Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
10/05/2024, 04:20
Static task
static1
Behavioral task
behavioral1
Sample
6aeff1542255455df10706134bd81f80_NeikiAnalytics.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
6aeff1542255455df10706134bd81f80_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
6aeff1542255455df10706134bd81f80_NeikiAnalytics.exe
-
Size
41KB
-
MD5
6aeff1542255455df10706134bd81f80
-
SHA1
7db3c396557f76be3c91956d1ce597f1e0626ea1
-
SHA256
982102e6976d2da9b2a3e648b12ac057e4120fbcd814ec31594828b9f9ede168
-
SHA512
82a39fe4cca327cf28e6664c8ddf51ab3d3cad406b1a3dbdefaa9e303a84df22afefda8e4bbef49f00fa8b92b2d1e4cfbf6eb28a634c554e008e7bce6cdd6c3a
-
SSDEEP
768:bIDOw9UiaCHfjnE0Sf88AvvP1oghYvm9/6DyE9x3Rp9:bIDOw9a0Dwo3P1ojvUSD79Rf9
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation 6aeff1542255455df10706134bd81f80_NeikiAnalytics.exe -
Executes dropped EXE 1 IoCs
pid Process 4376 lossy.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4964 wrote to memory of 4376 4964 6aeff1542255455df10706134bd81f80_NeikiAnalytics.exe 82 PID 4964 wrote to memory of 4376 4964 6aeff1542255455df10706134bd81f80_NeikiAnalytics.exe 82 PID 4964 wrote to memory of 4376 4964 6aeff1542255455df10706134bd81f80_NeikiAnalytics.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\6aeff1542255455df10706134bd81f80_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\6aeff1542255455df10706134bd81f80_NeikiAnalytics.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4964 -
C:\Users\Admin\AppData\Local\Temp\lossy.exe"C:\Users\Admin\AppData\Local\Temp\lossy.exe"2⤵
- Executes dropped EXE
PID:4376
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
41KB
MD5f218deda2781a10024aaf5cd9fb6aa88
SHA16eb63b13d4f63fc2af387e44686657c5de45d9e7
SHA256ae24c128ac6defc0aa26e5c7fed6611a55b0c065825bf9e80cb9f0eff2c6c07f
SHA5124996293cb03b2b8c0c9daf49776fccc616349f6cdd5c2bd2d70d112f662326cffa292cdc50fed0094b81a23af26cde74fe423e1f1c8f1bd134d3a23633dd32b5