Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
23-05-2024 00:52
Static task
static1
Behavioral task
behavioral1
Sample
662ab5937404a31318e2846afe557cc0_NeikiAnalytics.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
662ab5937404a31318e2846afe557cc0_NeikiAnalytics.exe
Resource
win10v2004-20240426-en
General
-
Target
662ab5937404a31318e2846afe557cc0_NeikiAnalytics.exe
-
Size
12KB
-
MD5
662ab5937404a31318e2846afe557cc0
-
SHA1
f7073403235d3689c728ec4746755ac968b434f7
-
SHA256
28eb656bfceda52d98ae02b4ef0e41f76204b4190f09ebf337e5d24cf392c1f5
-
SHA512
06f026b1762f466f121123454a736e964ae84569208ebc9c68e325a4d64ce7842808c8b84ca0622d888a5d66a9ecc4546a7f69fb929440338cc394fbcd50d3a2
-
SSDEEP
384:nL7li/2zwq2DcEQvdQcJKLTp/NK9xaly:LUMCQ9cly
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
662ab5937404a31318e2846afe557cc0_NeikiAnalytics.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\Control Panel\International\Geo\Nation 662ab5937404a31318e2846afe557cc0_NeikiAnalytics.exe -
Deletes itself 1 IoCs
Processes:
tmp6080.tmp.exepid process 4752 tmp6080.tmp.exe -
Executes dropped EXE 1 IoCs
Processes:
tmp6080.tmp.exepid process 4752 tmp6080.tmp.exe -
Uses the VBS compiler for execution 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
662ab5937404a31318e2846afe557cc0_NeikiAnalytics.exedescription pid process Token: SeDebugPrivilege 2604 662ab5937404a31318e2846afe557cc0_NeikiAnalytics.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
662ab5937404a31318e2846afe557cc0_NeikiAnalytics.exevbc.exedescription pid process target process PID 2604 wrote to memory of 2552 2604 662ab5937404a31318e2846afe557cc0_NeikiAnalytics.exe vbc.exe PID 2604 wrote to memory of 2552 2604 662ab5937404a31318e2846afe557cc0_NeikiAnalytics.exe vbc.exe PID 2604 wrote to memory of 2552 2604 662ab5937404a31318e2846afe557cc0_NeikiAnalytics.exe vbc.exe PID 2552 wrote to memory of 4828 2552 vbc.exe cvtres.exe PID 2552 wrote to memory of 4828 2552 vbc.exe cvtres.exe PID 2552 wrote to memory of 4828 2552 vbc.exe cvtres.exe PID 2604 wrote to memory of 4752 2604 662ab5937404a31318e2846afe557cc0_NeikiAnalytics.exe tmp6080.tmp.exe PID 2604 wrote to memory of 4752 2604 662ab5937404a31318e2846afe557cc0_NeikiAnalytics.exe tmp6080.tmp.exe PID 2604 wrote to memory of 4752 2604 662ab5937404a31318e2846afe557cc0_NeikiAnalytics.exe tmp6080.tmp.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\662ab5937404a31318e2846afe557cc0_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\662ab5937404a31318e2846afe557cc0_NeikiAnalytics.exe"1⤵
- Checks computer location settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\swsigegs\swsigegs.cmdline"2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES62B1.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc16DE190E866E4174A0AF1168E771DA80.TMP"3⤵
-
C:\Users\Admin\AppData\Local\Temp\tmp6080.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp6080.tmp.exe" C:\Users\Admin\AppData\Local\Temp\662ab5937404a31318e2846afe557cc0_NeikiAnalytics.exe2⤵
