Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10/05/2024, 04:20

General

  • Target

    6aeff1542255455df10706134bd81f80_NeikiAnalytics.exe

  • Size

    41KB

  • MD5

    6aeff1542255455df10706134bd81f80

  • SHA1

    7db3c396557f76be3c91956d1ce597f1e0626ea1

  • SHA256

    982102e6976d2da9b2a3e648b12ac057e4120fbcd814ec31594828b9f9ede168

  • SHA512

    82a39fe4cca327cf28e6664c8ddf51ab3d3cad406b1a3dbdefaa9e303a84df22afefda8e4bbef49f00fa8b92b2d1e4cfbf6eb28a634c554e008e7bce6cdd6c3a

  • SSDEEP

    768:bIDOw9UiaCHfjnE0Sf88AvvP1oghYvm9/6DyE9x3Rp9:bIDOw9a0Dwo3P1ojvUSD79Rf9

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6aeff1542255455df10706134bd81f80_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\6aeff1542255455df10706134bd81f80_NeikiAnalytics.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:4964
    • C:\Users\Admin\AppData\Local\Temp\lossy.exe
      "C:\Users\Admin\AppData\Local\Temp\lossy.exe"
      2⤵
      • Executes dropped EXE
      PID:4376

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\lossy.exe

          Filesize

          41KB

          MD5

          f218deda2781a10024aaf5cd9fb6aa88

          SHA1

          6eb63b13d4f63fc2af387e44686657c5de45d9e7

          SHA256

          ae24c128ac6defc0aa26e5c7fed6611a55b0c065825bf9e80cb9f0eff2c6c07f

          SHA512

          4996293cb03b2b8c0c9daf49776fccc616349f6cdd5c2bd2d70d112f662326cffa292cdc50fed0094b81a23af26cde74fe423e1f1c8f1bd134d3a23633dd32b5

        • memory/4376-17-0x00000000005B0000-0x00000000005B6000-memory.dmp

          Filesize

          24KB

        • memory/4376-23-0x0000000000490000-0x0000000000496000-memory.dmp

          Filesize

          24KB

        • memory/4964-0-0x0000000002040000-0x0000000002046000-memory.dmp

          Filesize

          24KB

        • memory/4964-2-0x0000000002100000-0x0000000002106000-memory.dmp

          Filesize

          24KB

        • memory/4964-1-0x0000000002040000-0x0000000002046000-memory.dmp

          Filesize

          24KB