Analysis
-
max time kernel
130s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
17/05/2024, 06:36
Static task
static1
Behavioral task
behavioral1
Sample
c31e0327620e1f1bef058ea0b95c1950_NeikiAnalytics.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
c31e0327620e1f1bef058ea0b95c1950_NeikiAnalytics.exe
Resource
win10v2004-20240426-en
General
-
Target
c31e0327620e1f1bef058ea0b95c1950_NeikiAnalytics.exe
-
Size
667KB
-
MD5
c31e0327620e1f1bef058ea0b95c1950
-
SHA1
86d033fad448fd4f351d5cface6b66e109a5af0a
-
SHA256
a49e1b12a4126ffe290e6cbf11045e2fa734a0a73c0a7759d9d24ae035e02ace
-
SHA512
ee37fff37bfe102639a9a587f41cbc01c77951da35258bd22c70d44a4e1d8b0ec9792b858af2f0e2a7cec6b5bb3b14ad044376b69d429adbfe3222616644f1b9
-
SSDEEP
12288:Zv1nWdQP1EDhZPxNNtoqOFBqkYHFLgufmmV/MkgPAyHv0Z:Z9ndEVf/tpOLlcgJmtSHU
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\Control Panel\International\Geo\Nation c31e0327620e1f1bef058ea0b95c1950_NeikiAnalytics.exe -
Executes dropped EXE 3 IoCs
pid Process 4744 Isass.exe 3936 AS_c31e0327620e1f1bef058ea0b95c1950_NeikiAnalytics.exe 828 AS_c31e0327620e1f1bef058ea0b95c1950_NeikiAnalytics.exe -
Loads dropped DLL 1 IoCs
pid Process 828 AS_c31e0327620e1f1bef058ea0b95c1950_NeikiAnalytics.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Isass.exe = "C:\\Program Files (x86)\\Microsoft Build\\Isass.exe" c31e0327620e1f1bef058ea0b95c1950_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Isass.exe = "C:\\Program Files (x86)\\Microsoft Build\\Isass.exe" c31e0327620e1f1bef058ea0b95c1950_NeikiAnalytics.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files (x86)\Microsoft Build\Isass.exe c31e0327620e1f1bef058ea0b95c1950_NeikiAnalytics.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 3792 4744 WerFault.exe 83 -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1468 c31e0327620e1f1bef058ea0b95c1950_NeikiAnalytics.exe 1468 c31e0327620e1f1bef058ea0b95c1950_NeikiAnalytics.exe 4744 Isass.exe 4744 Isass.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1468 wrote to memory of 4744 1468 c31e0327620e1f1bef058ea0b95c1950_NeikiAnalytics.exe 83 PID 1468 wrote to memory of 4744 1468 c31e0327620e1f1bef058ea0b95c1950_NeikiAnalytics.exe 83 PID 1468 wrote to memory of 4744 1468 c31e0327620e1f1bef058ea0b95c1950_NeikiAnalytics.exe 83 PID 1468 wrote to memory of 3936 1468 c31e0327620e1f1bef058ea0b95c1950_NeikiAnalytics.exe 84 PID 1468 wrote to memory of 3936 1468 c31e0327620e1f1bef058ea0b95c1950_NeikiAnalytics.exe 84 PID 1468 wrote to memory of 3936 1468 c31e0327620e1f1bef058ea0b95c1950_NeikiAnalytics.exe 84 PID 3936 wrote to memory of 828 3936 AS_c31e0327620e1f1bef058ea0b95c1950_NeikiAnalytics.exe 85 PID 3936 wrote to memory of 828 3936 AS_c31e0327620e1f1bef058ea0b95c1950_NeikiAnalytics.exe 85 PID 3936 wrote to memory of 828 3936 AS_c31e0327620e1f1bef058ea0b95c1950_NeikiAnalytics.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\c31e0327620e1f1bef058ea0b95c1950_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\c31e0327620e1f1bef058ea0b95c1950_NeikiAnalytics.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1468 -
C:\Program Files (x86)\Microsoft Build\Isass.exe"C:\Program Files (x86)\Microsoft Build\Isass.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:4744 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4744 -s 8563⤵
- Program crash
PID:3792
-
-
-
C:\Users\Admin\AppData\Local\Temp\AS_c31e0327620e1f1bef058ea0b95c1950_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\AS_c31e0327620e1f1bef058ea0b95c1950_NeikiAnalytics.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3936 -
C:\Users\Admin\AppData\Local\Temp\AS_c31e0327620e1f1bef058ea0b95c1950_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\AS_c31e0327620e1f1bef058ea0b95c1950_NeikiAnalytics.exe" -burn.unelevated BurnPipe.{2C554148-2DB6-4FD5-97F6-CC5222D37662} {41C71547-BACB-4220-B6EC-CBE3EA18B4AE} 39363⤵
- Executes dropped EXE
- Loads dropped DLL
PID:828
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 4744 -ip 47441⤵PID:3012
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
213KB
MD5dbd17a1e3feb7fda6636f516a2428fac
SHA1a271f56161aefc736d300e1e7f6483137223d85e
SHA256748ba2fb0cfec41b31bf732940d9209fd1a888bcb3af1800060e429a5062ded6
SHA5128e45d4279de6061aa8177d80a985daab2b52973752699c5b1f0e615d25c76a8340fff0633fa51c24d24c73f0f4495ce6ca61fe1501f6b325008b8ca97037be85
-
Filesize
445KB
MD51191ba2a9908ee79c0220221233e850a
SHA1f2acd26b864b38821ba3637f8f701b8ba19c434f
SHA2564670e1ecb4b136d81148401cd71737ccf1376c772fa513a3e176b8ce8b8f982d
SHA512da61b9baa2f2aedc5ecb1d664368afffe080f76e5d167494cea9f8e72a03a8c2484c24a36d4042a6fd8602ab1adc946546a83fc6a4968dfaa8955e3e3a4c2e50
-
Filesize
1KB
MD5d6bd210f227442b3362493d046cea233
SHA1ff286ac8370fc655aea0ef35e9cf0bfcb6d698de
SHA256335a256d4779ec5dcf283d007fb56fd8211bbcaf47dcd70fe60ded6a112744ef
SHA512464aaab9e08de610ad34b97d4076e92dc04c2cdc6669f60bfc50f0f9ce5d71c31b8943bd84cee1a04fb9ab5bbed3442bd41d9cb21a0dd170ea97c463e1ce2b5b
-
Filesize
126KB
MD5d7bf29763354eda154aad637017b5483
SHA1dfa7d296bfeecde738ef4708aaabfebec6bc1e48
SHA2567f5f8fcfd84132579f07e395e65b44e1b031fe01a299bce0e3dd590131c5cb93
SHA5121c76175732fe68b9b12cb46077daa21e086041adbd65401717a9a1b5f3c516e03c35a90897c22c7281647d6af4a1a5ffb3fbd5706ea376d8f6e574d27396019c