Analysis

  • max time kernel
    150s
  • max time network
    95s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21/05/2024, 11:27

General

  • Target

    3fee1a610a04237c93de8b5706957245d5ded5bfef82ba18ac95d2962e728332_NeikiAnalytics.exe

  • Size

    52KB

  • MD5

    408e665b8afdfc6ea70ab810b6c8a080

  • SHA1

    9e667f9b0e8111b3e1a391d79297e743b27875b8

  • SHA256

    3fee1a610a04237c93de8b5706957245d5ded5bfef82ba18ac95d2962e728332

  • SHA512

    9a2742eb78d2c9b90fbdcdecade190396004a2ef22412084cab5dea84a7b906ec7a71f89091b95f3b9465cd19c6654552e7efcd1899018de675d5995cb652f84

  • SSDEEP

    768:4oMn6f9zSX3e3cZ9SoD8XD33fyEpk58sCuSNcIcXR/QGQeCa57qEQwLGVPlb:26f9uusDSoDEXC58kSEYFa1vnLalb

Score
7/10
upx

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • UPX packed file 5 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3fee1a610a04237c93de8b5706957245d5ded5bfef82ba18ac95d2962e728332_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\3fee1a610a04237c93de8b5706957245d5ded5bfef82ba18ac95d2962e728332_NeikiAnalytics.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:1020
    • C:\Users\Admin\AppData\Local\Temp\upsec.exe
      "C:\Users\Admin\AppData\Local\Temp\upsec.exe"
      2⤵
      • Executes dropped EXE
      PID:4808

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\upsec.exe

    Filesize

    52KB

    MD5

    a29d83ce1380071f3a424c8791a3c597

    SHA1

    1a26cc68c7a2445a6adf379794a1a7b42556d873

    SHA256

    232cd9cfbb9175c252f797bf65239e9f990a3804176e3fe1b99808f0a79f5787

    SHA512

    9653b5cffdd41a75062b90a3ecef7100e187b87f623467e170fce0c19c0642fd49d07fa5894b1cdb642a8f948c26e8f578c2356fbce0f31bdd0a72518f959103

  • memory/1020-0-0x0000000000400000-0x0000000000412000-memory.dmp

    Filesize

    72KB

  • memory/1020-2-0x0000000004000000-0x0000000004005000-memory.dmp

    Filesize

    20KB

  • memory/1020-1-0x0000000004000000-0x0000000004005000-memory.dmp

    Filesize

    20KB

  • memory/1020-4-0x0000000004000000-0x0000000004005000-memory.dmp

    Filesize

    20KB

  • memory/1020-13-0x0000000000400000-0x0000000000412000-memory.dmp

    Filesize

    72KB

  • memory/4808-12-0x0000000000400000-0x0000000000412000-memory.dmp

    Filesize

    72KB

  • memory/4808-16-0x0000000004000000-0x0000000004005000-memory.dmp

    Filesize

    20KB

  • memory/4808-17-0x0000000000400000-0x0000000000412000-memory.dmp

    Filesize

    72KB

  • memory/4808-19-0x0000000004000000-0x0000000004005000-memory.dmp

    Filesize

    20KB