Analysis
-
max time kernel
148s -
max time network
111s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
20-05-2024 00:47
Static task
static1
Behavioral task
behavioral1
Sample
73703a76038fe2122ee90b1f6d129480_NeikiAnalytics.exe
Resource
win7-20240419-en
General
-
Target
73703a76038fe2122ee90b1f6d129480_NeikiAnalytics.exe
-
Size
6.4MB
-
MD5
73703a76038fe2122ee90b1f6d129480
-
SHA1
63b06bd4186b57760ce4928ab3d949b7455ae0b9
-
SHA256
14152d01b686c518ee44af7a29c8db8737139e932b454a3779982c0047543210
-
SHA512
1204f9ebde8673e081ea069a9f4e56c2c53d7a3525dbd5a51e12b29b8c106383ce9a53f5c3135fa48b82906a1e0229cca55adfe8c9acd6346e858646d54a72aa
-
SSDEEP
98304:Roc5swrA2XGxlHKcjTjNk3o659yrnfKtDrKIAyyks+Ctf8mQZVSo:i0LrA2kHKQHNk3og9unipQyOaOo
Malware Config
Extracted
urelas
218.54.31.165
218.54.31.226
Signatures
-
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
73703a76038fe2122ee90b1f6d129480_NeikiAnalytics.exebatod.exedorylo.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation 73703a76038fe2122ee90b1f6d129480_NeikiAnalytics.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation batod.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation dorylo.exe -
Executes dropped EXE 3 IoCs
Processes:
batod.exedorylo.exeowsei.exepid process 2476 batod.exe 5060 dorylo.exe 3428 owsei.exe -
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\owsei.exe upx behavioral2/memory/3428-69-0x0000000000400000-0x0000000000599000-memory.dmp upx behavioral2/memory/3428-73-0x0000000000400000-0x0000000000599000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 30 IoCs
Processes:
73703a76038fe2122ee90b1f6d129480_NeikiAnalytics.exebatod.exedorylo.exeowsei.exepid process 3160 73703a76038fe2122ee90b1f6d129480_NeikiAnalytics.exe 3160 73703a76038fe2122ee90b1f6d129480_NeikiAnalytics.exe 2476 batod.exe 2476 batod.exe 5060 dorylo.exe 5060 dorylo.exe 3428 owsei.exe 3428 owsei.exe 3428 owsei.exe 3428 owsei.exe 3428 owsei.exe 3428 owsei.exe 3428 owsei.exe 3428 owsei.exe 3428 owsei.exe 3428 owsei.exe 3428 owsei.exe 3428 owsei.exe 3428 owsei.exe 3428 owsei.exe 3428 owsei.exe 3428 owsei.exe 3428 owsei.exe 3428 owsei.exe 3428 owsei.exe 3428 owsei.exe 3428 owsei.exe 3428 owsei.exe 3428 owsei.exe 3428 owsei.exe -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
73703a76038fe2122ee90b1f6d129480_NeikiAnalytics.exebatod.exedorylo.exedescription pid process target process PID 3160 wrote to memory of 2476 3160 73703a76038fe2122ee90b1f6d129480_NeikiAnalytics.exe batod.exe PID 3160 wrote to memory of 2476 3160 73703a76038fe2122ee90b1f6d129480_NeikiAnalytics.exe batod.exe PID 3160 wrote to memory of 2476 3160 73703a76038fe2122ee90b1f6d129480_NeikiAnalytics.exe batod.exe PID 3160 wrote to memory of 3244 3160 73703a76038fe2122ee90b1f6d129480_NeikiAnalytics.exe cmd.exe PID 3160 wrote to memory of 3244 3160 73703a76038fe2122ee90b1f6d129480_NeikiAnalytics.exe cmd.exe PID 3160 wrote to memory of 3244 3160 73703a76038fe2122ee90b1f6d129480_NeikiAnalytics.exe cmd.exe PID 2476 wrote to memory of 5060 2476 batod.exe dorylo.exe PID 2476 wrote to memory of 5060 2476 batod.exe dorylo.exe PID 2476 wrote