Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
21-05-2024 19:17
Static task
static1
Behavioral task
behavioral1
Sample
0483909a7ba88c9bb131c1210df13640_NeikiAnalytics.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
0483909a7ba88c9bb131c1210df13640_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
0483909a7ba88c9bb131c1210df13640_NeikiAnalytics.exe
-
Size
45KB
-
MD5
0483909a7ba88c9bb131c1210df13640
-
SHA1
b77a68a17037e86390ecd095f76cb36ae352de8a
-
SHA256
9e6c99fcdb431ee0f0b7899d0848fdec15687f21ab96ccd43af40271a02e67c1
-
SHA512
1fc371b5ac850f3b0645b621ebe0fa7f4472fb666dee05011d1d17be161b0c7adec226ed119999b957d0ceaa2170636c6ecb9d1ace7a672d8c1840c3fc1a2a88
-
SSDEEP
768:zIP5WOMVs4PSV06ymNNC6S7Cm1n2OBGRIWNSE77NPQ1TTGfGYy6Kw:zI0OGrOy6NvSpMZVQ1J4Kw
Malware Config
Extracted
Protocol: ftp- Host:
ftp.tripod.com - Port:
21 - Username:
griptoloji - Password:
741852
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
0483909a7ba88c9bb131c1210df13640_NeikiAnalytics.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation 0483909a7ba88c9bb131c1210df13640_NeikiAnalytics.exe -
Executes dropped EXE 1 IoCs
Processes:
jusched.exepid process 1604 jusched.exe -
Drops file in Program Files directory 3 IoCs
Processes:
0483909a7ba88c9bb131c1210df13640_NeikiAnalytics.exedescription ioc process File created C:\Program Files (x86)\Java\jre-09\bin\jusched.exe 0483909a7ba88c9bb131c1210df13640_NeikiAnalytics.exe File opened for modification C:\Program Files (x86)\Java\jre-09\bin\jusched.exe 0483909a7ba88c9bb131c1210df13640_NeikiAnalytics.exe File created C:\Program Files (x86)\Java\jre-09\bin\UF 0483909a7ba88c9bb131c1210df13640_NeikiAnalytics.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
jusched.exepid process 1604 jusched.exe 1604 jusched.exe 1604 jusched.exe 1604 jusched.exe 1604 jusched.exe 1604 jusched.exe 1604 jusched.exe 1604 jusched.exe 1604 jusched.exe 1604 jusched.exe 1604 jusched.exe 1604 jusched.exe 1604 jusched.exe 1604 jusched.exe 1604 jusched.exe 1604 jusched.exe 1604 jusched.exe 1604 jusched.exe 1604 jusched.exe 1604 jusched.exe 1604 jusched.exe 1604 jusched.exe 1604 jusched.exe 1604 jusched.exe 1604 jusched.exe 1604 jusched.exe 1604 jusched.exe 1604 jusched.exe 1604 jusched.exe 1604 jusched.exe 1604 jusched.exe 1604 jusched.exe 1604 jusched.exe 1604 jusched.exe 1604 jusched.exe 1604 jusched.exe 1604 jusched.exe 1604 jusched.exe 1604 jusched.exe 1604 jusched.exe 1604 jusched.exe 1604 jusched.exe 1604 jusched.exe 1604 jusched.exe 1604 jusched.exe 1604 jusched.exe 1604 jusched.exe 1604 jusched.exe 1604 jusched.exe 1604 jusched.exe 1604 jusched.exe 1604 jusched.exe 1604 jusched.exe 1604 jusched.exe 1604 jusched.exe 1604 jusched.exe 1604 jusched.exe 1604 jusched.exe 1604 jusched.exe 1604 jusched.exe 1604 jusched.exe 1604 jusched.exe 1604 jusched.exe 1604 jusched.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
0483909a7ba88c9bb131c1210df13640_NeikiAnalytics.exedescription pid process target process PID 228 wrote to memory of 1604 228 0483909a7ba88c9bb131c1210df13640_NeikiAnalytics.exe jusched.exe PID 228 wrote to memory of 1604 228 0483909a7ba88c9bb131c1210df13640_NeikiAnalytics.exe jusched.exe PID 228 wrote to memory of 1604 228 0483909a7ba88c9bb131c1210df13640_NeikiAnalytics.exe jusched.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\0483909a7ba88c9bb131c1210df13640_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\0483909a7ba88c9bb131c1210df13640_NeikiAnalytics.exe"1⤵
- Checks computer location settings
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:228 -
C:\Program Files (x86)\Java\jre-09\bin\jusched.exe"C:\Program Files (x86)\Java\jre-09\bin\jusched.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:1604
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
45KB
MD52bd0c010c6384d41c05118f107537ad1
SHA19b8417874166421537842a315994a982843b88bd
SHA25665a0010481a8325c1ea5f2795b5adc0c132131f968bf9b96936293ccafb9daa3
SHA51217de5ee197f9caa2ec0d470ea558560e975428580e597feb399d7397f2be6a1f1e57f85d071fe602255a3e514622f4dbc23d386d2b47d0f89038f030fe8d70b3