Analysis
-
max time kernel
149s -
max time network
115s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
10-05-2024 12:04
Static task
static1
Behavioral task
behavioral1
Sample
da97457556fc960c5867a9f64ec721a0_NeikiAnalytics.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
da97457556fc960c5867a9f64ec721a0_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
da97457556fc960c5867a9f64ec721a0_NeikiAnalytics.exe
-
Size
1.8MB
-
MD5
da97457556fc960c5867a9f64ec721a0
-
SHA1
44cdd3e69c50e83fab5a6a1462f5fcb509b45670
-
SHA256
48b0e7169f13cc51d4cd94a4f1fc216acd0abe7b79100667fbcf2926ec0059ec
-
SHA512
87d21f2fda3fb2aeb2fdac5124e6cc3257637070b707426a29b0a30fc2a763b38e97f190885930d9fbba5cf3fc7a8bf8034b27e52fc7d1fc0ab72cfbf5e0c2c3
-
SSDEEP
49152:C1Hkb0dMwf2lxuA4XF/bqpj4F61l7m+PjApSy2:0Hkb0dM7Ewpje61lyq8My2
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation 4C1C.tmp -
Executes dropped EXE 1 IoCs
pid Process 4712 4C1C.tmp -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000_Classes\Local Settings 4C1C.tmp -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 2624 WINWORD.EXE 2624 WINWORD.EXE -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4712 4C1C.tmp -
Suspicious use of SetWindowsHookEx 10 IoCs
pid Process 2624 WINWORD.EXE 2624 WINWORD.EXE 2624 WINWORD.EXE 2624 WINWORD.EXE 2624 WINWORD.EXE 2624 WINWORD.EXE 2624 WINWORD.EXE 2624 WINWORD.EXE 2624 WINWORD.EXE 2624 WINWORD.EXE -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 452 wrote to memory of 4712 452 da97457556fc960c5867a9f64ec721a0_NeikiAnalytics.exe 82 PID 452 wrote to memory of 4712 452 da97457556fc960c5867a9f64ec721a0_NeikiAnalytics.exe 82 PID 452 wrote to memory of 4712 452 da97457556fc960c5867a9f64ec721a0_NeikiAnalytics.exe 82 PID 4712 wrote to memory of 2624 4712 4C1C.tmp 89 PID 4712 wrote to memory of 2624 4712 4C1C.tmp 89 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Uses Volume Shadow Copy WMI provider
The Volume Shadow Copy service is used to manage backups/snapshots.
-
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\da97457556fc960c5867a9f64ec721a0_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\da97457556fc960c5867a9f64ec721a0_NeikiAnalytics.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:452 -
C:\Users\Admin\AppData\Local\Temp\4C1C.tmp"C:\Users\Admin\AppData\Local\Temp\4C1C.tmp" --pingC:\Users\Admin\AppData\Local\Temp\da97457556fc960c5867a9f64ec721a0_NeikiAnalytics.exe CBA8984E17A1A01F935169A19194A26F4820E200C8CBC279576565DF5069ED6D0629E0E3B5C271F965C05AB50E505040BD639B3C73BE31225758715AABD4844A2⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:4712 -
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\da97457556fc960c5867a9f64ec721a0_NeikiAnalytics.docx" /o ""3⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:2624
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.8MB
MD54afec7226f970696481d5da29bfffe36
SHA1b453db9f322a41e0a26cbb37cd0684156fcddda7
SHA256a9fde037d5ce1b416ba4da9ea0a52316261cb687efec67b6e5a35498aff46f72
SHA51274c8db509c129741f7d789a4109cc319790c78c7e1b75d187275010b090128ebf8646ca5a84389bc8bab70f445b50a6697096c60b6ef55df1ef40bd7a709286a
-
Filesize
19KB
MD54046ff080673cffac6529512b8d3bdbb
SHA1d3cbc39065b7a55e995fa25397da2140bdac80c1
SHA256f0c1b360c0b24b5450a79138650e6ee254afae6ce8f6c68da7d1f32f91582680
SHA512453f70730b7560e3d3e23ddfa0fe74e014753f8b34b45254c1c0cf5fec0546a2b8b109a4f9d096e91711b6d02cb383a7136c2cb7bd6600d0598acf7c90c25418