Analysis
-
max time kernel
149s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
10-05-2024 11:33
Static task
static1
Behavioral task
behavioral1
Sample
d32d8248385f04ca5053f1d9c14d28d0_NeikiAnalytics.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
d32d8248385f04ca5053f1d9c14d28d0_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
d32d8248385f04ca5053f1d9c14d28d0_NeikiAnalytics.exe
-
Size
480KB
-
MD5
d32d8248385f04ca5053f1d9c14d28d0
-
SHA1
4c24038b7f14d102cb36d97735e0d76579a5576e
-
SHA256
40145cfbe54bb420e1af7808a1fae3d0fe8dce988b6492a5a70635e188a7093c
-
SHA512
129bf4a1be0e2002ff2af2e2ced64984511d73b4d811d2e9cfbf4069cda31972f036b554209def297ec3a5d0ba62578f279c351362ed702f9acce0a0c1c9e88e
-
SSDEEP
12288:AjauDReWw0IA9xkQWrutKXJ7f/BDWxQ1LqpdTd:ADDs0IA9x0rutK5/BDj1kTd
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 432 updqu.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Microsoft® Windows® Operating System = "C:\\ProgramData\\updqu.exe" updqu.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1444 wrote to memory of 432 1444 d32d8248385f04ca5053f1d9c14d28d0_NeikiAnalytics.exe 82 PID 1444 wrote to memory of 432 1444 d32d8248385f04ca5053f1d9c14d28d0_NeikiAnalytics.exe 82 PID 1444 wrote to memory of 432 1444 d32d8248385f04ca5053f1d9c14d28d0_NeikiAnalytics.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\d32d8248385f04ca5053f1d9c14d28d0_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\d32d8248385f04ca5053f1d9c14d28d0_NeikiAnalytics.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1444 -
C:\ProgramData\updqu.exe"C:\ProgramData\updqu.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:432
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
480KB
MD5ab459a26f6ca644a4b1628495e3f5923
SHA183ee2ef25a10b267b6dd3dce3add191719ac9be7
SHA256137e7ab9912fe5495328fa95eefcb63b16ab0b1ee0e814d3becef1f68c5d04d4
SHA512b61af67c32bed3ad9b0e0d6272fdf50a8e9fe40d75002e89d9a16a93554f850854e07c2f655f3e71ad3af7300193443ce963726f423f8c9ce094a3cd8e428107
-
Filesize
136KB
MD52bd01b99551cc639ddb5cb66914904a6
SHA150beb8bab8be15271951130ac833eb19566f9333
SHA2569764e531dd52e37a454c7f052a17fe7b68821dc3570286aab7bb4706639efe40
SHA512374436459d62bdd62fc79b779e5aef155d7b8817e3d64e53639130be49d061a251d04a3882d403c1cacf890f91fa53e9137e551f3f6479341e09fe97c7bf2390
-
Filesize
343KB
MD5d501436a202776134947be29d55ae6c0
SHA10061da84ac614bc7649e20241595b90cb6d6132d
SHA256d6901f65c1d3f8ba03311d70cf7647c35d67d79c517ee8a99573ce0e344ac7ad
SHA51294a9e892421f8fdbdd7cf12885667eac3393e956a19edae9684e4b53b5e2f408d8145ee649b06b3141f929bcb5fb51704b996781a169069327c9cd8a5e76d143