Analysis
-
max time kernel
148s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
20-05-2024 10:58
Static task
static1
Behavioral task
behavioral1
Sample
ee580f8e3dcf7d6c190ca6abc9701710_NeikiAnalytics.exe
Resource
win7-20240221-en
General
-
Target
ee580f8e3dcf7d6c190ca6abc9701710_NeikiAnalytics.exe
-
Size
303KB
-
MD5
ee580f8e3dcf7d6c190ca6abc9701710
-
SHA1
206dc993a3f9913d0cd311671d5465e51e08a1ff
-
SHA256
6a7ad66f4faea33e17f7bf9fb448f394e915db72c023378c3059d10def6f85f3
-
SHA512
4153b2ee6d910712e9fc8f06eb55c8f6723ae6c005146bb4bc4b084609fff57991afcb24005d370f6f34c696c0d7dc42766e7654148ccbbd5ca4385fcfbfbfbd
-
SSDEEP
3072:4t6QKbh9RhLwFKDsxPZXL+fGVYVD/gSg+xM+L6BxiS7y2A2h6LPGd3/r5u8UyXiT:45KT2KQxP8nD/YYM+eP3prqPGdPZo
Malware Config
Extracted
gcleaner
185.172.128.90
5.42.64.56
5.42.65.64
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
ee580f8e3dcf7d6c190ca6abc9701710_NeikiAnalytics.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation ee580f8e3dcf7d6c190ca6abc9701710_NeikiAnalytics.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 9 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 2512 228 WerFault.exe ee580f8e3dcf7d6c190ca6abc9701710_NeikiAnalytics.exe 880 228 WerFault.exe ee580f8e3dcf7d6c190ca6abc9701710_NeikiAnalytics.exe 1188 228 WerFault.exe ee580f8e3dcf7d6c190ca6abc9701710_NeikiAnalytics.exe 5092 228 WerFault.exe ee580f8e3dcf7d6c190ca6abc9701710_NeikiAnalytics.exe 4704 228 WerFault.exe ee580f8e3dcf7d6c190ca6abc9701710_NeikiAnalytics.exe 4008 228 WerFault.exe ee580f8e3dcf7d6c190ca6abc9701710_NeikiAnalytics.exe 1552 228 WerFault.exe ee580f8e3dcf7d6c190ca6abc9701710_NeikiAnalytics.exe 3744 228 WerFault.exe ee580f8e3dcf7d6c190ca6abc9701710_NeikiAnalytics.exe 2208 228 WerFault.exe ee580f8e3dcf7d6c190ca6abc9701710_NeikiAnalytics.exe -
Kills process with taskkill 1 IoCs
Processes:
taskkill.exepid process 5108 taskkill.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
taskkill.exedescription pid process Token: SeDebugPrivilege 5108 taskkill.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
ee580f8e3dcf7d6c190ca6abc9701710_NeikiAnalytics.execmd.exedescription pid process target process PID 228 wrote to memory of 3000 228 ee580f8e3dcf7d6c190ca6abc9701710_NeikiAnalytics.exe cmd.exe PID 228 wrote to memory of 3000 228 ee580f8e3dcf7d6c190ca6abc9701710_NeikiAnalytics.exe cmd.exe PID 228 wrote to memory of 3000 228 ee580f8e3dcf7d6c190ca6abc9701710_NeikiAnalytics.exe cmd.exe PID 3000 wrote to memory of 5108 3000 cmd.exe taskkill.exe PID 3000 wrote to memory of 5108 3000 cmd.exe taskkill.exe PID 3000 wrote to memory of 5108 3000 cmd.exe taskkill.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ee580f8e3dcf7d6c190ca6abc9701710_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\ee580f8e3dcf7d6c190ca6abc9701710_NeikiAnalytics.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:228 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 228 -s 4602⤵
- Program crash
PID:2512 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 228 -s 7642⤵
- Program crash
PID:880 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 228 -s 8042⤵
- Program crash
PID:1188 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 228 -s 8042⤵
- Program crash
PID:5092 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 228 -s 7962⤵
- Program crash
PID:4704 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 228 -s 9282⤵
- Program crash
PID:4008 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 228 -s 10162⤵
- Program crash
PID:1552 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 228 -s 13642⤵
- Program crash
PID:3744 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im "ee580f8e3dcf7d6c190ca6abc9701710_NeikiAnalytics.exe" /f & erase "C:\Users\Admin\AppData\Local\Temp\ee580f8e3dcf7d6c190ca6abc9701710_NeikiAnalytics.exe" & exit2⤵
- Suspicious use of WriteProcessMemory
PID:3000 -
C:\Windows\SysWOW64\taskkill.exetaskkill /im "ee580f8e3dcf7d6c190ca6abc9701710_NeikiAnalytics.exe" /f3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5108 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 228 -s 13842⤵
- Program crash
PID:2208
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 228 -ip 2281⤵PID:3764
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 484 -p 228 -ip 2281⤵PID:4616
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 228 -ip 2281⤵PID:2736
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 228 -ip 2281⤵PID:4168
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 484 -p 228 -ip 2281⤵PID:1432
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 228 -ip 2281⤵PID:3244
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 228 -ip 2281⤵PID:4160
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 228 -ip 2281⤵PID:3448
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 228 -ip 2281⤵PID:4152