Analysis
-
max time kernel
135s -
max time network
106s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
22-05-2024 23:09
Static task
static1
Behavioral task
behavioral1
Sample
5430912b5e0babca8426a2defbe5df30_NeikiAnalytics.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
5430912b5e0babca8426a2defbe5df30_NeikiAnalytics.exe
Resource
win10v2004-20240426-en
General
-
Target
5430912b5e0babca8426a2defbe5df30_NeikiAnalytics.exe
-
Size
12KB
-
MD5
5430912b5e0babca8426a2defbe5df30
-
SHA1
83097dbc256d389977ec4167f8349c13b1cc8796
-
SHA256
d31ad3018fc3d309e862d5bdadd979716b030d414c0e593938e84c3fbf663096
-
SHA512
00d1a16a5b6d346d63a9370b45ab16c7c0685efe4b14256d0ec05ea29c1f0bf1cb7d4f2d2f5e764fb5026cae7527be5ee4fce3034123e2e9e4f7e0aad8b330e7
-
SSDEEP
384:cL7li/2zKq2DcEQvdQcJKLTp/NK9xams:6aMCQ9cms
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
5430912b5e0babca8426a2defbe5df30_NeikiAnalytics.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\Control Panel\International\Geo\Nation 5430912b5e0babca8426a2defbe5df30_NeikiAnalytics.exe -
Deletes itself 1 IoCs
Processes:
tmp3549.tmp.exepid process 2712 tmp3549.tmp.exe -
Executes dropped EXE 1 IoCs
Processes:
tmp3549.tmp.exepid process 2712 tmp3549.tmp.exe -
Uses the VBS compiler for execution 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
5430912b5e0babca8426a2defbe5df30_NeikiAnalytics.exedescription pid process Token: SeDebugPrivilege 1664 5430912b5e0babca8426a2defbe5df30_NeikiAnalytics.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
5430912b5e0babca8426a2defbe5df30_NeikiAnalytics.exevbc.exedescription pid process target process PID 1664 wrote to memory of 4444 1664 5430912b5e0babca8426a2defbe5df30_NeikiAnalytics.exe vbc.exe PID 1664 wrote to memory of 4444 1664 5430912b5e0babca8426a2defbe5df30_NeikiAnalytics.exe vbc.exe PID 1664 wrote to memory of 4444 1664 5430912b5e0babca8426a2defbe5df30_NeikiAnalytics.exe vbc.exe PID 4444 wrote to memory of 1960 4444 vbc.exe cvtres.exe PID 4444 wrote to memory of 1960 4444 vbc.exe cvtres.exe PID 4444 wrote to memory of 1960 4444 vbc.exe cvtres.exe PID 1664 wrote to memory of 2712 1664 5430912b5e0babca8426a2defbe5df30_NeikiAnalytics.exe tmp3549.tmp.exe PID 1664 wrote to memory of 2712 1664 5430912b5e0babca8426a2defbe5df30_NeikiAnalytics.exe tmp3549.tmp.exe PID 1664 wrote to memory of 2712 1664 5430912b5e0babca8426a2defbe5df30_NeikiAnalytics.exe tmp3549.tmp.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\5430912b5e0babca8426a2defbe5df30_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\5430912b5e0babca8426a2defbe5df30_NeikiAnalytics.exe"1⤵
- Checks computer location settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1664 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\wkoqj05a\wkoqj05a.cmdline"2⤵
- Suspicious use of WriteProcessMemory
PID:4444 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES371D.tmp" "C:\Users\Admin\AppData\Local\Temp\vbcD7F73DD86D4C4AEF8F53B733E0FB64AE.TMP"3⤵PID:1960
-
C:\Users\Admin\AppData\Local\Temp\tmp3549.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp3549.tmp.exe" C:\Users\Admin\AppData\Local\Temp\5430912b5e0babca8426a2defbe5df30_NeikiAnalytics.exe2⤵
- Deletes itself
- Executes dropped EXE
PID:2712
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD59e9cdbee36c64c74d4902a58a4aafbe6
SHA108a50e2077ee3cd8658a537e5afee8d9cdae75d7
SHA25640373a534b91478adeb58481ddff312d5f1b72f0c5c9f35721b79afeaf012e1f
SHA51255d84a5ef92bc0790fb6da475a2bab439df8619cd45443db814f6f261350e46a71ddf4f9cd3a7541057ef33c489776b57dd319bfd774a010d02e06840a30f9d4
-
Filesize
1KB
MD5d758e37b3534a51a3986529768b57d73
SHA1bdfd8cf60359595dee157943873b27fb2d5276b9
SHA2562c21c61f63033378c5bcd4e8964b3882b15b4fec362659e77fa749146ab06424
SHA5125449db1a56d9c5e342f4776df7bff5863bc4cfa838353a6ddfc28fc92e577e31e269d60b9b8d3c6eafac825e6ad93253f92563a23faceaa03574e889fb097a96
-
Filesize
12KB
MD59a06e0fc59985d7f8bd7bcf59673d5e1
SHA19aa7de1e9c99d170766153593cee55b4c9dbc791
SHA256009aa192eb968e113d66bb7123b41da8407d2104fa7635eaee367649c925fcfc
SHA512dadef53580677946d50e6d5308c2d44d6cca6bd5158a3573073de02052be550e0fdea465d2bd1a22c7d8211ecc3c0a074258a01c30f8c21be3ba9ad4ce3ba7b7
-
Filesize
1KB
MD5d829b2d83e6abb686e9d24dc7958f899
SHA13b26a956b618024e7319fc3e612cce8d0828f3e9
SHA2564785adf98bb9472ff437bfc75ac88043a4e9c55727786364cb833190320933f4
SHA5123446917398b5757523e2ddd287f8b7d2cb70d9a5b4882074ad03af1b0b099102f1a35dae5302c26689b13c508d818b74f73c5f1210dcb06be17630a92297abfc
-
Filesize
2KB
MD591bd59587bf25271221af97fc25e3708
SHA1cbc794aa79954727fb2fa57d46675064243e8f33
SHA2567b9a7796d534c9afa5c76e422a565dc913673e4fe35f30341eadb1ecbcff07da
SHA51255f963e0a5733aab94f5bec15d116c93593189d1c0540ff893ce46c136acd6c7e8db3972ac1a9539ced45ba67359ed67ccdeb33615479b7eda05bc73cbaa4159
-
Filesize
273B
MD505aacc0308fa0228bef767eedbad5c85
SHA1e3cc5cf1c8879055d74d75c4fd1eb5b6995b856c
SHA2560eb2b0e2fdd8d5d0af0cae66bae5c6c819f8ade141e37dccad03a467a41ac7c2
SHA5120feef32e350551351e45b89136aad2438f61249c709fa358eb79a4ae5b1358086e6e7480d6efa72d497b1e4ebd20ff7880d3d52710404cd13e0955007a0de9fe