Analysis

  • max time kernel
    150s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    16-05-2024 11:04

General

  • Target

    dbd4b7876a77f48240518ce1217c3420_NeikiAnalytics.exe

  • Size

    53KB

  • MD5

    dbd4b7876a77f48240518ce1217c3420

  • SHA1

    7f9b7902d9d113d2a50243096f59cd4128bdc0c8

  • SHA256

    8b0f74da6c473134fec04a650c7e8b31d3c59351c8fc955fdfef46192dc36484

  • SHA512

    d16e003200a932e1bd62d4f1775c6ee16b6595a1f2630c27ad982280e11f107899f03d3c806de9191b75b81a938e042f129bfb12b2be71b6e95f31c9e2d8fad4

  • SSDEEP

    1536:vNIg8r8Q3LFLr7Kp3StjEMjmLM3ztDJWZsXy4JzxPM0:ALFLrJJjmLM3zRJWZsXy4Jd

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\dbd4b7876a77f48240518ce1217c3420_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\dbd4b7876a77f48240518ce1217c3420_NeikiAnalytics.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:64
    • C:\Users\Admin\youvoo.exe
      "C:\Users\Admin\youvoo.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2840

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\youvoo.exe

    Filesize

    53KB

    MD5

    af8d318fa8aa1f0fdf28fc1754e60b0e

    SHA1

    ce0395bc21413a4d15238b08a179e58ca860a720

    SHA256

    7470602ce3a5c025cbc717aee4a6b5c95cdf8048bd9632118cf30bdfe08085b3

    SHA512

    2888c145f4054cdcee1ac27f64cb6bc469050cd83d0ee4a91b435daa9e8b6141c68e3abdf94c7ded70b9032cfa6e609e25503909f1fd10d0aa07ea89f3c381eb

  • memory/64-0-0x0000000000400000-0x0000000000412000-memory.dmp

    Filesize

    72KB

  • memory/2840-34-0x0000000000400000-0x0000000000412000-memory.dmp

    Filesize

    72KB