Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
23-05-2024 00:32
Static task
static1
Behavioral task
behavioral1
Sample
62b1d7673220b7f3c50184cd032af7e0_NeikiAnalytics.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
62b1d7673220b7f3c50184cd032af7e0_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
62b1d7673220b7f3c50184cd032af7e0_NeikiAnalytics.exe
-
Size
42KB
-
MD5
62b1d7673220b7f3c50184cd032af7e0
-
SHA1
e6e7c81611e0fbe07d5464e8d252afc8112169e4
-
SHA256
b4d1ad3c13c696680ce4eb68614fe21079b040d70762b21f0b2d05fa220763fd
-
SHA512
5ae501e19ce8eb20c13e8aaaf3285206b13553680a01d8af4231629de296d70c518b0f2379563e87a594cd14f6f7f92725c48c05fc5d8036c2be6a831d0e5f62
-
SSDEEP
768:xIP5WOMVs4PSV06ymNNC6S7Cm1n2OBGRIWNSE77DPQ1TTGfGYha:xI0OGrOy6NvSpMZrQ1Jt
Malware Config
Extracted
Protocol: ftp- Host:
ftp.tripod.com - Port:
21 - Username:
griptoloji - Password:
741852
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
62b1d7673220b7f3c50184cd032af7e0_NeikiAnalytics.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation 62b1d7673220b7f3c50184cd032af7e0_NeikiAnalytics.exe -
Executes dropped EXE 1 IoCs
Processes:
jusched.exepid process 4960 jusched.exe -
Drops file in Program Files directory 3 IoCs
Processes:
62b1d7673220b7f3c50184cd032af7e0_NeikiAnalytics.exedescription ioc process File created C:\Program Files (x86)\Java\jre-09\bin\jusched.exe 62b1d7673220b7f3c50184cd032af7e0_NeikiAnalytics.exe File opened for modification C:\Program Files (x86)\Java\jre-09\bin\jusched.exe 62b1d7673220b7f3c50184cd032af7e0_NeikiAnalytics.exe File created C:\Program Files (x86)\Java\jre-09\bin\UF 62b1d7673220b7f3c50184cd032af7e0_NeikiAnalytics.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
jusched.exepid process 4960 jusched.exe 4960 jusched.exe 4960 jusched.exe 4960 jusched.exe 4960 jusched.exe 4960 jusched.exe 4960 jusched.exe 4960 jusched.exe 4960 jusched.exe 4960 jusched.exe 4960 jusched.exe 4960 jusched.exe 4960 jusched.exe 4960 jusched.exe 4960 jusched.exe 4960 jusched.exe 4960 jusched.exe 4960 jusched.exe 4960 jusched.exe 4960 jusched.exe 4960 jusched.exe 4960 jusched.exe 4960 jusched.exe 4960 jusched.exe 4960 jusched.exe 4960 jusched.exe 4960 jusched.exe 4960 jusched.exe 4960 jusched.exe 4960 jusched.exe 4960 jusched.exe 4960 jusched.exe 4960 jusched.exe 4960 jusched.exe 4960 jusched.exe 4960 jusched.exe 4960 jusched.exe 4960 jusched.exe 4960 jusched.exe 4960 jusched.exe 4960 jusched.exe 4960 jusched.exe 4960 jusched.exe 4960 jusched.exe 4960 jusched.exe 4960 jusched.exe 4960 jusched.exe 4960 jusched.exe 4960 jusched.exe 4960 jusched.exe 4960 jusched.exe 4960 jusched.exe 4960 jusched.exe 4960 jusched.exe 4960 jusched.exe 4960 jusched.exe 4960 jusched.exe 4960 jusched.exe 4960 jusched.exe 4960 jusched.exe 4960 jusched.exe 4960 jusched.exe 4960 jusched.exe 4960 jusched.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
62b1d7673220b7f3c50184cd032af7e0_NeikiAnalytics.exedescription pid process target process PID 1816 wrote to memory of 4960 1816 62b1d7673220b7f3c50184cd032af7e0_NeikiAnalytics.exe jusched.exe PID 1816 wrote to memory of 4960 1816 62b1d7673220b7f3c50184cd032af7e0_NeikiAnalytics.exe jusched.exe PID 1816 wrote to memory of 4960 1816 62b1d7673220b7f3c50184cd032af7e0_NeikiAnalytics.exe jusched.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\62b1d7673220b7f3c50184cd032af7e0_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\62b1d7673220b7f3c50184cd032af7e0_NeikiAnalytics.exe"1⤵
- Checks computer location settings
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:1816 -
C:\Program Files (x86)\Java\jre-09\bin\jusched.exe"C:\Program Files (x86)\Java\jre-09\bin\jusched.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:4960
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
42KB
MD585ad19c2e5acacc142184966e759ff81
SHA166ebb3e8d1abaa664b211930243ddc8c20464036
SHA256cb9e97d17217e2c02d122fff1c0526145d8cc72a686fbcd5cf8875dd906b699f
SHA5127067902fe0d7c31b2aa7b7bb845d6f06771431dd74f6804d7c31d52238993da34ee16043965c29d49dba5a9f8c49f246f2757d488d6961b39a6227ce282bc2a4