Analysis
-
max time kernel
146s -
max time network
111s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
20/05/2024, 06:32
Static task
static1
Behavioral task
behavioral1
Sample
c6058a00cacae999a267a691fcef9440_NeikiAnalytics.exe
Resource
win7-20240220-en
General
-
Target
c6058a00cacae999a267a691fcef9440_NeikiAnalytics.exe
-
Size
6.5MB
-
MD5
c6058a00cacae999a267a691fcef9440
-
SHA1
074272aa5d118405dba603e9e51af6ef6af065e7
-
SHA256
120dd0928f8dd9ca10cad3b8e80cced2fc2f5ae6aae635ba4219d04ee6e1b232
-
SHA512
f72c8e526e733e9da56b8d9c578e6337c2e30c493122ed8e927ebcec8f4735209f697e5667bc9f6f6a7f5fc80ceefeb459670bdde975dd25b8bef813a3a8bf53
-
SSDEEP
98304:Roc5swrA2XGxlHKcjTjNk3o659yrnfKtDrKIAyyks+Ctf8mQZVSd:i0LrA2kHKQHNk3og9unipQyOaOd
Malware Config
Extracted
urelas
218.54.31.165
218.54.31.226
Signatures
-
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\Control Panel\International\Geo\Nation c6058a00cacae999a267a691fcef9440_NeikiAnalytics.exe Key value queried \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\Control Panel\International\Geo\Nation adfyg.exe Key value queried \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\Control Panel\International\Geo\Nation tucyys.exe -
Executes dropped EXE 3 IoCs
pid Process 792 adfyg.exe 4436 tucyys.exe 4348 hukov.exe -
resource yara_rule behavioral2/files/0x000900000002342f-64.dat upx behavioral2/memory/4348-70-0x0000000000400000-0x0000000000599000-memory.dmp upx behavioral2/memory/4348-75-0x0000000000400000-0x0000000000599000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 30 IoCs
pid Process 804 c6058a00cacae999a267a691fcef9440_NeikiAnalytics.exe 804 c6058a00cacae999a267a691fcef9440_NeikiAnalytics.exe 792 adfyg.exe 792 adfyg.exe 4436 tucyys.exe 4436 tucyys.exe 4348 hukov.exe 4348 hukov.exe 4348 hukov.exe 4348 hukov.exe 4348 hukov.exe 4348 hukov.exe 4348 hukov.exe 4348 hukov.exe 4348 hukov.exe 4348 hukov.exe 4348 hukov.exe 4348 hukov.exe 4348 hukov.exe 4348 hukov.exe 4348 hukov.exe 4348 hukov.exe 4348 hukov.exe 4348 hukov.exe 4348 hukov.exe 4348 hukov.exe 4348 hukov.exe 4348 hukov.exe 4348 hukov.exe 4348 hukov.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 804 wrote to memory of 792 804 c6058a00cacae999a267a691fcef9440_NeikiAnalytics.exe 82 PID 804 wrote to memory of 792 804 c6058a00cacae999a267a691fcef9440_NeikiAnalytics.exe 82 PID 804 wrote to memory of 792 804 c6058a00cacae999a267a691fcef9440_NeikiAnalytics.exe 82 PID 804 wrote to memory of 3160 804 c6058a00cacae999a267a691fcef9440_NeikiAnalytics.exe 83 PID 804 wrote to memory of 3160 804 c6058a00cacae999a267a691fcef9440_NeikiAnalytics.exe 83 PID 804 wrote to memory of 3160 804 c6058a00cacae999a267a691fcef9440_NeikiAnalytics.exe 83 PID 792 wrote to memory of 4436 792 adfyg.exe 87 PID 792 wrote to memory of 4436 792 adfyg.exe 87 PID 792 wrote to memory of 4436 792 adfyg.exe 87 PID 4436 wrote to memory of 4348 4436 tucyys.exe 102 PID 4436 wrote to memory of 4348 4436 tucyys.exe 102 PID 4436 wrote to memory of 4348 4436 tucyys.exe 102 PID 4436 wrote to memory of 4456 4436 tucyys.exe 103 PID 4436 wrote to memory of 4456 4436 tucyys.exe 103 PID 4436 wrote to memory of 4456 4436 tucyys.exe 103
