Analysis
-
max time kernel
142s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
21-05-2024 07:34
Behavioral task
behavioral1
Sample
1b3e620255271169982f26431ed93b575b3201633dcb7364f335293b5e952116_NeikiAnalytics.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
1b3e620255271169982f26431ed93b575b3201633dcb7364f335293b5e952116_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
1b3e620255271169982f26431ed93b575b3201633dcb7364f335293b5e952116_NeikiAnalytics.exe
-
Size
46KB
-
MD5
08ab087af8a82ef10d14bf82dad0b260
-
SHA1
37ed64aadb71c78bfe67265781360350db9fa510
-
SHA256
1b3e620255271169982f26431ed93b575b3201633dcb7364f335293b5e952116
-
SHA512
92aead4265a3e2f8ca69206a36a2bf78a39825cf98b13cfa4b9ae8c4f743a6de85de09da9e51ba213f6624a1cfdb5e2ba6d68ffda8bcbc2c612143c360feff83
-
SSDEEP
768:n8eRH+MlFh0pXrL4i6sh7iQroCHmmbk2NW:n9l+Gi6sh7iQroCL4
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation 1b3e620255271169982f26431ed93b575b3201633dcb7364f335293b5e952116_NeikiAnalytics.exe -
Executes dropped EXE 1 IoCs
pid Process 888 bkgrnd.exe -
resource yara_rule behavioral2/memory/3164-0-0x0000000000400000-0x000000000040F000-memory.dmp upx behavioral2/files/0x0009000000023289-7.dat upx behavioral2/memory/888-10-0x0000000000400000-0x000000000040F000-memory.dmp upx behavioral2/memory/888-21-0x0000000000400000-0x000000000040F000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3164 wrote to memory of 888 3164 1b3e620255271169982f26431ed93b575b3201633dcb7364f335293b5e952116_NeikiAnalytics.exe 82 PID 3164 wrote to memory of 888 3164 1b3e620255271169982f26431ed93b575b3201633dcb7364f335293b5e952116_NeikiAnalytics.exe 82 PID 3164 wrote to memory of 888 3164 1b3e620255271169982f26431ed93b575b3201633dcb7364f335293b5e952116_NeikiAnalytics.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\1b3e620255271169982f26431ed93b575b3201633dcb7364f335293b5e952116_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\1b3e620255271169982f26431ed93b575b3201633dcb7364f335293b5e952116_NeikiAnalytics.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3164 -
C:\Users\Admin\AppData\Local\Temp\bkgrnd.exe"C:\Users\Admin\AppData\Local\Temp\bkgrnd.exe"2⤵
- Executes dropped EXE
PID:888
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
46KB
MD5a9bae055577fcd37d6123a535db676ca
SHA1c0db4fa4303c36d0588a403caa2e4b4484fd0b45
SHA2566affe04e417fc5d9fe1b24eb542d3c2dd59e863cddcdadc9ae3748fe82a79db8
SHA512f6c1b2dbdd51a6f02a90448541a6df7cacc021ee1340f7e3bf8b8b1042c912f6cd5a1fbc4faedd37601ad10017df14be00e9997d253ed4e772eef64ce7d1aff5