Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
10/05/2024, 21:26
Static task
static1
Behavioral task
behavioral1
Sample
0a3ce422c8bc5dae872ee5deedc8f350_NeikiAnalytics.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
0a3ce422c8bc5dae872ee5deedc8f350_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
0a3ce422c8bc5dae872ee5deedc8f350_NeikiAnalytics.exe
-
Size
80KB
-
MD5
0a3ce422c8bc5dae872ee5deedc8f350
-
SHA1
4a88969a3e0bfb7a8155be12338c4e5b60cbcf21
-
SHA256
8a2e396d64bc2366854b607af69706b5d89f05d0af7d33620becda9fc9a24cc7
-
SHA512
b8ee09e7f5c78426c5852116209c191db9e1f1c430e4a6bcb33dbcb8c6ddb992b5e454aae8317b2c0265166617d3618d219714ee74ec1062322c23fd8cc727e2
-
SSDEEP
1536:21Sbpfv5DOWknf7LAQkhB5EQr5+WkukyZVYdDt5:BbpfhDOW7hBhrIqJg5
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation COM7.EXE -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\PDF Reader Launcher.exe COM7.EXE -
Executes dropped EXE 4 IoCs
pid Process 2644 ashcv.exe 3440 COM7.EXE 3968 ashcv.exe 4568 COM7.EXE -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\COM_LOADER = "\\\\.\\F:\\Program Files\\PDF_Reader\\bin\\COM7.EXE" reg.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry key 1 TTPs 1 IoCs
pid Process 3652 reg.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4836 0a3ce422c8bc5dae872ee5deedc8f350_NeikiAnalytics.exe 4836 0a3ce422c8bc5dae872ee5deedc8f350_NeikiAnalytics.exe 2644 ashcv.exe 2644 ashcv.exe 3440 COM7.EXE 3440 COM7.EXE 4836 0a3ce422c8bc5dae872ee5deedc8f350_NeikiAnalytics.exe 4836 0a3ce422c8bc5dae872ee5deedc8f350_NeikiAnalytics.exe 4836 0a3ce422c8bc5dae872ee5deedc8f350_NeikiAnalytics.exe 4836 0a3ce422c8bc5dae872ee5deedc8f350_NeikiAnalytics.exe 4836 0a3ce422c8bc5dae872ee5deedc8f350_NeikiAnalytics.exe 4836 0a3ce422c8bc5dae872ee5deedc8f350_NeikiAnalytics.exe 3968 ashcv.exe 3968 ashcv.exe 4568 COM7.EXE 4568 COM7.EXE 4836 0a3ce422c8bc5dae872ee5deedc8f350_NeikiAnalytics.exe 4836 0a3ce422c8bc5dae872ee5deedc8f350_NeikiAnalytics.exe 3440 COM7.EXE 3440 COM7.EXE 4836 0a3ce422c8bc5dae872ee5deedc8f350_NeikiAnalytics.exe 4836 0a3ce422c8bc5dae872ee5deedc8f350_NeikiAnalytics.exe 3440 COM7.EXE 3440 COM7.EXE 4836 0a3ce422c8bc5dae872ee5deedc8f350_NeikiAnalytics.exe 4836 0a3ce422c8bc5dae872ee5deedc8f350_NeikiAnalytics.exe 3440 COM7.EXE 3440 COM7.EXE 4836 0a3ce422c8bc5dae872ee5deedc8f350_NeikiAnalytics.exe 4836 0a3ce422c8bc5dae872ee5deedc8f350_NeikiAnalytics.exe 3440 COM7.EXE 3440 COM7.EXE 4836 0a3ce422c8bc5dae872ee5deedc8f350_NeikiAnalytics.exe 4836 0a3ce422c8bc5dae872ee5deedc8f350_NeikiAnalytics.exe 3440 COM7.EXE 3440 COM7.EXE 4836 0a3ce422c8bc5dae872ee5deedc8f350_NeikiAnalytics.exe 4836 0a3ce422c8bc5dae872ee5deedc8f350_NeikiAnalytics.exe 3440 COM7.EXE 3440 COM7.EXE 4836 0a3ce422c8bc5dae872ee5deedc8f350_NeikiAnalytics.exe 4836 0a3ce422c8bc5dae872ee5deedc8f350_NeikiAnalytics.exe 3440 COM7.EXE 3440 COM7.EXE 4836 0a3ce422c8bc5dae872ee5deedc8f350_NeikiAnalytics.exe 4836 0a3ce422c8bc5dae872ee5deedc8f350_NeikiAnalytics.exe 3440 COM7.EXE 3440 COM7.EXE 4836 0a3ce422c8bc5dae872ee5deedc8f350_NeikiAnalytics.exe 4836 0a3ce422c8bc5dae872ee5deedc8f350_NeikiAnalytics.exe 3440 COM7.EXE 3440 COM7.EXE 4836 0a3ce422c8bc5dae872ee5deedc8f350_NeikiAnalytics.exe 4836 0a3ce422c8bc5dae872ee5deedc8f350_NeikiAnalytics.exe 3440 COM7.EXE 3440 COM7.EXE 4836 0a3ce422c8bc5dae872ee5deedc8f350_NeikiAnalytics.exe 4836 0a3ce422c8bc5dae872ee5deedc8f350_NeikiAnalytics.exe 3440 COM7.EXE 3440 COM7.EXE 4836 0a3ce422c8bc5dae872ee5deedc8f350_NeikiAnalytics.exe 4836 0a3ce422c8bc5dae872ee5deedc8f350_NeikiAnalytics.exe 3440 COM7.EXE 3440 COM7.EXE -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2644 ashcv.