Analysis

  • max time kernel
    100s
  • max time network
    96s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10/05/2024, 01:58

General

  • Target

    44926bc527bd1db391395c650802ff60_NeikiAnalytics.exe

  • Size

    416KB

  • MD5

    44926bc527bd1db391395c650802ff60

  • SHA1

    4b28d00e3ab94fb31bf92d0d3803ca451040f637

  • SHA256

    6c1b2fb1881437f2c054584716954962d4c1369e1a75a698b0a1c671cdd10b6d

  • SHA512

    81e9c1b4ddc2a56fa7c479c52f776c959924a52ba230930cff60169cc7b8cb1817089f7069bf78ca2ded83efe740e30796f9888af891874079aaabc39b38a0ab

  • SSDEEP

    6144:BjAKmEGlZyjQmTB7v9MXzzjtBzmMG0CqCUCpeexq37IWV+5cSciVRGNSkN1HReAh:nVkojZTBv9AKM2p+UWwqpmmSkvHRdl

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\44926bc527bd1db391395c650802ff60_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\44926bc527bd1db391395c650802ff60_NeikiAnalytics.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:560
    • C:\Users\Admin\AppData\Local\Temp\WD_3FF7.tmp\INSTALL.EXE
      "C:\Users\Admin\AppData\Local\Temp\WD_3FF7.tmp\INSTALL.EXE"
      2⤵
      • Executes dropped EXE
      PID:3996

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\WD_3FF7.tmp\INSTALL.EXE

    Filesize

    448KB

    MD5

    689938ddc1b696f274155eb3e17ce660

    SHA1

    9a2050712ea6f39b3828c3db9cdd6016cac6bc86

    SHA256

    02875df0cd65de335056f7aefebe2d9145f83b31f2e5fd54701cfe56cbe1fb8f

    SHA512

    37d51ee3abf7ffd1fe1268f5cdb400b46b8b1cd8e678737a5150c0476882c92b4f4552644d6e9a3239c3de356de18104d3eaeb6bd555c990243ab5ca1f1a1e2e

  • C:\Users\Admin\AppData\Local\Temp\WD_3FF7.tmp\INSTALL.INI

    Filesize

    342B

    MD5

    b65780b3da4aa549f4c0c763f07f9592

    SHA1

    e83a9a001d288d7dfff9fd3cc2ad557fc1ddb005

    SHA256

    3531e85f5580be21981702b079bfbf73a14bab89a4003ad271e8a981c75d7a38

    SHA512

    8df1fb8ddff1802e622af7a9a2042cab45bab9adc905ef145c509e0209c71157ee2ef00f663518ae2d029ed5e13d5e1fcd933d7c6adcb5b2b78f5508628280e5