Analysis
-
max time kernel
147s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
19/05/2024, 19:54
Behavioral task
behavioral1
Sample
2993f9f3de9d6970c92c98339ace7fc0_NeikiAnalytics.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
2993f9f3de9d6970c92c98339ace7fc0_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
2993f9f3de9d6970c92c98339ace7fc0_NeikiAnalytics.exe
-
Size
39KB
-
MD5
2993f9f3de9d6970c92c98339ace7fc0
-
SHA1
74699afbc7a9d5fd0add201f707554c647177d8e
-
SHA256
abb7c0224b3829bb35d7e50633e9cc45830c26e79a703c61316b3a1b1b186456
-
SHA512
d51e4bfd42b99e4beb466370c6608d5c6b43637f7f9329c377ebaf00cff4e68b9a4c50d7f275de881b0bfe2d7eadcde0fe3d747ef6694091a84a487140fdc874
-
SSDEEP
768:q7PdFecFS5agQtOOtEvwDpjeMLZdzuqpXsiE8Wq/DpkITYXi:qDdFJy3QMOtEvwDpjjWMl7TD
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation 2993f9f3de9d6970c92c98339ace7fc0_NeikiAnalytics.exe -
Executes dropped EXE 1 IoCs
pid Process 3508 asih.exe -
resource yara_rule behavioral2/memory/4524-0-0x0000000000500000-0x0000000000510000-memory.dmp upx behavioral2/files/0x0008000000022f51-13.dat upx behavioral2/memory/4524-16-0x0000000000500000-0x0000000000510000-memory.dmp upx behavioral2/memory/3508-26-0x0000000000500000-0x0000000000510000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4524 wrote to memory of 3508 4524 2993f9f3de9d6970c92c98339ace7fc0_NeikiAnalytics.exe 83 PID 4524 wrote to memory of 3508 4524 2993f9f3de9d6970c92c98339ace7fc0_NeikiAnalytics.exe 83 PID 4524 wrote to memory of 3508 4524 2993f9f3de9d6970c92c98339ace7fc0_NeikiAnalytics.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\2993f9f3de9d6970c92c98339ace7fc0_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\2993f9f3de9d6970c92c98339ace7fc0_NeikiAnalytics.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4524 -
C:\Users\Admin\AppData\Local\Temp\asih.exe"C:\Users\Admin\AppData\Local\Temp\asih.exe"2⤵
- Executes dropped EXE
PID:3508
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
39KB
MD55d3ca4b3ef15429bf6228fa99908cb01
SHA172b1c52c0eb7f388f2cb3f765556e7835fdd14c4
SHA25655e8515073d1746c395a9db5061e09c0635f36abfe8ed8b5fe481cb6d3c4d49a
SHA5121c612419c26d0b2476f92f6289769e26df1870788a983828810239d68d236ee3626a6e545a783bcfa76b75c9b7fcd60588d476a5b8a63647b48cf87853a3e662