Analysis
-
max time kernel
149s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
10-05-2024 02:30
Static task
static1
Behavioral task
behavioral1
Sample
4da73907c962940f5052ec1790137f60_NeikiAnalytics.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
4da73907c962940f5052ec1790137f60_NeikiAnalytics.exe
Resource
win10v2004-20240426-en
General
-
Target
4da73907c962940f5052ec1790137f60_NeikiAnalytics.exe
-
Size
8KB
-
MD5
4da73907c962940f5052ec1790137f60
-
SHA1
e25aae400b865b0db105da4d65ffaff493f183c8
-
SHA256
14f53d4a276298b3be21beca4ab1ec30055d469ac9542a5db55104b3f6fc6f39
-
SHA512
397a1f526654da3f198122f035b81e504b5638528d28358daefca74ef846de65a372e9abfcfeec36d2f3a1f88ae443bf3e149a6ac68d258d301b7445d6b65587
-
SSDEEP
192:Jai5AbBNkcnKfzr/JBsEQydOW2S3UOM+UQecZ:n5q3rKfzrxB3QydVYJBcZ
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\Control Panel\International\Geo\Nation 4da73907c962940f5052ec1790137f60_NeikiAnalytics.exe -
Executes dropped EXE 1 IoCs
pid Process 3500 vdigj.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3404 wrote to memory of 3500 3404 4da73907c962940f5052ec1790137f60_NeikiAnalytics.exe 85 PID 3404 wrote to memory of 3500 3404 4da73907c962940f5052ec1790137f60_NeikiAnalytics.exe 85 PID 3404 wrote to memory of 3500 3404 4da73907c962940f5052ec1790137f60_NeikiAnalytics.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\4da73907c962940f5052ec1790137f60_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\4da73907c962940f5052ec1790137f60_NeikiAnalytics.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3404 -
C:\Users\Admin\AppData\Local\Temp\vdigj.exe"C:\Users\Admin\AppData\Local\Temp\vdigj.exe"2⤵
- Executes dropped EXE
PID:3500
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
8KB
MD578a3fd41c438cc5bb8ac28112e70727b
SHA1d1fc304bdff8e9a657c396f7e707b9573ecc86c8
SHA256f47d9a703f9d0cde63f24e25c9217d9ade9b21f33b096ac85936e77eec07744b
SHA5121af7a33a51cb8cc90b39df126853b02b1de30181761ba9c20bbdaeccf54fd20edd8db5cb361d88b17719247427f063bdf7c90b694088c4e5b15c8e0f82c38c22