Analysis

  • max time kernel
    147s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    15-05-2024 18:42

General

  • Target

    156cd20d7d340614e2394ef5892a7a20_NeikiAnalytics.exe

  • Size

    29KB

  • MD5

    156cd20d7d340614e2394ef5892a7a20

  • SHA1

    e619c2539d70d07ff345678bc0530da842a5a1aa

  • SHA256

    f34f1569da4efd658da4f8794ec8afc98fcaa4c42d70eec930a39578811464db

  • SHA512

    b69a5fa2a0ef78eb214707133e0e6780878a618527f87b43060e73823bc4d309fb0ce3384368236c37fda2f034e19d39ec98e8ab5ff91110f6707516b94e0cac

  • SSDEEP

    768:l0jgNvjzk9OmJQqO3VhDWiNlW+O96Qhlq6U9jS+V:lZvXbmJQqO3VhDWii+i6QwjSa

Score
7/10
upx

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\156cd20d7d340614e2394ef5892a7a20_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\156cd20d7d340614e2394ef5892a7a20_NeikiAnalytics.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:464
    • C:\Users\Admin\AppData\Local\Temp\hhcbrnaff.exe
      "C:\Users\Admin\AppData\Local\Temp\hhcbrnaff.exe"
      2⤵
      • Executes dropped EXE
      PID:4460

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\hhcbrnaff.exe

    Filesize

    29KB

    MD5

    96447ddb396a53d6bfe9f1393cd92ceb

    SHA1

    705d7ac606aadb588e149938ccd66dfca092678d

    SHA256

    7ab8cc32661457f2344a511d3203592f6f8874e6f29f770bcb7f79a57ef02e41

    SHA512

    283c64dcf33ec5410cc5db1b975b22fa5241779bb473797e4f4af60a9d82085987cd1b3d05b2cba8817b5c716fcd6b30bc03474c124a9a1fbc0b905ad0bb0bae

  • memory/464-0-0x0000000000400000-0x0000000000410000-memory.dmp

    Filesize

    64KB

  • memory/464-2-0x00000000008B0000-0x00000000008B6000-memory.dmp

    Filesize

    24KB

  • memory/464-11-0x0000000000400000-0x0000000000410000-memory.dmp

    Filesize

    64KB

  • memory/4460-12-0x0000000000670000-0x0000000000676000-memory.dmp

    Filesize

    24KB