Analysis

  • max time kernel
    163s
  • max time network
    177s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19-05-2024 19:17

General

  • Target

    217666beef3a41d0caa8033721e4e430_NeikiAnalytics.exe

  • Size

    144KB

  • MD5

    217666beef3a41d0caa8033721e4e430

  • SHA1

    9510a3c797b954c6568bf32b26c494e735d1b90f

  • SHA256

    636af629e9014596da13895a9449d6752d69c0386166f7b62bb3ef8707360dd2

  • SHA512

    5f030ebaf11a8d9ad9e3b061bf1ee549c809b6697bd6f2fb565bcf58baebbb9e5492b31f94c88cda03f42e59d3824f5930b058fa26fdcdf678e8b0d6205828db

  • SSDEEP

    3072:l5SVkkgUgXC7AdYzrV+Dljy/32ubwZ/qJ:SUFCkdYzrVolu/J0Z/

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • UPX packed file 7 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\217666beef3a41d0caa8033721e4e430_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\217666beef3a41d0caa8033721e4e430_NeikiAnalytics.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4336
    • C:\Users\Admin\AppData\Local\Temp\217666beef3a41d0caa8033721e4e430_NeikiAnalytics.exe
      "C:\Users\Admin\AppData\Local\Temp\217666beef3a41d0caa8033721e4e430_NeikiAnalytics.exe"
      2⤵
      • Checks computer location settings
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2852
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\PQNVH.bat" "
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:4492
        • C:\Windows\SysWOW64\reg.exe
          REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "sidebar" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\SystemWindows\WindowsService.exe" /f
          4⤵
          • Adds Run key to start application
          PID:712
      • C:\Users\Admin\AppData\Roaming\SystemWindows\WindowsService.exe
        "C:\Users\Admin\AppData\Roaming\SystemWindows\WindowsService.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        PID:2096
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3704 --field-trial-handle=3192,i,2785050981002401924,4037047756083432660,262144 --variations-seed-version /prefetch:8
    1⤵
      PID:1264

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\PQNVH.txt

      Filesize

      157B

      MD5

      f6a90c20834f271a907a4e2bc28184c2

      SHA1

      36c9d1602b74f622346fbb22693597d7889df48d

      SHA256

      73f29cd953eee40cea4de67842556ffd96efe8094a6a9b70f33a35df2582febd

      SHA512

      39cabae19fe1faa37455e4bd242c868be60d6252b07f01224b3f7501c3cf734e503300b840d83381a452707cab6df2f95f920655884be56d4024676b26943804

    • C:\Users\Admin\AppData\Roaming\SystemWindows\WindowsService.exe

      Filesize

      144KB

      MD5

      795d4f62f0b30a6d64faefe5931faaa5

      SHA1

      921b497d2c4199abb5df6cca33dd2afe79fa4675

      SHA256

      a17c2df755a0112514de298b7f7a2308ea4b6247ee21a43d6ddb87fc7ac84658

      SHA512

      dcd29ef081778d5961909130cfa227624e1dd22958ff6054b9c71b6583591d1b7fc0b8732a4eb179c765ff04a307a76296119271e957472b66c5d654f1d620b2

    • memory/2852-4-0x0000000000400000-0x000000000040B000-memory.dmp

      Filesize

      44KB

    • memory/2852-6-0x0000000000400000-0x000000000040B000-memory.dmp

      Filesize

      44KB

    • memory/2852-7-0x0000000000400000-0x000000000040B000-memory.dmp

      Filesize

      44KB

    • memory/2852-10-0x0000000000400000-0x000000000040B000-memory.dmp

      Filesize

      44KB

    • memory/2852-17-0x0000000000400000-0x000000000040B000-memory.dmp

      Filesize

      44KB

    • memory/2852-24-0x0000000000400000-0x000000000040B000-memory.dmp

      Filesize

      44KB

    • memory/2852-39-0x0000000000400000-0x000000000040B000-memory.dmp

      Filesize

      44KB

    • memory/4336-3-0x00000000009A0000-0x00000000009A1000-memory.dmp

      Filesize

      4KB

    • memory/4336-2-0x0000000000920000-0x0000000000921000-memory.dmp

      Filesize

      4KB