Analysis

  • max time kernel
    149s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-05-2024 00:05

General

  • Target

    5e6083ccee589242a0e04924d36d3810_NeikiAnalytics.exe

  • Size

    84KB

  • MD5

    5e6083ccee589242a0e04924d36d3810

  • SHA1

    5efa10265ec3a5f1080e47a0fa819a2edb16069a

  • SHA256

    3e567380d618a51fc7c5b4661b492713076f42c7c7e9704c8d0cefcf33c1aab1

  • SHA512

    70da7f1c6f7cece8c4175388974361ba64e3f1d9f0442b3fce3cf06cd0816edad8752c896efa36ee13e1de492c63469db10ce810d5adedc99dbe41d439989615

  • SSDEEP

    1536:sB+FC9RntfWeoGiPyCHjKDjvQQQtUw2dfkoT/y2ZLJFg:sB+F8tfPN4yCDKDjvQQQtL

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies system certificate store 2 TTPs 5 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5e6083ccee589242a0e04924d36d3810_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\5e6083ccee589242a0e04924d36d3810_NeikiAnalytics.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:3992
    • C:\Users\Admin\AppData\Local\Temp\budha.exe
      "C:\Users\Admin\AppData\Local\Temp\budha.exe"
      2⤵
      • Executes dropped EXE
      • Modifies system certificate store
      PID:4112

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\budha.exe

    Filesize

    84KB

    MD5

    7e94db32bc69e346cb4f50484056cba9

    SHA1

    f73828cc4bab87b399b4cfc308ea4b93bd659183

    SHA256

    bd2b3ee501fb0387f67a9757bc3ef39910a5c6545ff04e7398a03e9c40c74c84

    SHA512

    ccd5aa2b4415f09e0e910c4c5da7d731cb9370ca12461d556a2d7f640fd11eb6f1c4f3c601079c8c0824ec44ad291a7d01a707a68b3b708c967b6efad21a5fe0

  • memory/3992-0-0x0000000000400000-0x000000000041D000-memory.dmp

    Filesize

    116KB

  • memory/3992-3-0x0000000000400000-0x000000000041D000-memory.dmp

    Filesize

    116KB

  • memory/3992-2-0x0000000000409000-0x000000000040A000-memory.dmp

    Filesize

    4KB

  • memory/3992-1-0x0000000000400000-0x000000000041D000-memory.dmp

    Filesize

    116KB

  • memory/3992-5-0x0000000000400000-0x000000000041D000-memory.dmp

    Filesize

    116KB

  • memory/4112-13-0x0000000000400000-0x000000000041D000-memory.dmp

    Filesize

    116KB

  • memory/4112-16-0x0000000000400000-0x000000000041D000-memory.dmp

    Filesize

    116KB