Processes
-
C:\Users\Admin\AppData\Local\Temp\c6058a00cacae999a267a691fcef9440_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\c6058a00cacae999a267a691fcef9440_NeikiAnalytics.exe"1⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:804 -
C:\Users\Admin\AppData\Local\Temp\adfyg.exe"C:\Users\Admin\AppData\Local\Temp\adfyg.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:792 -
C:\Users\Admin\AppData\Local\Temp\tucyys.exe"C:\Users\Admin\AppData\Local\Temp\tucyys.exe" OK3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4436 -
C:\Users\Admin\AppData\Local\Temp\hukov.exe"C:\Users\Admin\AppData\Local\Temp\hukov.exe"4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:4348
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\_vslite.bat" "4⤵PID:4456
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\_vslite.bat" "2⤵PID:3160
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
224B
MD59fa19097c0b3260ad4d43e9ee24c749e
SHA145b168f8e5d32b4e9ef3fee3f23d6f11d116f077
SHA256769b7c1d0029b86ad1332738f1da369019e436e691e5bf0c5a1a2dffacc31601
SHA512c7d3a5f54c8601ee755ee4c43c001080ce06718f8ac672a61474df494827fcc5885a0f130b8d83bd627d1df59b781853bb14340c8007fc1838b1d28eb021ff38
-
Filesize
306B
MD5373752cfed4c4a093273e28d5bd30f8c
SHA153e97af50369ac8940adb084d2de9d6851f8361e
SHA2567c793fda2e374ca930cb7ff3f8fccff248680a4f627bce4a1242496d4a0cf3ae
SHA512bd936fd71122007f3e22bfbc471364406fa2545da079f18769508c136af63846fdb18c40265c8beef15c59bf4e912a51a87b2b8ab005dc979577dd287d3ecea0
-
Filesize
6.5MB
MD595f7e322170251fca3543f8eb3a10b30
SHA17f023941b5354dc12160b4b2c3a3de3df41715e6
SHA2564a10031a046aaf8d93bb60b6696113f16a58e3bd3634c4afbff66fafbabe9e66
SHA512e531603116486b69533c15462756d0922c13e33a15c8a2b5f2aa699b99d067c28340c82d0e44aa16ed0f4d57caf9afce0782582cf042df3559e2057de4da70bf
-
Filesize
104B
MD5dbef593bccc2049f860f718cd6fec321
SHA1e7e9f8235b4eb70aa99dd2c38009f2152575a8d0
SHA25630f820bb1ca6c20bcd77113c7377e01f31cdf0ec5b64864f22887d41a9bf3c7a
SHA5123e87c661c343b72f5dff4587b99688dbf655be9d6d903a75151bd9f204f55858e90388591f660bcbded5278ef94e322bf3e7c57374c9b16fce1eef7082395a2a
-
Filesize
512B
MD5e4ee32682fd1b6307044ba97ac0b1848
SHA16b16ad8bf3ab91068fdf94002f427e3d3ed70542
SHA25645e3d0a775e7540a9bfa5c5cb5fe08ab9b24ae33ffd1494920fcf8c43bb97211
SHA51240461c55eeb46bdb68ec867391b761fb3395b9b58366bdb2af3d09567ad346470e0f645da39365628c86bbd785edd772c24249a7b5e5d3fa93de8c80ba70a648
-
Filesize
459KB
MD5e37696f281d5402526bbd5cb595b131f
SHA11881d69ab675ea31f22a94dc2d1f3ac32e53e920
SHA2567e745df81919e9381078a144ff2c2610b5819fbbdfc99646757c984d2df45354
SHA5120817c1a5d758c6de107f47181686d4971f243d4069b22f9378a48bb0ba90af8f5cd638b9275cd9b6dcd02e872bc20fd84ae2361bb04092ae9dfcbefde89cab9e