Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
17/05/2024, 02:47
Static task
static1
Behavioral task
behavioral1
Sample
8f0cc955182217fd43ddbbce80ad6620_NeikiAnalytics.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
8f0cc955182217fd43ddbbce80ad6620_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
8f0cc955182217fd43ddbbce80ad6620_NeikiAnalytics.exe
-
Size
26KB
-
MD5
8f0cc955182217fd43ddbbce80ad6620
-
SHA1
ac308dbf78a6e7431cd64425d4bbc31a73b4ed3d
-
SHA256
27bda8cbd868b4e275f71e52fce92e231867f17ee6e556011c6d88fe6c90a298
-
SHA512
08c0897eee87608af51956c2896069a9b077eb02980de4e3dba8145d2cd005de49455715f497d717a4853ef1c84475bd7ba967c8281c61200c4a3b19f5506642
-
SSDEEP
384:WQoEmqWUIncBpEzjvehQtFx7UJxlfS+Ui0MX97n+Kt7P:WQEqsncbKjWutz7axlfSri/XxTJP
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation 8f0cc955182217fd43ddbbce80ad6620_NeikiAnalytics.exe -
Executes dropped EXE 1 IoCs
pid Process 5076 psie.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4984 wrote to memory of 5076 4984 8f0cc955182217fd43ddbbce80ad6620_NeikiAnalytics.exe 83 PID 4984 wrote to memory of 5076 4984 8f0cc955182217fd43ddbbce80ad6620_NeikiAnalytics.exe 83 PID 4984 wrote to memory of 5076 4984 8f0cc955182217fd43ddbbce80ad6620_NeikiAnalytics.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\8f0cc955182217fd43ddbbce80ad6620_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\8f0cc955182217fd43ddbbce80ad6620_NeikiAnalytics.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4984 -
C:\Users\Admin\AppData\Local\Temp\psie.exe"C:\Users\Admin\AppData\Local\Temp\psie.exe"2⤵
- Executes dropped EXE
PID:5076
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
27KB
MD5e0639c4488f88fc0b247593b0c3374a5
SHA13aa1603461f70024787160495d8fc8e6877ba655
SHA256e401918054277a58947769164202005c9fcc950a24069acca61e134b2af01e32
SHA512af827b07c71ede49d2692ec4dbeca2ec5c8ed2de10fcf4dc65588da2daaa59e1be42ca3048523db4aa853fb54cf4765b6be13fa3d01179a07434175284b6ebdb