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 4836 wrote to memory of 2644 4836 0a3ce422c8bc5dae872ee5deedc8f350_NeikiAnalytics.exe 87 PID 4836 wrote to memory of 2644 4836 0a3ce422c8bc5dae872ee5deedc8f350_NeikiAnalytics.exe 87 PID 4836 wrote to memory of 2644 4836 0a3ce422c8bc5dae872ee5deedc8f350_NeikiAnalytics.exe 87 PID 4836 wrote to memory of 3440 4836 0a3ce422c8bc5dae872ee5deedc8f350_NeikiAnalytics.exe 88 PID 4836 wrote to memory of 3440 4836 0a3ce422c8bc5dae872ee5deedc8f350_NeikiAnalytics.exe 88 PID 4836 wrote to memory of 3440 4836 0a3ce422c8bc5dae872ee5deedc8f350_NeikiAnalytics.exe 88 PID 3440 wrote to memory of 3652 3440 COM7.EXE 89 PID 3440 wrote to memory of 3652 3440 COM7.EXE 89 PID 3440 wrote to memory of 3652 3440 COM7.EXE 89 PID 3440 wrote to memory of 3968 3440 COM7.EXE 91 PID 3440 wrote to memory of 3968 3440 COM7.EXE 91 PID 3440 wrote to memory of 3968 3440 COM7.EXE 91 PID 2644 wrote to memory of 4568 2644 ashcv.exe 92 PID 2644 wrote to memory of 4568 2644 ashcv.exe 92 PID 2644 wrote to memory of 4568 2644 ashcv.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\0a3ce422c8bc5dae872ee5deedc8f350_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\0a3ce422c8bc5dae872ee5deedc8f350_NeikiAnalytics.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4836 -
C:\Users\Admin\AppData\Local\Temp\Rar$EX7.sr77\ashcv.exe\\.\C:\Users\Admin\AppData\Local\Temp\Rar$EX7.sr77\ashcv.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2644 -
C:\Users\Admin\AppData\Local\Temp\Rar$EX7.sr77\COM7.EXE\\.\C:\Users\Admin\AppData\Local\Temp\Rar$EX7.sr77\COM7.EXE3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:4568
-
-
-
C:\Users\Admin\AppData\Local\Temp\Rar$EX7.sr77\COM7.EXE\\.\C:\Users\Admin\AppData\Local\Temp\Rar$EX7.sr77\COM7.EXE2⤵
- Checks computer location settings
- Drops startup file
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3440 -
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /f /t REG_SZ /v COM_LOADER /d "\\.\F:\Program Files\PDF_Reader\bin\COM7.EXE"3⤵
- Adds Run key to start application
- Modifies registry key
PID:3652
-
-
C:\Users\Admin\AppData\Local\Temp\Rar$EX7.sr77\ashcv.exe\\.\C:\Users\Admin\AppData\Local\Temp\Rar$EX7.sr77\ashcv.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:3968
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
80KB
MD53399299f3fb2fac0af6c8c9be2e0ef66
SHA132abf59c50ea206d030ca876ab775d22827d2daf
SHA256262073ebbf3f2ea11848109707451a5c88337ffce40eb533dda112d5d96c7e5e
SHA51245e6ff477a0217f495a3efdb684b300a7abe7de81210b62acb013c99a7ef60682a9ffa179801b94552cc943b8b9c54d3a670944805fcee113a5626d81e407fd3
-
Filesize
80KB
MD5f984ee8ae0a6ee9771e92130be56a214
SHA1944b4f07db672b778bbf0507c1a200d956b3257c
SHA256201d04869ce2a6a1d296f18d9eaf0dc5df55bc547f5350aaff3edc8ba6340da5
SHA512d14d75ecfab67150877c5c584964a44763f81ae9238079175634f21a5b30665b5f0b3b1e41eeab79151021d67f40821129640f2d58c5174a226ef522159cd8f3