Analysis
-
max time kernel
141s -
max time network
130s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
15-05-2024 22:28
Static task
static1
Behavioral task
behavioral1
Sample
46f9d12382c372b74afb8976d9b2f8a0_NeikiAnalytics.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
46f9d12382c372b74afb8976d9b2f8a0_NeikiAnalytics.exe
Resource
win10v2004-20240426-en
General
-
Target
46f9d12382c372b74afb8976d9b2f8a0_NeikiAnalytics.exe
-
Size
74KB
-
MD5
46f9d12382c372b74afb8976d9b2f8a0
-
SHA1
26279eb061e7fd2d37dac6be58e92c78165d495b
-
SHA256
3633bb7362b26e43bc0c08aed434e4cdde5efd72069ad6d1d46b9d407d5b87cb
-
SHA512
55aa092bb2c030fd475346c9c613b7d80f3d7346c00b3709d572f8bbb124bae94a2a9b7bf9e930cf78c505512f585699694a06c919708cd8247001a590f75573
-
SSDEEP
384:+41DuuOFZyUVpULCgDb2prxVTn24X/m7Q6Al6z+yXpC:fDcZyUpULCgo24T96ayXQ
Malware Config
Signatures
-
Sets file to hidden 1 TTPs 1 IoCs
Modifies file attributes to stop it showing in Explorer etc.
pid Process 432 attrib.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\Control Panel\International\Geo\Nation 46f9d12382c372b74afb8976d9b2f8a0_NeikiAnalytics.exe -
Executes dropped EXE 1 IoCs
pid Process 5000 egkhost.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\Debug\egkhost.exe 46f9d12382c372b74afb8976d9b2f8a0_NeikiAnalytics.exe File opened for modification C:\Windows\Debug\egkhost.exe 46f9d12382c372b74afb8976d9b2f8a0_NeikiAnalytics.exe File opened for modification C:\Windows\Debug\egkhost.exe attrib.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 3196 46f9d12382c372b74afb8976d9b2f8a0_NeikiAnalytics.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3196 wrote to memory of 432 3196 46f9d12382c372b74afb8976d9b2f8a0_NeikiAnalytics.exe 84 PID 3196 wrote to memory of 432 3196 46f9d12382c372b74afb8976d9b2f8a0_NeikiAnalytics.exe 84 PID 3196 wrote to memory of 432 3196 46f9d12382c372b74afb8976d9b2f8a0_NeikiAnalytics.exe 84 PID 3196 wrote to memory of 2552 3196 46f9d12382c372b74afb8976d9b2f8a0_NeikiAnalytics.exe 88 PID 3196 wrote to memory of 2552 3196 46f9d12382c372b74afb8976d9b2f8a0_NeikiAnalytics.exe 88 PID 3196 wrote to memory of 2552 3196 46f9d12382c372b74afb8976d9b2f8a0_NeikiAnalytics.exe 88 -
Views/modifies file attributes 1 TTPs 1 IoCs
pid Process 432 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\46f9d12382c372b74afb8976d9b2f8a0_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\46f9d12382c372b74afb8976d9b2f8a0_NeikiAnalytics.exe"1⤵
- Checks computer location settings
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3196 -
C:\Windows\SysWOW64\attrib.exeattrib +a +s +h +r C:\Windows\Debug\egkhost.exe2⤵
- Sets file to hidden
- Drops file in Windows directory
- Views/modifies file attributes
PID:432
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\46F9D1~1.EXE > nul2⤵PID:2552
-
-
C:\Windows\Debug\egkhost.exeC:\Windows\Debug\egkhost.exe1⤵
- Executes dropped EXE
PID:5000
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
74KB
MD569c2e48ac79da47e77f4e35487fbe5b1
SHA1d77041aa7a2c2ee4a5fe875b17834bb9311fb03a
SHA256fe1d08ade0da0b9770e5c28719dffda9b7179095c3bdc19d289cfa93c1062395
SHA51259bb6f32efae752575acf620922b1f6bd74beee3fdfa37b90a13ae1e4e9d9695ea139b46ac0c322aeb6b2561ae1c428029ffb8c751cf6e11d8f7f4c3bca3107f