Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23/05/2024, 22:08

General

  • Target

    954bd9514b6a8e84eeb0a0b17c1139d0_NeikiAnalytics.exe

  • Size

    53KB

  • MD5

    954bd9514b6a8e84eeb0a0b17c1139d0

  • SHA1

    48eab341dbc49cc504a1797493976930ef9e2b7d

  • SHA256

    a8fb740f1d4b7080daff1038db95b9a7d634fdbddad6b5fa81ef741e8d3801ae

  • SHA512

    75e1f45756c5644a1858f2668152487eb2005453f8c44ba5a0434fe370ece50988551a3da446e80c2d1d59c9a02b50306553552c181839b55b7d06fdbdaa46e3

  • SSDEEP

    1536:vN5g8r8Qi4iYav7Kp3StjEMjmLM3ztDJWZsXy4JzxPMk:i4iYavJJjmLM3zRJWZsXy4Jt

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\954bd9514b6a8e84eeb0a0b17c1139d0_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\954bd9514b6a8e84eeb0a0b17c1139d0_NeikiAnalytics.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3588
    • C:\Users\Admin\seudu.exe
      "C:\Users\Admin\seudu.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:3960

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\seudu.exe

          Filesize

          53KB

          MD5

          157ad35886f95213d9f24639aa9fa6b0

          SHA1

          e1493543b8844a276389a3d54bcd0b635b1c2f00

          SHA256

          00246df80601680ec5b825daa1d91063b222c6278682b74b16c9c3d18a0932c5

          SHA512

          307854c7483bf6c260bdcb6052314e087719f8851063c4f8afba469f2d9a92aeff62a17fd9caaeb1d59ecf8262cf29d72813d22439c04a336834a64f7484fbea

        • memory/3588-0-0x0000000000400000-0x0000000000412000-memory.dmp

          Filesize

          72KB

        • memory/3960-34-0x0000000000400000-0x0000000000412000-memory.dmp

          Filesize

          72KB