Analysis
-
max time kernel
146s -
max time network
118s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
10/05/2024, 20:04
Static task
static1
Behavioral task
behavioral1
Sample
63647c0a8e82ac920a94682790346900_NeikiAnalytics.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
63647c0a8e82ac920a94682790346900_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
63647c0a8e82ac920a94682790346900_NeikiAnalytics.exe
-
Size
2.3MB
-
MD5
63647c0a8e82ac920a94682790346900
-
SHA1
075d726baadbc0c2f3bf30a6856068f40cb643b3
-
SHA256
b5e9c1ac582edee24c21ce06d16b2f88097ca43fe440c1920ae13c3e77a02377
-
SHA512
07524714521cf6702111d0855d45a4d17008c316ba1b02575718a525478e2d2e75af3bc24e757eb65c6adc559a1ab80e564936eada73fea3206433cd2c815233
-
SSDEEP
49152:WcKVDBe/gOs61xz/b1WkHlerfJgQmy2EWsb4AYj8UFop3pAWXry9:nKpBnOs61p5Ip9Ve8UFEXry9
Malware Config
Extracted
Protocol: ftp- Host:
ftp.tripod.com - Port:
21 - Username:
onthelinux - Password:
741852abc
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation 63647c0a8e82ac920a94682790346900_NeikiAnalytics.exe -
Executes dropped EXE 1 IoCs
pid Process 3960 jusched.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 17 IoCs
pid Process 448 63647c0a8e82ac920a94682790346900_NeikiAnalytics.exe 448 63647c0a8e82ac920a94682790346900_NeikiAnalytics.exe 3960 jusched.exe 3960 jusched.exe 3960 jusched.exe 3960 jusched.exe 3960 jusched.exe 3960 jusched.exe 3960 jusched.exe 3960 jusched.exe 3960 jusched.exe 3960 jusched.exe 3960 jusched.exe 3960 jusched.exe 3960 jusched.exe 3960 jusched.exe 3960 jusched.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\b5fb1f06\jusched.exe 63647c0a8e82ac920a94682790346900_NeikiAnalytics.exe File created C:\Program Files (x86)\b5fb1f06\b5fb1f06 63647c0a8e82ac920a94682790346900_NeikiAnalytics.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\Update23.job 63647c0a8e82ac920a94682790346900_NeikiAnalytics.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 448 63647c0a8e82ac920a94682790346900_NeikiAnalytics.exe 3960 jusched.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 448 wrote to memory of 3960 448 63647c0a8e82ac920a94682790346900_NeikiAnalytics.exe 80 PID 448 wrote to memory of 3960 448 63647c0a8e82ac920a94682790346900_NeikiAnalytics.exe 80 PID 448 wrote to memory of 3960 448 63647c0a8e82ac920a94682790346900_NeikiAnalytics.exe 80
Processes
-
C:\Users\Admin\AppData\Local\Temp\63647c0a8e82ac920a94682790346900_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\63647c0a8e82ac920a94682790346900_NeikiAnalytics.exe"1⤵
- Checks computer location settings
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:448 -
C:\Program Files (x86)\b5fb1f06\jusched.exe"C:\Program Files (x86)\b5fb1f06\jusched.exe"2⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetWindowsHookEx
PID:3960
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
17B
MD5552bb86ed2797d3fd12ac0d273afaf75
SHA16e8633f9c24590779acbd3dd14c60f856320bc0a
SHA2563ef9ff5da8272fd1b14c83f12c8d28fd9dbf32d56bcb714921032b02557fe789
SHA512dab57227de02f4667cc8e2ec47566088b473caa0387caffbdfde37f3400da7d4f67dd222e83a4fa93592694bbcff7c52a2bcec074868baf221bc47d9370c8d2c
-
Filesize
2.3MB
MD5cc3245c5fc050862aca5a2b142a905f0
SHA10322b17dfc49052f4ccd2030678530766df1472f
SHA256f695f9b8c0afb63878c2cdfd3ecfd02e8b85b551122edb2fe864a649487edcb2
SHA512017ecb5c4d6ca6e7379befc10df5c41e2653ef120d6937b5193f99b87042af403aa8359069cee730204425570f3dfd12152d71aed9bbe11433f1c475024c3f88