Analysis

  • max time kernel
    149s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11-05-2024 23:34

General

  • Target

    49fbbf7f2a90ac1d0a9192920374eac0_NeikiAnalytics.exe

  • Size

    2.0MB

  • MD5

    49fbbf7f2a90ac1d0a9192920374eac0

  • SHA1

    9b6174138c26cbb3d48d6a4f572a37a512b62b43

  • SHA256

    47b30e9727a5860df981447c58fc546441c0098d67bdc895f74fc034ff34a205

  • SHA512

    f26574f21785a1a9c922f61d34f244958379aec86dd3d870dd2cbbe2496a19d0252971d50379e3b174b4ddd62f6ef282e6d77e69717de4e71873f7213e45ba02

  • SSDEEP

    24576:wAWBi2Q9NXw2/wPOjdGxYurEkqjVnlqud+/2P+AGZecVyFoBOkALetMrdgLQN3L1:7/Tq24GjdGSqEkqXfd+/9ACwaRAemdjB

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Delays execution with timeout.exe 1 IoCs
  • Kills process with taskkill 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\49fbbf7f2a90ac1d0a9192920374eac0_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\49fbbf7f2a90ac1d0a9192920374eac0_NeikiAnalytics.exe"
    1⤵
    • Checks computer location settings
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3044
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /C C:\Users\Admin\AppData\Local\Temp\tmp6DDD.tmp.bat
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2644
      • C:\Windows\SysWOW64\chcp.com
        chcp 65001
        3⤵
          PID:4948
        • C:\Windows\SysWOW64\taskkill.exe
          TaskKill /F /IM 3044
          3⤵
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:1944
        • C:\Windows\SysWOW64\timeout.exe
          Timeout /T 2 /Nobreak
          3⤵
          • Delays execution with timeout.exe
          PID:1268

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\tmp6DDD.tmp.bat

      Filesize

      57B

      MD5

      aa7ca76c129bb4f6be77bd06a340e597

      SHA1

      f40eb60a757970db9448718243dec6b80d69b0c1

      SHA256

      f73dfe57f1ca5b780bbf7254b9458087b8fe2559b230bdb1ed6ba0faeb9f4750

      SHA512

      cf29a06e25b0dbaa04fbee9627ce17af87c80fa6949e85485e722c5b4be6c59a9c52fe91a70cbb30560531522953c1bdd9166fdfb6d6988d15b355f58ffde6f8

    • memory/3044-0-0x000000007536E000-0x000000007536F000-memory.dmp

      Filesize

      4KB

    • memory/3044-1-0x00000000006E0000-0x00000000008F0000-memory.dmp

      Filesize

      2.1MB

    • memory/3044-2-0x0000000075360000-0x0000000075B10000-memory.dmp

      Filesize

      7.7MB

    • memory/3044-3-0x00000000052A0000-0x0000000005306000-memory.dmp

      Filesize

      408KB

    • memory/3044-7-0x0000000005A10000-0x0000000005AA2000-memory.dmp

      Filesize

      584KB

    • memory/3044-8-0x0000000005AA0000-0x0000000005AC6000-memory.dmp

      Filesize

      152KB

    • memory/3044-9-0x0000000005AD0000-0x0000000005AD8000-memory.dmp

      Filesize

      32KB

    • memory/3044-14-0x0000000075360000-0x0000000075B10000-memory.dmp

      Filesize

      7.7MB