Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14-05-2024 14:06

General

  • Target

    c9b75457a8e8ca57aef5ee32ded79680_NeikiAnalytics.exe

  • Size

    236KB

  • MD5

    c9b75457a8e8ca57aef5ee32ded79680

  • SHA1

    c0d7aedb10929c739694c344af9047d0cad9a9f8

  • SHA256

    01f97e40030a8f36e20abcff9d58fe222297e4211a942918777452af4806c27a

  • SHA512

    6e3d699236118f52a877c6d315a7262b4b8abf965e8f7c79f6b1e83b220f58fcb755511464622d9066632d6a551d4c9801de1c5ac490b83f8735c9ba5196496c

  • SSDEEP

    3072:K6VlhsJ0VsvyMZeIT51B8u0gWCyiHCUPqga:wSVuyMwItf8u0gWCyiHC

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 27 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c9b75457a8e8ca57aef5ee32ded79680_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\c9b75457a8e8ca57aef5ee32ded79680_NeikiAnalytics.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:5080
    • C:\Users\Admin\bjfiub.exe
      "C:\Users\Admin\bjfiub.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:3400

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\bjfiub.exe

    Filesize

    236KB

    MD5

    d754399e4451235cfd88e1d1ae974bd2

    SHA1

    b7c8c9d554271f106a994b10b117a6cb41b79a4d

    SHA256

    879fe1d669e78a0df3c22d486484df90f0521970e60a4b83b40b1e6b12e6dcef

    SHA512

    256f754945da76ec49703fa7834f59f1db407cb8ba90a140226a118d4d0c8ab1d8fd3d64108fdd2d5610edc8d8ba2a956b7bfce715b9ee4c6cc68e9a102e2f11

  • memory/3400-34-0x0000000000400000-0x0000000000446000-memory.dmp

    Filesize

    280KB

  • memory/3400-38-0x0000000000400000-0x0000000000446000-memory.dmp

    Filesize

    280KB

  • memory/5080-0-0x0000000000400000-0x0000000000446000-memory.dmp

    Filesize

    280KB

  • memory/5080-37-0x0000000000400000-0x0000000000446000-memory.dmp

    Filesize

    280KB