Analysis

  • max time kernel
    150s
  • max time network
    123s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14/05/2024, 06:32

General

  • Target

    94b66b9ba80fce10d901b6b8d6dfe260_NeikiAnalytics.exe

  • Size

    53KB

  • MD5

    94b66b9ba80fce10d901b6b8d6dfe260

  • SHA1

    22ad8af223e5fe775ba1cde96ec7148b0656f83f

  • SHA256

    ea044baa30b8a799ca23d1c4370b8b09b6bf43ec78b6782cbc885be4e2ed0408

  • SHA512

    6be67a12cf7309ef610ff6f1504261b3eee21ba637c8ba2969d45f1c76077c8b7ad04c8eeb5118ed17f13dc60b06d3536fb45b1cbd920624f7d4bc366a9c6027

  • SSDEEP

    1536:vNTg8r8QXeZWXeN7Kp3StjEMjmLM3ztDJWZsXy4JzxPM0:teZeeNJJjmLM3zRJWZsXy4J9

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\94b66b9ba80fce10d901b6b8d6dfe260_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\94b66b9ba80fce10d901b6b8d6dfe260_NeikiAnalytics.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3380
    • C:\Users\Admin\gkveaw.exe
      "C:\Users\Admin\gkveaw.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:3232

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\gkveaw.exe

    Filesize

    53KB

    MD5

    348ac71ca30dbf8ed96aa1cf9a9da18e

    SHA1

    5ef02d7ddbb7fbb5be3e9690ba44c4c1acbdc9b0

    SHA256

    0a0e30d0db5b917fb31553dfbc03e8ca30f4cbd9cf71c21bfd897edac1ea1aec

    SHA512

    a91af9d3f46f5eac6cc3b936088553cc1722f892379fd595b5dcff9b686cbe258111ad1e7b90f9b9f437c4e073bf10600468a8ff2adff3fada0dc148dda15ad0

  • memory/3232-33-0x0000000000400000-0x0000000000412000-memory.dmp

    Filesize

    72KB

  • memory/3380-0-0x0000000000400000-0x0000000000412000-memory.dmp

    Filesize

    72KB