Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    17-05-2024 08:04

General

  • Target

    d721953e4904b65f2c9262fc7d229970_NeikiAnalytics.exe

  • Size

    31KB

  • MD5

    d721953e4904b65f2c9262fc7d229970

  • SHA1

    3a833a0c1000b88db5f576810c29991bbc3ad749

  • SHA256

    9ffe15991f0c99f80d72ffe3d5d573407fc6aa4ef62d28d03357cbc22cd574cb

  • SHA512

    b3baf21aabb1a96d65d5b1a01a324de6f3474f3a5411a6da6bf9eba710c54edce2e2bf8d7f1bbb48fb012835a2365d966259b11b142909f7ad8a65b045ca0324

  • SSDEEP

    192:KlApk98m4e0/IDJh/5ZQcvoyne4t/PQ3Pw1C0SluWbiWBNEckcVhJriEc9ht/Rbt:MApc8m4e0GvQak4JI341C0abnk6hJPHG

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Drops file in System32 directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d721953e4904b65f2c9262fc7d229970_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\d721953e4904b65f2c9262fc7d229970_NeikiAnalytics.exe"
    1⤵
    • Checks computer location settings
    • Drops file in System32 directory
    • Suspicious use of WriteProcessMemory
    PID:752
    • C:\windows\SysWOW64\sal.exe
      "C:\windows\system32\sal.exe"
      2⤵
      • Executes dropped EXE
      PID:2432

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\sal.exe

    Filesize

    32KB

    MD5

    a6239ddbd14cf4a37c259b536cbaae61

    SHA1

    fb7adbe59f52e6fda362b0af6fee0ff5787c94ac

    SHA256

    66245d499d8db6ea71893bcf1dbfd443d2d2984ab0fe9bdbcaa4cb52fffcec66

    SHA512

    ad3323a3c583ce209f39b64c96565bb560f2357a8572241d433e37cbf9e8d5cf6d78da2bb4138c845e10850a213c947e82a313c975caf4f0cde0da697a27d2a0

  • memory/752-0-0x0000000000400000-0x0000000000409000-memory.dmp

    Filesize

    36KB

  • memory/752-9-0x0000000000400000-0x0000000000409000-memory.dmp

    Filesize

    36KB

  • memory/2432-10-0x0000000000400000-0x0000000000409000-memory.dmp

    Filesize

    36KB