Analysis
-
max time kernel
150s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
11/05/2024, 03:43
Behavioral task
behavioral1
Sample
71b3bf62e56f6f0dea60c36192ef88e0_NeikiAnalytics.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
71b3bf62e56f6f0dea60c36192ef88e0_NeikiAnalytics.exe
Resource
win10v2004-20240426-en
General
-
Target
71b3bf62e56f6f0dea60c36192ef88e0_NeikiAnalytics.exe
-
Size
383KB
-
MD5
71b3bf62e56f6f0dea60c36192ef88e0
-
SHA1
ff108fc1cce699b7702a88e73c128873dc15ce4c
-
SHA256
b466638aefdb02d527d4f93be21b221d6bdcb8431257bcc2a2c74cabda291e72
-
SHA512
1a4a7f15ec3cb9fe1303961f55f41bae9a564d2f642f5efd32b02e10f05103f7e6fe998077e4a0d885beebd2a2cb1d25b2ca0713862956a67bc87eada16429ee
-
SSDEEP
6144:l29q46VSndj30BwwBxE1+ijiBKk3etdgI2MyzNORQtOfl1qNVo7R+S+N/TU7Q:d46QnRw8EYiBlMQ
Malware Config
Extracted
sakula
www.polarroute.com
Signatures
-
Sakula payload 4 IoCs
resource yara_rule behavioral2/memory/4884-0-0x0000000000400000-0x0000000000425000-memory.dmp family_sakula behavioral2/files/0x0008000000023400-3.dat family_sakula behavioral2/memory/2328-5-0x0000000000400000-0x0000000000425000-memory.dmp family_sakula behavioral2/memory/4884-6-0x0000000000400000-0x0000000000425000-memory.dmp family_sakula -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\Control Panel\International\Geo\Nation 71b3bf62e56f6f0dea60c36192ef88e0_NeikiAnalytics.exe -
Executes dropped EXE 1 IoCs
pid Process 2328 MediaCenter.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\MicroMedia = "C:\\Users\\Admin\\AppData\\Local\\Temp\\MicroMedia\\MediaCenter.exe" 71b3bf62e56f6f0dea60c36192ef88e0_NeikiAnalytics.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Runs ping.exe 1 TTPs 1 IoCs
pid Process 1696 PING.EXE -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 4884 71b3bf62e56f6f0dea60c36192ef88e0_NeikiAnalytics.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4884 wrote to memory of 2328 4884 71b3bf62e56f6f0dea60c36192ef88e0_NeikiAnalytics.exe 83 PID 4884 wrote to memory of 2328 4884 71b3bf62e56f6f0dea60c36192ef88e0_NeikiAnalytics.exe 83 PID 4884 wrote to memory of 2328 4884 71b3bf62e56f6f0dea60c36192ef88e0_NeikiAnalytics.exe 83 PID 4884 wrote to memory of 1276 4884 71b3bf62e56f6f0dea60c36192ef88e0_NeikiAnalytics.exe 97 PID 4884 wrote to memory of 1276 4884 71b3bf62e56f6f0dea60c36192ef88e0_NeikiAnalytics.exe 97 PID 4884 wrote to memory of 1276 4884 71b3bf62e56f6f0dea60c36192ef88e0_NeikiAnalytics.exe 97 PID 1276 wrote to memory of 1696 1276 cmd.exe 99 PID 1276 wrote to memory of 1696 1276 cmd.exe 99 PID 1276 wrote to memory of 1696 1276 cmd.exe 99
Processes
-
C:\Users\Admin\AppData\Local\Temp\71b3bf62e56f6f0dea60c36192ef88e0_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\71b3bf62e56f6f0dea60c36192ef88e0_NeikiAnalytics.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4884 -
C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exeC:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe2⤵
- Executes dropped EXE
PID:2328
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c ping 127.0.0.1 & del /q "C:\Users\Admin\AppData\Local\Temp\71b3bf62e56f6f0dea60c36192ef88e0_NeikiAnalytics.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:1276 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.13⤵
- Runs ping.exe
PID:1696
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
383KB
MD563ec65e2ad61f25693bb15aa4c23e62d
SHA1c074b848b878419f0d58d7cf059e805af2f7d6e9
SHA2567eed4c8540b624ccff3c3dde55e53c98f2ec53a39d10dea93c42e9e9b4664cb5
SHA51218279192638c2392c677605c956581458711264fbeb66b248cebc3b8f8b1e6cf752a43b0583cb3dea5899389732f4e8b1dda18c4c27600211298062acd9abc26