Analysis

  • max time kernel
    133s
  • max time network
    135s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13-05-2024 13:54

General

  • Target

    bb311fdd29fd5c9d8ff0a7374e5ac530_NeikiAnalytics.exe

  • Size

    47KB

  • MD5

    bb311fdd29fd5c9d8ff0a7374e5ac530

  • SHA1

    1f80af792c15b95ad851d02134230c9687d6f042

  • SHA256

    080daba19cb920c41acd08463007e22ebdafd19cb6181170624d34de606b72f4

  • SHA512

    fd3cc17bc2aa4fdf7e95af3acab3dfb91a8497fc688de0ded5331e1d8018f64497ca1abb1743c028015fffe860198848f5967c93ea81a30e9e49fbd8948810ce

  • SSDEEP

    768:dD2oV2AJblQRNLzFrSNTVebqxjxMQhMk6Cr3H3lbv:dCoVXGRTuhBxj/hH3HVj

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\bb311fdd29fd5c9d8ff0a7374e5ac530_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\bb311fdd29fd5c9d8ff0a7374e5ac530_NeikiAnalytics.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:1088
    • C:\Users\Admin\AppData\Local\Temp\supdater.exe
      "C:\Users\Admin\AppData\Local\Temp\supdater.exe"
      2⤵
      • Executes dropped EXE
      PID:3264

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\supdater.exe

    Filesize

    48KB

    MD5

    3b464896508f43b1128903477d19f896

    SHA1

    12488ccfb599dbc244998aef1c7df4276d751a97

    SHA256

    c3fcbd40cf90c13c64aee93c3ca22a9621d0d544f04de55a4ef61b985d0d3c98

    SHA512

    fcefd71d270b42ed15b4132a61342aa4eed9708432f27ca234ddd1bdc1589a27e7ef350e1bb6b1c73e231139395a422b60bd8c7a9dd26c407e052f465e153512

  • memory/1088-1-0x0000000000501000-0x0000000000502000-memory.dmp

    Filesize

    4KB

  • memory/3264-9-0x0000000000500000-0x0000000000507000-memory.dmp

    Filesize

    28KB