Analysis

  • max time kernel
    132s
  • max time network
    103s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12/05/2024, 08:11

General

  • Target

    81f16f0ac610e0b01dc4e21b61ce9b20_NeikiAnalytics.exe

  • Size

    12KB

  • MD5

    81f16f0ac610e0b01dc4e21b61ce9b20

  • SHA1

    6927214c52526f0df4ca146c11d02cf3665b1350

  • SHA256

    c66b3ec7224d80972b38b689e85c4fb395fbfbfcfe6dd5018bbd04bc17787979

  • SHA512

    13b24cdd20b5d83769cec343716337b3399bee00e1a8734b981a00f8562fba0e9be012b36b8c79a85a72c4deb20995ebe61fcd3d6eab98765d58d929934b31e6

  • SSDEEP

    384:qL7li/2zhq2DcEQvdQcJKLTp/NK9xawr:0xMCQ9cwr

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Uses the VBS compiler for execution 1 TTPs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\81f16f0ac610e0b01dc4e21b61ce9b20_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\81f16f0ac610e0b01dc4e21b61ce9b20_NeikiAnalytics.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4296
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\gcghr3ti\gcghr3ti.cmdline"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3600
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
        C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES41EB.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc9817416F3B934F6486F33DEA4E0DF15.TMP"
        3⤵
          PID:4104
      • C:\Users\Admin\AppData\Local\Temp\tmp4084.tmp.exe
        "C:\Users\Admin\AppData\Local\Temp\tmp4084.tmp.exe" C:\Users\Admin\AppData\Local\Temp\81f16f0ac610e0b01dc4e21b61ce9b20_NeikiAnalytics.exe
        2⤵
        • Deletes itself
        • Executes dropped EXE
        PID:4116

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\RE.resources

      Filesize

      2KB

      MD5

      791dd6b9dd38ac471a70b730e67c867d

      SHA1

      1fed14c2915f0b7045c0fba7331970f6a029fe8d

      SHA256

      cdf100044f18f03b21d07f210b00c7e247c8948bee638f4a4411790e9916e850

      SHA512

      d1e5af876c70c33fad8e1ecb0fc4e3d36fcd32fb401f42e87203883a2198e7ab68dcf8342582dda18806576ae403ac45f8cc2d5dea0a9cb04dd77cbdb6424b08

    • C:\Users\Admin\AppData\Local\Temp\RES41EB.tmp

      Filesize

      1KB

      MD5

      7f7f1376b0c1e5c459dd241746d5d49d

      SHA1

      553e4641450eb204303f2714f42bcad18e9bb5f4

      SHA256

      8f0ff91f927bd3faed7acdd7efca38f44c33b84422f9d91185325bd7e29e5b93

      SHA512

      caaa143c0b734b363ba2d6db9c5f6e139207d871557aa1e32ddaf6d9e262630579eae44d226e00c17176fc7718181e3af36df314a48c2062566acb2710003c84

    • C:\Users\Admin\AppData\Local\Temp\gcghr3ti\gcghr3ti.0.vb

      Filesize

      2KB

      MD5

      0acaea086f4c623db46d3f9c32f7002c

      SHA1

      31918c3d4622c15867f3fed539101560fb43859c

      SHA256

      a84d62c9ab8585f7f6e648dcacbf8e131b53486b22712cd9ebc96fcbfddf1d30

      SHA512

      e0258dbb4a69bf77bede3bd3ce5f0b84cc76f0ed512276c6ac022e1f01607416960f4f2591fb7cd48a23cd2810e832279879f28385f84604daddf4a04c8570f0

    • C:\Users\Admin\AppData\Local\Temp\gcghr3ti\gcghr3ti.cmdline

      Filesize

      273B

      MD5

      bace065c51ba31f6fa74b5dd3466b8ce

      SHA1

      4f4337f23f588dd958cbc419d94425c9e365a797

      SHA256

      d60f18dfc118d890af4179e1d5d5b3d663eabe7d243f087e5b82feb905a0e986

      SHA512

      9f92e3428d2d62368e2bf6d528423ff54c09efac622d680421dce7df821e091d3142714e5d48be90055bed4335d56520c60ae6cacd61e2e7c0cfafc527d5f148

    • C:\Users\Admin\AppData\Local\Temp\tmp4084.tmp.exe

      Filesize

      12KB

      MD5

      3878b69eaa562bf4c412913770aff644

      SHA1

      939301af7ed54d08bd9ae9c260b4aff305c10ffb

      SHA256

      2714d7f63bf65479bae6980f8d5bd62bedc1c572f4daef6e9486bfcffe45d727

      SHA512

      0fec02cd2d6547b37dbb828acec2ba0a523ac960f905cfe91d194a36bdbde8d25a87aee6091787bd821176fc6b6f35cddc78e09177bc912261a43c1ee90edb9c

    • C:\Users\Admin\AppData\Local\Temp\vbc9817416F3B934F6486F33DEA4E0DF15.TMP

      Filesize

      1KB

      MD5

      830e6c0a14a456804b293a9cefdfa3f7

      SHA1

      21b431a2e272cc3dbcfb82612f2c4f44e67d0eaf

      SHA256

      5e52615b8923118527e9dcf1034b84190d3e6b38cce50a100c2ab9fe01c6c084

      SHA512

      d4829d5cafd494d077cc2d7eac1eeaaa570fba01430ba8201e119b1c185787143a14d54272af28b610bd2b08486d1875495da1825f95abf80050ad86647588f4

    • memory/4116-25-0x00000000003A0000-0x00000000003AA000-memory.dmp

      Filesize

      40KB

    • memory/4116-26-0x00000000747E0000-0x0000000074F90000-memory.dmp

      Filesize

      7.7MB

    • memory/4116-27-0x00000000052F0000-0x0000000005894000-memory.dmp

      Filesize

      5.6MB

    • memory/4116-28-0x0000000004DE0000-0x0000000004E72000-memory.dmp

      Filesize

      584KB

    • memory/4116-30-0x00000000747E0000-0x0000000074F90000-memory.dmp

      Filesize

      7.7MB

    • memory/4296-0-0x00000000747EE000-0x00000000747EF000-memory.dmp

      Filesize

      4KB

    • memory/4296-8-0x00000000747E0000-0x0000000074F90000-memory.dmp

      Filesize

      7.7MB

    • memory/4296-2-0x0000000005790000-0x000000000582C000-memory.dmp

      Filesize

      624KB

    • memory/4296-1-0x0000000000DD0000-0x0000000000DDA000-memory.dmp

      Filesize

      40KB

    • memory/4296-24-0x00000000747E0000-0x0000000074F90000-memory.dmp

      Filesize

      7.7MB