Analysis
-
max time kernel
143s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
23-05-2024 01:29
Static task
static1
Behavioral task
behavioral1
Sample
6d6545af57f5f07a2686b9b0f254e9a0_NeikiAnalytics.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
6d6545af57f5f07a2686b9b0f254e9a0_NeikiAnalytics.exe
Resource
win10v2004-20240226-en
General
-
Target
6d6545af57f5f07a2686b9b0f254e9a0_NeikiAnalytics.exe
-
Size
12KB
-
MD5
6d6545af57f5f07a2686b9b0f254e9a0
-
SHA1
7e0fb59eaecfb2038bfec2cc3d306ed093a35f5d
-
SHA256
445c757029444573228919e4480e0a2cf34f4186e5bb748b317be60649071919
-
SHA512
595a15a5889ce4e461df6f5162612b808f65fdcb0db9a3d871150863bf8d80e9721b3065942bdae0b9697f5b48bdbeba2d301f9e06d9fd7148043c524c43db10
-
SSDEEP
384:jL7li/2zbq2DcEQvdhcJKLTp/NK9xa4K:nfM/Q9c4K
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
6d6545af57f5f07a2686b9b0f254e9a0_NeikiAnalytics.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation 6d6545af57f5f07a2686b9b0f254e9a0_NeikiAnalytics.exe -
Deletes itself 1 IoCs
Processes:
tmpE83E.tmp.exepid process 3848 tmpE83E.tmp.exe -
Executes dropped EXE 1 IoCs
Processes:
tmpE83E.tmp.exepid process 3848 tmpE83E.tmp.exe -
Uses the VBS compiler for execution 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
6d6545af57f5f07a2686b9b0f254e9a0_NeikiAnalytics.exedescription pid process Token: SeDebugPrivilege 2512 6d6545af57f5f07a2686b9b0f254e9a0_NeikiAnalytics.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
6d6545af57f5f07a2686b9b0f254e9a0_NeikiAnalytics.exevbc.exedescription pid process target process PID 2512 wrote to memory of 5024 2512 6d6545af57f5f07a2686b9b0f254e9a0_NeikiAnalytics.exe vbc.exe PID 2512 wrote to memory of 5024 2512 6d6545af57f5f07a2686b9b0f254e9a0_NeikiAnalytics.exe vbc.exe PID 2512 wrote to memory of 5024 2512 6d6545af57f5f07a2686b9b0f254e9a0_NeikiAnalytics.exe vbc.exe PID 5024 wrote to memory of 3652 5024 vbc.exe cvtres.exe PID 5024 wrote to memory of 3652 5024 vbc.exe cvtres.exe PID 5024 wrote to memory of 3652 5024 vbc.exe cvtres.exe PID 2512 wrote to memory of 3848 2512 6d6545af57f5f07a2686b9b0f254e9a0_NeikiAnalytics.exe tmpE83E.tmp.exe PID 2512 wrote to memory of 3848 2512 6d6545af57f5f07a2686b9b0f254e9a0_NeikiAnalytics.exe tmpE83E.tmp.exe PID 2512 wrote to memory of 3848 2512 6d6545af57f5f07a2686b9b0f254e9a0_NeikiAnalytics.exe tmpE83E.tmp.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\6d6545af57f5f07a2686b9b0f254e9a0_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\6d6545af57f5f07a2686b9b0f254e9a0_NeikiAnalytics.exe"1⤵
- Checks computer location settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2512 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\roxg3hv2\roxg3hv2.cmdline"2⤵
- Suspicious use of WriteProcessMemory
PID:5024 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESF0E8.tmp" "C:\Users\Admin\AppData\Local\Temp\vbcBD741DE36384D7C8CB9C1864B97B413.TMP"3⤵PID:3652
-
C:\Users\Admin\AppData\Local\Temp\tmpE83E.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmpE83E.tmp.exe" C:\Users\Admin\AppData\Local\Temp\6d6545af57f5f07a2686b9b0f254e9a0_NeikiAnalytics.exe2⤵
- Deletes itself
- Executes dropped EXE
PID:3848
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=1400 --field-trial-handle=2256,i,6670388345726423024,18382795228658886258,262144 --variations-seed-version /prefetch:81⤵PID:4532
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD56700082d85f536450fc24a216f995998
SHA11901974a2fc61c6ae410f7577edd4ad1e7a27504
SHA256a8ae2f356604bfbaa549c52c2610a9face88eca8bce3a9ca384a324a5355e08f
SHA512943867aae0ea84dd0dc1613004eb79dd9f8c77d07c76518984f729510b6ea24d59692cafed3b67f02384e08c2f77789fcfe010dfdd56501f59e0e3933358954a
-
Filesize
1KB
MD5358ec5200dc5ac77ba423d9e52ef9ba6
SHA119fb94534bdaaba1a32b72c2d3068b1d81219d03
SHA25629b9527a889ad99a6d4a26f6d1fb3cd2f3324db821c10da1be2e9192fef40165
SHA51224390fd0ad47cf9c6c5212662962162be20bedbb34c24a71e908793f551f1ffadca00668b4cffbc57d3673bd1544d53d2f23d4d53c7f14bfe9089233e5a1313e
-
Filesize
2KB
MD556d5203b9e505bf013d679a84a0da1bb
SHA1470ba2c2318f5a444e9ba442448c446ff77cecff
SHA256508b69f22250633d649ffcb7295cb69f64ddf2ba1e10fddfc4bad1308ca0e0a6
SHA5120a1565e919562d90331606a12736f003bd738c1dba5108a98ef14e870585573d8d196457625ab6c688183b7439648fbf692addc566cfdabbd49c4202b2bce46a
-
Filesize
273B
MD55f5739ff42adce386a94b32d35c8ca60
SHA1dc2b14beda21c410919f67fd948f7f56d9b5ef9c
SHA256cce74f5c151e55751aa00ea5eaf7a7bed03ce226357d89821530b18021829a85
SHA512e522d846444febd5831e537579cfb8d610d7104601f29e46b8df18c6c6b1cfb7ffdbd4fa8ee49affd85b7b592f2acf3d31f3d70cadd5af63e0ccd8c906b77e91
-
Filesize
12KB
MD5e399671cab276f58b22378d6c61a7d52
SHA1ff4851fdfc89f33b1e160c80a001afbad3d851ec
SHA256e9c61ea5516597b12861151afa3a2d2391e41aff5d4af89dfe13d5e7dffe9892
SHA512bf12ec068152c1b9661af23815b565a6ede0927e71e88467c7a27f93aac320e639234653f714a15377dc970a65a44ad67ef645914afdd88c369bc28aad9c126f
-
Filesize
1KB
MD5c9a1f67c4066a2a73c6e607fbca6aabc
SHA187239692b9577626946e7046e80e6d5020088ebb
SHA256cb7e20d87b1258479986da4b00987ed07ab89fa8b20b9e4e328c9cca93682d4d
SHA51244027f321063a32197522a30658726d171153302f80d77bf599732c683686c76c4dfdc4513c717fcae3ed2df51939e195fa76343ce03dc9ee1e2209e432fcc5c