Analysis

  • max time kernel
    130s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    17/05/2024, 06:36

General

  • Target

    c31e0327620e1f1bef058ea0b95c1950_NeikiAnalytics.exe

  • Size

    667KB

  • MD5

    c31e0327620e1f1bef058ea0b95c1950

  • SHA1

    86d033fad448fd4f351d5cface6b66e109a5af0a

  • SHA256

    a49e1b12a4126ffe290e6cbf11045e2fa734a0a73c0a7759d9d24ae035e02ace

  • SHA512

    ee37fff37bfe102639a9a587f41cbc01c77951da35258bd22c70d44a4e1d8b0ec9792b858af2f0e2a7cec6b5bb3b14ad044376b69d429adbfe3222616644f1b9

  • SSDEEP

    12288:Zv1nWdQP1EDhZPxNNtoqOFBqkYHFLgufmmV/MkgPAyHv0Z:Z9ndEVf/tpOLlcgJmtSHU

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in Program Files directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c31e0327620e1f1bef058ea0b95c1950_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\c31e0327620e1f1bef058ea0b95c1950_NeikiAnalytics.exe"
    1⤵
    • Checks computer location settings
    • Adds Run key to start application
    • Drops file in Program Files directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:1468
    • C:\Program Files (x86)\Microsoft Build\Isass.exe
      "C:\Program Files (x86)\Microsoft Build\Isass.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      PID:4744
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 4744 -s 856
        3⤵
        • Program crash
        PID:3792
    • C:\Users\Admin\AppData\Local\Temp\AS_c31e0327620e1f1bef058ea0b95c1950_NeikiAnalytics.exe
      "C:\Users\Admin\AppData\Local\Temp\AS_c31e0327620e1f1bef058ea0b95c1950_NeikiAnalytics.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:3936
      • C:\Users\Admin\AppData\Local\Temp\AS_c31e0327620e1f1bef058ea0b95c1950_NeikiAnalytics.exe
        "C:\Users\Admin\AppData\Local\Temp\AS_c31e0327620e1f1bef058ea0b95c1950_NeikiAnalytics.exe" -burn.unelevated BurnPipe.{2C554148-2DB6-4FD5-97F6-CC5222D37662} {41C71547-BACB-4220-B6EC-CBE3EA18B4AE} 3936
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        PID:828
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 4744 -ip 4744
    1⤵
      PID:3012

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Program Files (x86)\Microsoft Build\Isass.exe

            Filesize

            213KB

            MD5

            dbd17a1e3feb7fda6636f516a2428fac

            SHA1

            a271f56161aefc736d300e1e7f6483137223d85e

            SHA256

            748ba2fb0cfec41b31bf732940d9209fd1a888bcb3af1800060e429a5062ded6

            SHA512

            8e45d4279de6061aa8177d80a985daab2b52973752699c5b1f0e615d25c76a8340fff0633fa51c24d24c73f0f4495ce6ca61fe1501f6b325008b8ca97037be85

          • C:\Users\Admin\AppData\Local\Temp\AS_c31e0327620e1f1bef058ea0b95c1950_NeikiAnalytics.exe

            Filesize

            445KB

            MD5

            1191ba2a9908ee79c0220221233e850a

            SHA1

            f2acd26b864b38821ba3637f8f701b8ba19c434f

            SHA256

            4670e1ecb4b136d81148401cd71737ccf1376c772fa513a3e176b8ce8b8f982d

            SHA512

            da61b9baa2f2aedc5ecb1d664368afffe080f76e5d167494cea9f8e72a03a8c2484c24a36d4042a6fd8602ab1adc946546a83fc6a4968dfaa8955e3e3a4c2e50

          • C:\Users\Admin\AppData\Local\Temp\{33d1fd90-4274-48a1-9bc1-97e33d9c2d6f}\.ba1\logo.png

            Filesize

            1KB

            MD5

            d6bd210f227442b3362493d046cea233

            SHA1

            ff286ac8370fc655aea0ef35e9cf0bfcb6d698de

            SHA256

            335a256d4779ec5dcf283d007fb56fd8211bbcaf47dcd70fe60ded6a112744ef

            SHA512

            464aaab9e08de610ad34b97d4076e92dc04c2cdc6669f60bfc50f0f9ce5d71c31b8943bd84cee1a04fb9ab5bbed3442bd41d9cb21a0dd170ea97c463e1ce2b5b

          • C:\Users\Admin\AppData\Local\Temp\{33d1fd90-4274-48a1-9bc1-97e33d9c2d6f}\.ba1\wixstdba.dll

            Filesize

            126KB

            MD5

            d7bf29763354eda154aad637017b5483

            SHA1

            dfa7d296bfeecde738ef4708aaabfebec6bc1e48

            SHA256

            7f5f8fcfd84132579f07e395e65b44e1b031fe01a299bce0e3dd590131c5cb93

            SHA512

            1c76175732fe68b9b12cb46077daa21e086041adbd65401717a9a1b5f3c516e03c35a90897c22c7281647d6af4a1a5ffb3fbd5706ea376d8f6e574d27396019c

          • memory/1468-4-0x0000000000400000-0x00000000016A7000-memory.dmp

            Filesize

            18.7MB

          • memory/1468-7-0x0000000001CF0000-0x0000000001CF1000-memory.dmp

            Filesize

            4KB

          • memory/1468-19-0x0000000000400000-0x00000000016A7000-memory.dmp

            Filesize

            18.7MB

          • memory/4744-6-0x0000000000400000-0x00000000016A7000-memory.dmp

            Filesize

            18.7MB

          • memory/4744-8-0x0000000001B60000-0x0000000001B61000-memory.dmp

            Filesize

            4KB

          • memory/4744-37-0x0000000000400000-0x00000000016A7000-memory.dmp

            Filesize

            18.7MB

          • memory/4744-38-0x0000000000400000-0x00000000016A7000-memory.dmp

            Filesize

            18.7MB

          • memory/4744-39-0x0000000000400000-0x00000000016A7000-memory.dmp

            Filesize

            18.7MB