Analysis

  • max time kernel
    135s
  • max time network
    130s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-05-2024 00:17

General

  • Target

    6046a960790d34a30bdfa62650c1a320_NeikiAnalytics.exe

  • Size

    40KB

  • MD5

    6046a960790d34a30bdfa62650c1a320

  • SHA1

    b9f2e5776fb8cc21bfa5edc5c36f0ce2c9a1a8e5

  • SHA256

    819d2d7fda7964056ef2c4ae104b4556b86caaef1880456831025869ff0daa82

  • SHA512

    5744e19934f6d8c151d51a2dd246c6a1c2c62779f91964ccb97b534540217099faafe4f43ed466f7c3346a834f01ca694efe89fc5378aef4c710127c6331304c

  • SSDEEP

    768:m8eRH+9lFh0ul16sh7iQroCHXf+RjFBSuB2XmH:m9l+Z16sh7iQroCWRB0u5

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6046a960790d34a30bdfa62650c1a320_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\6046a960790d34a30bdfa62650c1a320_NeikiAnalytics.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:4428
    • C:\Users\Admin\AppData\Local\Temp\bkgrnd.exe
      "C:\Users\Admin\AppData\Local\Temp\bkgrnd.exe"
      2⤵
      • Executes dropped EXE
      PID:5028
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --field-trial-handle=4180,i,1999448010053300448,1112699187621658374,262144 --variations-seed-version --mojo-platform-channel-handle=4080 /prefetch:8
    1⤵
      PID:60

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\bkgrnd.exe

      Filesize

      41KB

      MD5

      ac367ca39f925c2558d1694de979d685

      SHA1

      5300d1d34c83c94255120bc7921372a6373dc044

      SHA256

      83eead72546d9268ba79baa3c0e176bae44c4a314662779a027e502d5e367ad4

      SHA512

      4163ee611869113685f25a6ab8948693da1650867ed49f1cf988812bb9825f55285daf335bdf21deb60e8126120f839f842479024dde21d72aed7f30c2f40233

    • memory/4428-0-0x0000000000400000-0x000000000040A000-memory.dmp

      Filesize

      40KB

    • memory/4428-2-0x0000000004000000-0x0000000004006000-memory.dmp

      Filesize

      24KB

    • memory/4428-1-0x0000000004000000-0x0000000004006000-memory.dmp

      Filesize

      24KB

    • memory/4428-11-0x0000000000400000-0x000000000040A000-memory.dmp

      Filesize

      40KB

    • memory/5028-21-0x0000000000400000-0x000000000040A000-memory.dmp

      Filesize

      40KB