Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    17/05/2024, 02:47

General

  • Target

    8f0cc955182217fd43ddbbce80ad6620_NeikiAnalytics.exe

  • Size

    26KB

  • MD5

    8f0cc955182217fd43ddbbce80ad6620

  • SHA1

    ac308dbf78a6e7431cd64425d4bbc31a73b4ed3d

  • SHA256

    27bda8cbd868b4e275f71e52fce92e231867f17ee6e556011c6d88fe6c90a298

  • SHA512

    08c0897eee87608af51956c2896069a9b077eb02980de4e3dba8145d2cd005de49455715f497d717a4853ef1c84475bd7ba967c8281c61200c4a3b19f5506642

  • SSDEEP

    384:WQoEmqWUIncBpEzjvehQtFx7UJxlfS+Ui0MX97n+Kt7P:WQEqsncbKjWutz7axlfSri/XxTJP

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8f0cc955182217fd43ddbbce80ad6620_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\8f0cc955182217fd43ddbbce80ad6620_NeikiAnalytics.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:4984
    • C:\Users\Admin\AppData\Local\Temp\psie.exe
      "C:\Users\Admin\AppData\Local\Temp\psie.exe"
      2⤵
      • Executes dropped EXE
      PID:5076

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\psie.exe

    Filesize

    27KB

    MD5

    e0639c4488f88fc0b247593b0c3374a5

    SHA1

    3aa1603461f70024787160495d8fc8e6877ba655

    SHA256

    e401918054277a58947769164202005c9fcc950a24069acca61e134b2af01e32

    SHA512

    af827b07c71ede49d2692ec4dbeca2ec5c8ed2de10fcf4dc65588da2daaa59e1be42ca3048523db4aa853fb54cf4765b6be13fa3d01179a07434175284b6ebdb

  • memory/4984-0-0x0000000000400000-0x0000000000407000-memory.dmp

    Filesize

    28KB

  • memory/4984-2-0x0000000000401000-0x0000000000402000-memory.dmp

    Filesize

    4KB

  • memory/4984-10-0x0000000000400000-0x0000000000407000-memory.dmp

    Filesize

    28KB

  • memory/5076-11-0x0000000000400000-0x0000000000407000-memory.dmp

    Filesize

    28KB