Analysis

  • max time kernel
    149s
  • max time network
    115s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10-05-2024 12:04

General

  • Target

    da97457556fc960c5867a9f64ec721a0_NeikiAnalytics.exe

  • Size

    1.8MB

  • MD5

    da97457556fc960c5867a9f64ec721a0

  • SHA1

    44cdd3e69c50e83fab5a6a1462f5fcb509b45670

  • SHA256

    48b0e7169f13cc51d4cd94a4f1fc216acd0abe7b79100667fbcf2926ec0059ec

  • SHA512

    87d21f2fda3fb2aeb2fdac5124e6cc3257637070b707426a29b0a30fc2a763b38e97f190885930d9fbba5cf3fc7a8bf8034b27e52fc7d1fc0ab72cfbf5e0c2c3

  • SSDEEP

    49152:C1Hkb0dMwf2lxuA4XF/bqpj4F61l7m+PjApSy2:0Hkb0dM7Ewpje61lyq8My2

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of SetWindowsHookEx 10 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • Uses Volume Shadow Copy WMI provider

    The Volume Shadow Copy service is used to manage backups/snapshots.

  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\da97457556fc960c5867a9f64ec721a0_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\da97457556fc960c5867a9f64ec721a0_NeikiAnalytics.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:452
    • C:\Users\Admin\AppData\Local\Temp\4C1C.tmp
      "C:\Users\Admin\AppData\Local\Temp\4C1C.tmp" --pingC:\Users\Admin\AppData\Local\Temp\da97457556fc960c5867a9f64ec721a0_NeikiAnalytics.exe CBA8984E17A1A01F935169A19194A26F4820E200C8CBC279576565DF5069ED6D0629E0E3B5C271F965C05AB50E505040BD639B3C73BE31225758715AABD4844A
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Modifies registry class
      • Suspicious behavior: RenamesItself
      • Suspicious use of WriteProcessMemory
      PID:4712
      • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
        "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\da97457556fc960c5867a9f64ec721a0_NeikiAnalytics.docx" /o ""
        3⤵
        • Checks processor information in registry
        • Enumerates system info in registry
        • Suspicious behavior: AddClipboardFormatListener
        • Suspicious use of SetWindowsHookEx
        PID:2624

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\4C1C.tmp

    Filesize

    1.8MB

    MD5

    4afec7226f970696481d5da29bfffe36

    SHA1

    b453db9f322a41e0a26cbb37cd0684156fcddda7

    SHA256

    a9fde037d5ce1b416ba4da9ea0a52316261cb687efec67b6e5a35498aff46f72

    SHA512

    74c8db509c129741f7d789a4109cc319790c78c7e1b75d187275010b090128ebf8646ca5a84389bc8bab70f445b50a6697096c60b6ef55df1ef40bd7a709286a

  • C:\Users\Admin\AppData\Local\Temp\da97457556fc960c5867a9f64ec721a0_NeikiAnalytics.docx

    Filesize

    19KB

    MD5

    4046ff080673cffac6529512b8d3bdbb

    SHA1

    d3cbc39065b7a55e995fa25397da2140bdac80c1

    SHA256

    f0c1b360c0b24b5450a79138650e6ee254afae6ce8f6c68da7d1f32f91582680

    SHA512

    453f70730b7560e3d3e23ddfa0fe74e014753f8b34b45254c1c0cf5fec0546a2b8b109a4f9d096e91711b6d02cb383a7136c2cb7bd6600d0598acf7c90c25418

  • memory/2624-11-0x00007FFE5EED0000-0x00007FFE5EEE0000-memory.dmp

    Filesize

    64KB

  • memory/2624-12-0x00007FFE5EED0000-0x00007FFE5EEE0000-memory.dmp

    Filesize

    64KB

  • memory/2624-13-0x00007FFE5EED0000-0x00007FFE5EEE0000-memory.dmp

    Filesize

    64KB

  • memory/2624-10-0x00007FFE5EED0000-0x00007FFE5EEE0000-memory.dmp

    Filesize

    64KB

  • memory/2624-9-0x00007FFE5EED0000-0x00007FFE5EEE0000-memory.dmp

    Filesize

    64KB

  • memory/2624-16-0x00007FFE9EE50000-0x00007FFE9F045000-memory.dmp

    Filesize

    2.0MB

  • memory/2624-20-0x00007FFE9EE50000-0x00007FFE9F045000-memory.dmp

    Filesize

    2.0MB

  • memory/2624-19-0x00007FFE9EE50000-0x00007FFE9F045000-memory.dmp

    Filesize

    2.0MB

  • memory/2624-21-0x00007FFE9EE50000-0x00007FFE9F045000-memory.dmp

    Filesize

    2.0MB

  • memory/2624-18-0x00007FFE9EE50000-0x00007FFE9F045000-memory.dmp

    Filesize

    2.0MB

  • memory/2624-22-0x00007FFE5C8F0000-0x00007FFE5C900000-memory.dmp

    Filesize

    64KB

  • memory/2624-15-0x00007FFE9EE50000-0x00007FFE9F045000-memory.dmp

    Filesize

    2.0MB

  • memory/2624-17-0x00007FFE9EE50000-0x00007FFE9F045000-memory.dmp

    Filesize

    2.0MB

  • memory/2624-14-0x00007FFE9EEED000-0x00007FFE9EEEE000-memory.dmp

    Filesize

    4KB

  • memory/2624-23-0x00007FFE5C8F0000-0x00007FFE5C900000-memory.dmp

    Filesize

    64KB

  • memory/2624-32-0x00007FFE9EE50000-0x00007FFE9F045000-memory.dmp

    Filesize

    2.0MB