Analysis
-
max time kernel
100s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
10/05/2024, 01:58
Static task
static1
Behavioral task
behavioral1
Sample
44926bc527bd1db391395c650802ff60_NeikiAnalytics.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
44926bc527bd1db391395c650802ff60_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
44926bc527bd1db391395c650802ff60_NeikiAnalytics.exe
-
Size
416KB
-
MD5
44926bc527bd1db391395c650802ff60
-
SHA1
4b28d00e3ab94fb31bf92d0d3803ca451040f637
-
SHA256
6c1b2fb1881437f2c054584716954962d4c1369e1a75a698b0a1c671cdd10b6d
-
SHA512
81e9c1b4ddc2a56fa7c479c52f776c959924a52ba230930cff60169cc7b8cb1817089f7069bf78ca2ded83efe740e30796f9888af891874079aaabc39b38a0ab
-
SSDEEP
6144:BjAKmEGlZyjQmTB7v9MXzzjtBzmMG0CqCUCpeexq37IWV+5cSciVRGNSkN1HReAh:nVkojZTBv9AKM2p+UWwqpmmSkvHRdl
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation 44926bc527bd1db391395c650802ff60_NeikiAnalytics.exe -
Executes dropped EXE 1 IoCs
pid Process 3996 INSTALL.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 560 wrote to memory of 3996 560 44926bc527bd1db391395c650802ff60_NeikiAnalytics.exe 82 PID 560 wrote to memory of 3996 560 44926bc527bd1db391395c650802ff60_NeikiAnalytics.exe 82 PID 560 wrote to memory of 3996 560 44926bc527bd1db391395c650802ff60_NeikiAnalytics.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\44926bc527bd1db391395c650802ff60_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\44926bc527bd1db391395c650802ff60_NeikiAnalytics.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:560 -
C:\Users\Admin\AppData\Local\Temp\WD_3FF7.tmp\INSTALL.EXE"C:\Users\Admin\AppData\Local\Temp\WD_3FF7.tmp\INSTALL.EXE"2⤵
- Executes dropped EXE
PID:3996
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
448KB
MD5689938ddc1b696f274155eb3e17ce660
SHA19a2050712ea6f39b3828c3db9cdd6016cac6bc86
SHA25602875df0cd65de335056f7aefebe2d9145f83b31f2e5fd54701cfe56cbe1fb8f
SHA51237d51ee3abf7ffd1fe1268f5cdb400b46b8b1cd8e678737a5150c0476882c92b4f4552644d6e9a3239c3de356de18104d3eaeb6bd555c990243ab5ca1f1a1e2e
-
Filesize
342B
MD5b65780b3da4aa549f4c0c763f07f9592
SHA1e83a9a001d288d7dfff9fd3cc2ad557fc1ddb005
SHA2563531e85f5580be21981702b079bfbf73a14bab89a4003ad271e8a981c75d7a38
SHA5128df1fb8ddff1802e622af7a9a2042cab45bab9adc905ef145c509e0209c71157ee2ef00f663518ae2d029ed5e13d5e1fcd933d7c6adcb5b2b78f5508628280e5