Analysis
-
max time kernel
126s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
14-05-2024 14:29
Static task
static1
Behavioral task
behavioral1
Sample
ca7eccacff7addbbdd4d800a990876f0_NeikiAnalytics.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
ca7eccacff7addbbdd4d800a990876f0_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
ca7eccacff7addbbdd4d800a990876f0_NeikiAnalytics.exe
-
Size
34KB
-
MD5
ca7eccacff7addbbdd4d800a990876f0
-
SHA1
3eb8425da8721e583308248911e4331255e3651d
-
SHA256
2cf3125d737eb298cf1732987b6c1046d5bc18f4b25c0601a1efc4951d0b20c0
-
SHA512
4a10de0d6e6e2c36f74c70b416607e1b3cb8be0d1206616278c177c8e092a1fb5cf5f2951df2d5b5fca74b93505258e098ad5d4f579306e2b66624db0d7a693a
-
SSDEEP
768:rHhTnQh4drgXy718Ti+hWdkpEySrZyPZxWuw:qeW618Ti+hWdkpEySNawb
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation ca7eccacff7addbbdd4d800a990876f0_NeikiAnalytics.exe -
Executes dropped EXE 1 IoCs
pid Process 4732 pdfmaps.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 456 wrote to memory of 4732 456 ca7eccacff7addbbdd4d800a990876f0_NeikiAnalytics.exe 91 PID 456 wrote to memory of 4732 456 ca7eccacff7addbbdd4d800a990876f0_NeikiAnalytics.exe 91 PID 456 wrote to memory of 4732 456 ca7eccacff7addbbdd4d800a990876f0_NeikiAnalytics.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\ca7eccacff7addbbdd4d800a990876f0_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\ca7eccacff7addbbdd4d800a990876f0_NeikiAnalytics.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:456 -
C:\Users\Admin\AppData\Local\Temp\pdfmaps.exe"C:\Users\Admin\AppData\Local\Temp\pdfmaps.exe"2⤵
- Executes dropped EXE
PID:4732
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --field-trial-handle=4088,i,11266875042087428226,16669718873272757238,262144 --variations-seed-version --mojo-platform-channel-handle=4084 /prefetch:81⤵PID:1688
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
35KB
MD5fd9c2a86e3bc3b0e2ae7f35f977e1b6b
SHA1feedc389235efb6916ace56c7448a7bd68e97077
SHA2567d9f858ef09dddf31e64f2e28648f43d83aa03e958394da9126be337805dae04
SHA5129309de34474813e96ea1b0153825b02df5069dff6052fac6e3f4056da8cccfbed457630aae8b0aa146e583f05c97846246c962d501c599353f981d6ab7f6a141