Analysis
-
max time kernel
142s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
22-05-2024 23:22
Static task
static1
Behavioral task
behavioral1
Sample
5684e968d5c2325fd45ec950b898b5d0_NeikiAnalytics.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
5684e968d5c2325fd45ec950b898b5d0_NeikiAnalytics.exe
Resource
win10v2004-20240226-en
General
-
Target
5684e968d5c2325fd45ec950b898b5d0_NeikiAnalytics.exe
-
Size
12KB
-
MD5
5684e968d5c2325fd45ec950b898b5d0
-
SHA1
56fef1b7401bbdf39788b49b88766563e763f136
-
SHA256
a369ae72022ab826237f423b80ad7d3c610deef78c5e9389da9d941f35f5690d
-
SHA512
129953e417a0837d53e951ae15e6c2bdd8cccbd7f017c58f5effb0a9162448322832ac05de5fe34f4e1bf33dfe703d1de5200a157eb60c56940eb9ab7b5a96c1
-
SSDEEP
384:aL7li/2zpq2DcEQvdQcJKLTp/NK9xaQz:EhMCQ9cQz
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation 5684e968d5c2325fd45ec950b898b5d0_NeikiAnalytics.exe -
Deletes itself 1 IoCs
pid Process 2524 tmp293F.tmp.exe -
Executes dropped EXE 1 IoCs
pid Process 2524 tmp293F.tmp.exe -
Uses the VBS compiler for execution 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4292 5684e968d5c2325fd45ec950b898b5d0_NeikiAnalytics.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4292 wrote to memory of 1408 4292 5684e968d5c2325fd45ec950b898b5d0_NeikiAnalytics.exe 90 PID 4292 wrote to memory of 1408 4292 5684e968d5c2325fd45ec950b898b5d0_NeikiAnalytics.exe 90 PID 4292 wrote to memory of 1408 4292 5684e968d5c2325fd45ec950b898b5d0_NeikiAnalytics.exe 90 PID 1408 wrote to memory of 4708 1408 vbc.exe 92 PID 1408 wrote to memory of 4708 1408 vbc.exe 92 PID 1408 wrote to memory of 4708 1408 vbc.exe 92 PID 4292 wrote to memory of 2524 4292 5684e968d5c2325fd45ec950b898b5d0_NeikiAnalytics.exe 93 PID 4292 wrote to memory of 2524 4292 5684e968d5c2325fd45ec950b898b5d0_NeikiAnalytics.exe 93 PID 4292 wrote to memory of 2524 4292 5684e968d5c2325fd45ec950b898b5d0_NeikiAnalytics.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\5684e968d5c2325fd45ec950b898b5d0_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\5684e968d5c2325fd45ec950b898b5d0_NeikiAnalytics.exe"1⤵
- Checks computer location settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4292 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\2znvqr14\2znvqr14.cmdline"2⤵
- Suspicious use of WriteProcessMemory
PID:1408 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES318B.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc89271F46FB8E42CD8FCEFF931E85271F.TMP"3⤵PID:4708
-
-
-
C:\Users\Admin\AppData\Local\Temp\tmp293F.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp293F.tmp.exe" C:\Users\Admin\AppData\Local\Temp\5684e968d5c2325fd45ec950b898b5d0_NeikiAnalytics.exe2⤵
- Deletes itself
- Executes dropped EXE
PID:2524
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4080 --field-trial-handle=2252,i,16504368816373493055,9578615028378602855,262144 --variations-seed-version /prefetch:81⤵PID:2452
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD5a70992d43eb9d24eb87888a538686506
SHA1804038391e87453695cfc70dd9f612b131124c2b
SHA2563fcb4b7ebd4a02a827513c003786524bf7454d601890bd9760ed6e94bfbfd63e
SHA512cd2b209217fddd941082d4b4cfad2e80e3906c91f87d2f68087bb147f06eaaf9e5153e4bb2b734f7f02afb85043426411661f570513a4e21f731c06ebb606553
-
Filesize
273B
MD53fe476400dc11e218a5151b2b721abad
SHA1f8c72abf6fe50339e2a3663a2515e9dbc6a0378b
SHA2563efe6b9a3dd840d7f582e2269451b1d84de83ae674539f34840603759d5e357a
SHA512e31aed88ed3be2e59fecc90a44cc20a5861c7410b4ccecb7e0316d8bb34180e3c3d4ab62205bcacbd95cf653f68ee8d23700861a81ce8a0f705ac638445eb25b
-
Filesize
2KB
MD5eabb16ba774dceb67be50bc773cba4d3
SHA1b97fe47de339b96cd4c507fd21a75196ed47dce2
SHA2567da0c6486285f72685113c3a9233a125656b5fc6faca95551701f8d088e34abc
SHA512f04e6943d33b9408b694b65402eb8a3dc6694cfee9ef354b643360d4f143eff1b5c25b9da0f19ecb0088a2579db35ea33de8bc112c0b41bb661fa3e43ec2b2c4
-
Filesize
1KB
MD52277b42c893a9f4c15a068d117406ee8
SHA166f98574a35621625f2d2e6919f2b369424b4a5d
SHA256ef21a83dbbd39d0b1acb40a18fc41413839e2c1e8845ff2f87138462973ce484
SHA5129e1baa027aa4084ac14f81feae44b47622372c1de2c68292a50216bb90ecceed86b6992b3bcc125008a2c77afae592fa9359e7fe298525ce5e6ca0b871c447c5
-
Filesize
12KB
MD5662364dd18dadad0b3b3f6f350070a88
SHA1e5ca69ad609d685bec8860b16e63f8a8545c5a9c
SHA25653b923f3aee8329f130015627356bdbd89e3fa1a88a40b107fef0c9542d11ddf
SHA5122f78a773e96c9abad7bb39e9360eb597d35020fc2004816ce06c77d792b5f71d966033e2f0d00496fac2924ed236f76fa48cf6fb595eb57a88123bedb401daa5
-
Filesize
1KB
MD531b986a35ba6c6e1c276c0514aca9616
SHA1f0ac0a9b7b73c5554fc270a96f5eefdca53a679c
SHA2567b1e991581d7c305bf46580208c371cba364990189748b42b90b80fbd072e7a6
SHA51200b9298b99f135c8a7c785616133d48c65fe5b39ea3a5d26b319990e2166edebb7158238122ce38d594dba1ae273cf7353add13610e3e0d13e8878f4aad55d36