Analysis
-
max time kernel
149s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
22-05-2024 23:33
Static task
static1
Behavioral task
behavioral1
Sample
58d8aa831f73a304739cbb8c8471ad60_NeikiAnalytics.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
58d8aa831f73a304739cbb8c8471ad60_NeikiAnalytics.exe
Resource
win10v2004-20240426-en
General
-
Target
58d8aa831f73a304739cbb8c8471ad60_NeikiAnalytics.exe
-
Size
408KB
-
MD5
58d8aa831f73a304739cbb8c8471ad60
-
SHA1
77ec3dd8e5e4ea02a3fa33e0f7e73ffc869b3cdd
-
SHA256
41ebc99152aeecc465451ca3e67188db63c9552c742a8e03b694cd99452d0652
-
SHA512
257e727a46ccc3c0fa105be38254c76948913027aed8abaa85f021a2f12c79f580c7f82482814a2ed4b5ffc712207f83d2f24c12b606c3f9323dfee2dd8710ed
-
SSDEEP
6144:4jlYKRF/LReWAsUyUNQUPRoc5AWl6rnt6R1MDmfRh0+OeeGVbUsD/Gdc4r6:4jauDReWSNQUPRoc5AW6rnM1MafbDUr6
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
xuigt.exepid process 4124 xuigt.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
xuigt.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Microsoft® Windows® Operating System = "C:\\ProgramData\\xuigt.exe" xuigt.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
58d8aa831f73a304739cbb8c8471ad60_NeikiAnalytics.exedescription pid process target process PID 1948 wrote to memory of 4124 1948 58d8aa831f73a304739cbb8c8471ad60_NeikiAnalytics.exe xuigt.exe PID 1948 wrote to memory of 4124 1948 58d8aa831f73a304739cbb8c8471ad60_NeikiAnalytics.exe xuigt.exe PID 1948 wrote to memory of 4124 1948 58d8aa831f73a304739cbb8c8471ad60_NeikiAnalytics.exe xuigt.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\58d8aa831f73a304739cbb8c8471ad60_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\58d8aa831f73a304739cbb8c8471ad60_NeikiAnalytics.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1948 -
C:\ProgramData\xuigt.exe"C:\ProgramData\xuigt.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:4124
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
408KB
MD57283fa673c13394acbe4898534cb3e5b
SHA1c67952c76f5dff35926762a8588ff19f8406a244
SHA256b2959f3a722534bc9169fdff236eb8ed50fb0fff843b9290348c681146020b96
SHA51263d92cea66833ed8620e82842f197fc6753b7e5b30a56e586f5c2782d2cb5badc0173f3b8c4670df517e8eddcda9a02b9f8a9f3709b32da3bcce8811f38d66b6
-
Filesize
136KB
MD5cb4c442a26bb46671c638c794bf535af
SHA18a742d0b372f2ddd2d1fdf688c3c4ac7f9272abf
SHA256f8d2c17bdf34ccfb58070ac8b131a8d95055340101a329f9a7212ac5240d0c25
SHA512074a31e8da403c0a718f93cbca50574d8b658921193db0e6e20eacd232379286f14a3698cd443dc740d324ad19d74934ae001a7ad64b88897d8afefbc9a3d4e3
-
Filesize
271KB
MD52bb0787bd3e8cfc64809414b956950e8
SHA14b83e2646929217393c7c0d4f22e7cdbb41e26f6
SHA256fb4c64e7d221c89bdc95213ee0fe19be35ee4129319a1f93d51a8c4f56ff39c0
SHA5123d7f603c203eac97f70469a9b505fce24f77266cc173bf362b6f141b2ef2393919d254dab8d24f97e96c5c71a896d694aad2003f796b7307b03a8b9aca798567