to memory of 5060 2476 batod.exe dorylo.exe PID 5060 wrote to memory of 3428 5060 dorylo.exe owsei.exe PID 5060 wrote to memory of 3428 5060 dorylo.exe owsei.exe PID 5060 wrote to memory of 3428 5060 dorylo.exe owsei.exe PID 5060 wrote to memory of 3276 5060 dorylo.exe cmd.exe PID 5060 wrote to memory of 3276 5060 dorylo.exe cmd.exe PID 5060 wrote to memory of 3276 5060 dorylo.exe cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\73703a76038fe2122ee90b1f6d129480_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\73703a76038fe2122ee90b1f6d129480_NeikiAnalytics.exe"1⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3160 -
C:\Users\Admin\AppData\Local\Temp\batod.exe"C:\Users\Admin\AppData\Local\Temp\batod.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2476 -
C:\Users\Admin\AppData\Local\Temp\dorylo.exe"C:\Users\Admin\AppData\Local\Temp\dorylo.exe" OK3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:5060 -
C:\Users\Admin\AppData\Local\Temp\owsei.exe"C:\Users\Admin\AppData\Local\Temp\owsei.exe"4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:3428
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\_vslite.bat" "4⤵PID:3276
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\_vslite.bat" "2⤵PID:3244
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
224B
MD5c578f6fd049d4db8587c3b6bb5b1721f
SHA121db1e5d2c68731cb51c4d86c08d9516bfe0fd36
SHA25659d851c9065b250a0f79f8fdad61b40b7befd2152c3642aad424191c9d132bfe
SHA5121f42ee9b3f16213256443be7ecdfa8d51344896663f8780d92357bc8c4be1e41579beb98cbf4f1bda0960bee6054b16ab02c70a3b10f18dd23d01b338b47bd44
-
Filesize
306B
MD51baaa061ff356a7b895835a6ab6c73dc
SHA1e842cc08e9a3af67e66b4f02940812c7da0b4c69
SHA256f507bc818680114064c3331696c0eb9313fc3445381091fb431af25d6b3cb046
SHA5123e8cb2c8889ace586c3a70a973579f17c561dafaaa26aabfd415ef1dc23d1995493479a5cb96f7e1a77d2d1e9b46e61890a650d8d0fa9a8d6b7068f94e619014
-
Filesize
6.4MB
MD5f2883c8c0372401cbd020fdacdca76cd
SHA11510547707c555a9b705506311553673e2600f7b
SHA2569aba1d3a69bfc4630420d6c530c54ce61eb4c51b1ca0ce074fad66ca54072861
SHA512fd428d6d7bd4be49c871c7c4f3e7cb2395b58ea29c38588f66156179ec3b606b77bf8f946fc393a2598f5c7b4494f22f5e5b791add683c7f612da36d185c32f2
-
Filesize
104B
MD5dbef593bccc2049f860f718cd6fec321
SHA1e7e9f8235b4eb70aa99dd2c38009f2152575a8d0
SHA25630f820bb1ca6c20bcd77113c7377e01f31cdf0ec5b64864f22887d41a9bf3c7a
SHA5123e87c661c343b72f5dff4587b99688dbf655be9d6d903a75151bd9f204f55858e90388591f660bcbded5278ef94e322bf3e7c57374c9b16fce1eef7082395a2a
-
Filesize
512B
MD5a8f1a03704e34170a926e181d34b25c4
SHA15a0cb4b73d96135c3506a7ab3b2e42bd019a6895
SHA25632b0bb647d6d0e3252ac18f657a9ff89182c74f52ec1a9aaa8d082d01dd311cc
SHA512c1ef96062923b23ebf6b5c2422afdc8ec4bc61ab52e8fc2085e10e149166c99b3b8f1fdf5416025849d8721132473115ba24c03eafd4918c79327b5ef47e75e6
-
Filesize
459KB
MD5cf82b957995c84c40e2484421878d68d
SHA155f88f7dc154dc7af9a2d1806ddf3d873e945a65
SHA256c1c078f4fa8387cbd13fa3424a54112c748a720f992f3014199050cd474a33b6
SHA51268d5b6c0d2a26f7df51319551e760362b5f7bb2c2b1430d98117b466519b0a7d61019e3f6a1ff9305738499d724e8b2a7dc9c80a84fe4f18cb00181112cbb1f0