Analysis
-
max time kernel
150s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
21/05/2024, 11:27
Behavioral task
behavioral1
Sample
3fee1a610a04237c93de8b5706957245d5ded5bfef82ba18ac95d2962e728332_NeikiAnalytics.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
3fee1a610a04237c93de8b5706957245d5ded5bfef82ba18ac95d2962e728332_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
3fee1a610a04237c93de8b5706957245d5ded5bfef82ba18ac95d2962e728332_NeikiAnalytics.exe
-
Size
52KB
-
MD5
408e665b8afdfc6ea70ab810b6c8a080
-
SHA1
9e667f9b0e8111b3e1a391d79297e743b27875b8
-
SHA256
3fee1a610a04237c93de8b5706957245d5ded5bfef82ba18ac95d2962e728332
-
SHA512
9a2742eb78d2c9b90fbdcdecade190396004a2ef22412084cab5dea84a7b906ec7a71f89091b95f3b9465cd19c6654552e7efcd1899018de675d5995cb652f84
-
SSDEEP
768:4oMn6f9zSX3e3cZ9SoD8XD33fyEpk58sCuSNcIcXR/QGQeCa57qEQwLGVPlb:26f9uusDSoDEXC58kSEYFa1vnLalb
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation 3fee1a610a04237c93de8b5706957245d5ded5bfef82ba18ac95d2962e728332_NeikiAnalytics.exe -
Executes dropped EXE 1 IoCs
pid Process 4808 upsec.exe -
resource yara_rule behavioral2/memory/1020-0-0x0000000000400000-0x0000000000412000-memory.dmp upx behavioral2/files/0x00090000000233c1-8.dat upx behavioral2/memory/4808-12-0x0000000000400000-0x0000000000412000-memory.dmp upx behavioral2/memory/1020-13-0x0000000000400000-0x0000000000412000-memory.dmp upx behavioral2/memory/4808-17-0x0000000000400000-0x0000000000412000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1020 wrote to memory of 4808 1020 3fee1a610a04237c93de8b5706957245d5ded5bfef82ba18ac95d2962e728332_NeikiAnalytics.exe 82 PID 1020 wrote to memory of 4808 1020 3fee1a610a04237c93de8b5706957245d5ded5bfef82ba18ac95d2962e728332_NeikiAnalytics.exe 82 PID 1020 wrote to memory of 4808 1020 3fee1a610a04237c93de8b5706957245d5ded5bfef82ba18ac95d2962e728332_NeikiAnalytics.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\3fee1a610a04237c93de8b5706957245d5ded5bfef82ba18ac95d2962e728332_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\3fee1a610a04237c93de8b5706957245d5ded5bfef82ba18ac95d2962e728332_NeikiAnalytics.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1020 -
C:\Users\Admin\AppData\Local\Temp\upsec.exe"C:\Users\Admin\AppData\Local\Temp\upsec.exe"2⤵
- Executes dropped EXE
PID:4808
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
52KB
MD5a29d83ce1380071f3a424c8791a3c597
SHA11a26cc68c7a2445a6adf379794a1a7b42556d873
SHA256232cd9cfbb9175c252f797bf65239e9f990a3804176e3fe1b99808f0a79f5787
SHA5129653b5cffdd41a75062b90a3ecef7100e187b87f623467e170fce0c19c0642fd49d07fa5894b1cdb642a8f948c26e8f578c2356fbce0f31bdd0a72518f959103