- Deletes itself
- Executes dropped EXE
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\RE.resourcesFilesize
2KB
MD5181c2da9764b9be13d1adc181d86e360
SHA168e3a0fb138a38cc61c07115b08d4e20797a4640
SHA256728e26ca1c87c88bd5b561ba099c655a01be2625ed43516a0003d2bde08a1e90
SHA512e5b7f162a0bc088ac85712a429a8920e74952b2b5386cb4391c4162e4dc33c3f2e9c347340d8f1262fb45ac4958db78fe49a3576b302c283549976fe068ab71a
-
C:\Users\Admin\AppData\Local\Temp\RES62B1.tmpFilesize
1KB
MD5a0576afab83799477dec9b6388eb13c9
SHA10b930e2bc576b1df008d16383baee3dca76c03a2
SHA256fc21e65a185268fa49cfd87e1c5dfa616eea80e62cb16093748301a0cd3ea71b
SHA5126912da78fedd4cdbb774eed46e079ebfac473c6bef624a6f3fad9300f8d1fbdec6c6dab98edbf3f88d178d07b575685273107e0f8d12ebd3c3adbefa8a975a07
-
C:\Users\Admin\AppData\Local\Temp\swsigegs\swsigegs.0.vbFilesize
2KB
MD52d3e8141f3935bdc14737681c98c4d30
SHA165e5641fbb5ddeea8401396c32a9764c5d915f71
SHA256f041c30bc2e70c834c52cbf4ec67f4308738864012d5dc01491d8395e8c158b0
SHA512aff1d582cc7579ec08c8538d98095a07531d4197eb0fd58243195df5256ece01c4b560f07d5c8363ce45b4a19debc6974034b17fdaf5528e553bf7940a076e0f
-
C:\Users\Admin\AppData\Local\Temp\swsigegs\swsigegs.cmdlineFilesize
273B
MD5879e1c2825a0f82e1967e9d9e12f8baf
SHA1fb350d3ff9676f1f2dc30767e64c63b67ab4b9a5
SHA2567440fd415fd87517a9c641e050b6e1ffd0c509423bc55bb65384f95b36656e7d
SHA5125e5e0bfab4df08f353c3c090899192afaa2e47f1be2f344a68a3649cf64b1b56f4c8409f36f727fd0a60fc4bfa6c4e9a9e81f0c1a10b7930ab914732d4a77dec
-
C:\Users\Admin\AppData\Local\Temp\tmp6080.tmp.exeFilesize
12KB
MD5e48b804979da29f4e7815775967b16c2
SHA1b2440385743067b581967484268ca185cf0b7894
SHA256ec7040b5666073dbfb916a12ae675a2bf8a1ef336ca2d69a04dfa9d17592a21a
SHA512373b1ed342794a4435eb92e1d30f38528915ecf9976b927866930f37b49a703a68c235dc80cf4c62e9ef3b007a5561976c8f967405af6997c75ad4cb58b71876
-
C:\Users\Admin\AppData\Local\Temp\vbc16DE190E866E4174A0AF1168E771DA80.TMPFilesize
1KB
MD544b51b774730bbf8fe724b09305ae781
SHA1ff9bf67090130235ff29cffc02aad2c54d8f57b3
SHA256b69d32121610faacf3cb72a13e4c3a1d4a51ef65a75adc35bc4c8a8466636cc3
SHA512fd5f458432e31d2cb1d1f8911cba9768638f742a8ff7c2463a216b59d5a5ad071997a6023bb8fc31338f90d93b4e54c0644b829f905102a9cdc3cc8635f05fce
-
memory/2604-8-0x0000000074680000-0x0000000074E30000-memory.dmpFilesize
7.7MB
-
memory/2604-2-0x0000000004CF0000-0x0000000004D8C000-memory.dmpFilesize
624KB
-
memory/2604-0-0x000000007468E000-0x000000007468F000-memory.dmpFilesize
4KB
-
memory/2604-1-0x00000000003A0000-0x00000000003AA000-memory.dmpFilesize
40KB
-
memory/2604-24-0x0000000074680000-0x0000000074E30000-memory.dmpFilesize
7.7MB
-
memory/4752-26-0x0000000074680000-0x0000000074E30000-memory.dmpFilesize
7.7MB
-
memory/4752-25-0x00000000009E0000-0x00000000009EA000-memory.dmpFilesize
40KB
-
memory/4752-27-0x0000000005910000-0x0000000005EB4000-memory.dmpFilesize
5.6MB
-
memory/4752-28-0x0000000005360000-0x00000000053F2000-memory.dmpFilesize
584KB
-
memory/4752-30-0x0000000074680000-0x0000000074E30000-memory.dmpFilesize
7.7MB