Analysis

  • max time kernel
    144s
  • max time network
    93s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10/05/2024, 11:18

General

  • Target

    cfb7a9b2985c58e07fc4b91076282c60_NeikiAnalytics.exe

  • Size

    1.6MB

  • MD5

    cfb7a9b2985c58e07fc4b91076282c60

  • SHA1

    e787162f01c2c5750daf1f3d8bd6d42190a09aab

  • SHA256

    e5f16db07ad2ca38ce099d6532efd1738c0304e7a7bd7f7b3792cdf4257a190a

  • SHA512

    771b0474c9c00ec2026003edb92a7d1b5193eda7fb5a16adb34b7bd63cf6be8fb14dc6e8ec9ee55301a3276a737ede94fdafc3049fad21382d0756cbd4e5ec03

  • SSDEEP

    49152:YCGeQD9oMmmxvhCcD0Tgy0LXu1qoTzmYvr6/TG:YCVQD9ymxvkcD+v49pN/q

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies system certificate store 2 TTPs 5 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\cfb7a9b2985c58e07fc4b91076282c60_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\cfb7a9b2985c58e07fc4b91076282c60_NeikiAnalytics.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:860
    • C:\Users\Admin\AppData\Local\Temp\3FD8.tmp
      "C:\Users\Admin\AppData\Local\Temp\3FD8.tmp" --pingC:\Users\Admin\AppData\Local\Temp\cfb7a9b2985c58e07fc4b91076282c60_NeikiAnalytics.exe 9C17835993F3077A2CCE25480FE1107AC7F543C6DC5BD4BACB10A4BA8FB850B6CF584F44AE6D2140CE48B701614C370C573F87CF8CCE8F18AE40164505E2B220
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Suspicious behavior: RenamesItself
      • Suspicious use of WriteProcessMemory
      PID:2004
      • C:\Users\Admin\AppData\Local\Temp\cfb7a9b2985c58e07fc4b91076282c60_NeikiAnalytics.exe
        "C:\Users\Admin\AppData\Local\Temp\cfb7a9b2985c58e07fc4b91076282c60_NeikiAnalytics.exe"
        3⤵
        • Executes dropped EXE
        • Modifies system certificate store
        • Suspicious use of SetWindowsHookEx
        PID:1848

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\3FD8.tmp

          Filesize

          1.6MB

          MD5

          205caeace6e191cc6541f1fd2827068b

          SHA1

          cb17238131a850bba377ba565553f6309316d20a

          SHA256

          1f8748bf9737c5148a9b7bef0577a219d5fa66bff5adea788146087746ff346e

          SHA512

          638b71c0764fc17e232374304181db1f3c833a03fd75774e8804220a0224ab6fdfbf763755fabcdd08eebdc56ae84f67cd20273428350f784f4863ad527d0eda

        • C:\Users\Admin\AppData\Local\Temp\cfb7a9b2985c58e07fc4b91076282c60_NeikiAnalytics.exe

          Filesize

          1.0MB

          MD5

          03b18ee5ae548b01cf455ca56aa2daae

          SHA1

          3149878b9d40624265bd1abd63632ec21bf36c8d

          SHA256

          9f581b5730b3f10de2a3b3a21d3e476f3094feef3e4dd92ffdaa103f6c410802

          SHA512

          919b9e512a30c643052337e461fa1fbd055932b4a557753fe03ebab29925bfc6d1aba61a92f320729569a5ad3d60e7493b43e366313f5328caf0597772f60721

        • memory/1848-15-0x0000000000400000-0x00000000004B4000-memory.dmp

          Filesize

          720KB

        • memory/1848-33-0x0000000000400000-0x00000000004B4000-memory.dmp

          Filesize

          720KB