Analysis
-
max time kernel
136s -
max time network
137s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
10-05-2024 05:12
Behavioral task
behavioral1
Sample
7a3f80a5c9c84cab1175841033e19190_NeikiAnalytics.exe
Resource
win7-20240221-en
General
-
Target
7a3f80a5c9c84cab1175841033e19190_NeikiAnalytics.exe
-
Size
472KB
-
MD5
7a3f80a5c9c84cab1175841033e19190
-
SHA1
d5d427998d02e70d72b65af6fba266fd890a7f15
-
SHA256
dcb21d3e0e23d8cdb7c824ccecf63fb5f87e3167f5d23710505c7bf426a92487
-
SHA512
be94e941147a008d2494ed107cb46f2e3c3ec4870f3a6102d3ebeff56581527cc052474add7e4be74e39453f6133311e7366d960f6f2d8e974b08773651aefd5
-
SSDEEP
6144:PEK25f5ySIcWLsxIIW4DYM6SB6mwrxcvkzmSOphmYHI:PMpASIcWYx2U6kQnaHI
Malware Config
Extracted
urelas
218.54.31.165
218.54.31.226
Signatures
-
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\International\Geo\Nation 7a3f80a5c9c84cab1175841033e19190_NeikiAnalytics.exe Key value queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\International\Geo\Nation xosug.exe Key value queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\International\Geo\Nation fyenka.exe -
Executes dropped EXE 3 IoCs
pid Process 4620 xosug.exe 1948 fyenka.exe 2420 deekr.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
pid pid_target Process procid_target 4824 2420 WerFault.exe 105 1892 2420 WerFault.exe 105 -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 3192 wrote to memory of 4620 3192 7a3f80a5c9c84cab1175841033e19190_NeikiAnalytics.exe 85 PID 3192 wrote to memory of 4620 3192 7a3f80a5c9c84cab1175841033e19190_NeikiAnalytics.exe 85 PID 3192 wrote to memory of 4620 3192 7a3f80a5c9c84cab1175841033e19190_NeikiAnalytics.exe 85 PID 3192 wrote to memory of 3064 3192 7a3f80a5c9c84cab1175841033e19190_NeikiAnalytics.exe 86 PID 3192 wrote to memory of 3064 3192 7a3f80a5c9c84cab1175841033e19190_NeikiAnalytics.exe 86 PID 3192 wrote to memory of 3064 3192 7a3f80a5c9c84cab1175841033e19190_NeikiAnalytics.exe 86 PID 4620 wrote to memory of 1948 4620 xosug.exe 88 PID 4620 wrote to memory of 1948 4620 xosug.exe 88 PID 4620 wrote to memory of 1948 4620 xosug.exe 88 PID 1948 wrote to memory of 2420 1948 fyenka.exe 105 PID 1948 wrote to memory of 2420 1948 fyenka.exe 105 PID 1948 wrote to memory of 2420 1948 fyenka.exe 105 PID 1948 wrote to memory of 1052 1948 fyenka.exe 107 PID 1948 wrote to memory of 1052 1948 fyenka.exe 107 PID 1948 wrote to memory of 1052 1948 fyenka.exe 107
Processes
-
C:\Users\Admin\AppData\Local\Temp\7a3f80a5c9c84cab1175841033e19190_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\7a3f80a5c9c84cab1175841033e19190_NeikiAnalytics.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3192 -
C:\Users\Admin\AppData\Local\Temp\xosug.exe"C:\Users\Admin\AppData\Local\Temp\xosug.exe" hi2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4620 -
C:\Users\Admin\AppData\Local\Temp\fyenka.exe"C:\Users\Admin\AppData\Local\Temp\fyenka.exe" OK3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1948 -
C:\Users\Admin\AppData\Local\Temp\deekr.exe"C:\Users\Admin\AppData\Local\Temp\deekr.exe"4⤵
- Executes dropped EXE
PID:2420 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2420 -s 2165⤵
- Program crash
PID:4824
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2420 -s 2205⤵
- Program crash
PID:1892
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\_vslite.bat" "4⤵PID:1052
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\_vslite.bat" "2⤵PID:3064
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2420 -ip 24201⤵PID:4348
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 2420 -ip 24201⤵PID:3732
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
306B
MD5e220b07893895f1356b7883a583950a9
SHA19883b53e3a26f048d09b7f827e9ac49b623f74b9
SHA25674db344ed4f22d8ca0ebfc1d556ef3ccc9f0a705a2a873f2f9fe81a1c898d0da
SHA512b59bc8f43e80aad876240d4befbb137d105877e7d491059af152105bf3ead0b98e2c7a4865e0c5f6d05011e517ff4d90da98df3cf7542c32c14dea7695ddae2a
-
Filesize
224B
MD5931828ce04f067a060c63c1825e0b079
SHA1fe60972ad12bf8072b36957b456a4081a476c6c7
SHA256574854627026618a6a7f87a38481d7f0d9390ef2e28222cb952afe57636c19c7
SHA512f4e0ec8c0407777f6c7778be310592f9c2b42207725af852107908de5841d9cacb92ae2ae6a0d8359bfce221d7882a2c0ae2256692494436d4dddd74297f223f
-
Filesize
223KB
MD5c9534af48c6f2252532da02cf5cca887
SHA162b6bd3680e6df54004d097646e436c7e2fff7f7
SHA256787996c7055db9b90e6ce5969289db2c3e34f2b85c4e8dbe84ccf43f7553fe2e
SHA512afe2c0f096a9ad52d53cbd9e62f1a0840569ff6be9ecc236dd51218f1689511bb0b471b0e501907d402d4abba1bb31993f8119705af14b97a1f9d8901c29a676
-
Filesize
472KB
MD5c9d13a00677a3c4fd6b2cce999984969
SHA165bff10531058a85978b03ed80aa0d9f3facd464
SHA2566a4a569fee331c89dfd3135ca167726b5c13682c0cfa291b4d5876ff6847969d
SHA51201747821c640efac9e6204b6a81ae64c60827b1c3f812e5f64ea335577d8f979bb97b881d020176adfec31c0543e6bf790cee2ebbe9c5fb02e5958252ca34503
-
Filesize
512B
MD531744f35d43b5553cd8bccbc778095fb
SHA11b96f31bcfd52c80e20adae668068db2f207952a
SHA256ba90789c88fca92146c5a299f1c03073119712ec547d345a62c533cff42d7127
SHA512dee9d9bd786bcf013bd31aecc463c78c3a6deb3efc2ace74e4c70d959319823868785452562187dd13604bf45574f473ede6e25c4b3e7eb65ad3b3cccb51d4a5
-
Filesize
472KB
MD520343fc83689f9dbd70e5028bc7dadd0
SHA1b9be8578eb7f8d58068e80b150085f6e85d41733
SHA2569c48c25c11509e742a55bc1b207e53071bc73ac7bb7d4b9ca45e57e3b304cc8c
SHA5128be665a05e01e49f8b14b81c98c87f6d984c064eca93b385d3c462543893cd7b1c8cfb21124a82836221f6a229b59aadde3da17d72ccdbafe73accc4b1d14ca8