa77c4
-
Filesize
58KB
MD589a8f8e4453f2780c557b5df270ae76d
SHA1f5c161022e3de17cfb164ef9d667b9093de54068
SHA256e207397e2f3ab8800bbafba6c856f7c8f1f4d59282c2ff4d053242e3addbcf68
SHA512675f8f5cdf6ff7b69b134f4c94a34a276e49915a7103d16437787c725ce316dc181afd59f3e8e8e04c94ee8ea59604c6ce167386d543c9afffb2b021b9020bdc