Analysis

  • max time kernel
    150s
  • max time network
    114s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11-05-2024 10:48

General

  • Target

    ae3d29b3487036dcf3ccc0e563766590_NeikiAnalytics.exe

  • Size

    70KB

  • MD5

    ae3d29b3487036dcf3ccc0e563766590

  • SHA1

    c8731684f1c627e1d4bb8aa92158f36a25bcaa79

  • SHA256

    b03d67ee2b2f73fdd2c9106fc0dd28802bf261faf12e5a1e5da013239cb703a6

  • SHA512

    d58b6b0b6b156d4e36f142f106ed539068914ed28fc955befb3c3c6356f77650abdfb318042d441651efb637729b19e3452938cc0902f24145d6a3e2e32ac318

  • SSDEEP

    1536:/4Cd+qitb0bt+FTCQ2w9EuTiHsdXzN6WeNy6pac:/H4b0he9EuTz1zs

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ae3d29b3487036dcf3ccc0e563766590_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\ae3d29b3487036dcf3ccc0e563766590_NeikiAnalytics.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:1908
    • C:\Users\Admin\AppData\Local\Temp\conwurm.exe
      "C:\Users\Admin\AppData\Local\Temp\conwurm.exe"
      2⤵
      • Executes dropped EXE
      PID:1728

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\conwurm.exe

    Filesize

    71KB

    MD5

    425ad7d8419ad45bffcda6bf4f39e80b

    SHA1

    1f14363a16ddfb872504c6e3f2fecb7a1e59dbe0

    SHA256

    09a6c3390a062d3823f102ec9ef90a09b1cebdba29fb10d79c15af0acbdca61e

    SHA512

    38d39a33266086c99e4033699bfcbbfc1cd128c6cba1d232c21c27631f20daa4d47c7ab44fbe6ca8a5097ed4986e30b125ed2ba9ae8f00bdecf44015f0640b15

  • memory/1728-12-0x0000000004000000-0x0000000004005000-memory.dmp

    Filesize

    20KB

  • memory/1908-1-0x0000000004000000-0x0000000004005000-memory.dmp

    Filesize

    20KB

  • memory/1908-0-0x0000000004000000-0x0000000004005000-memory.dmp

    Filesize

    20KB