Analysis

  • max time kernel
    142s
  • max time network
    143s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-05-2024 01:33

General

  • Target

    6e5ba601b8835e7b987230b15fb90e70_NeikiAnalytics.exe

  • Size

    2.9MB

  • MD5

    6e5ba601b8835e7b987230b15fb90e70

  • SHA1

    b3abc401a4a61ecab97a05fd22a3fb211240188c

  • SHA256

    0df1f2ab9fbe44cee953fbae00318f186bf33d71e3d7b75c95c7a0d7c3ba26e3

  • SHA512

    980be0d8d5f1d4e465e9082f6dd94894d5156ab068a05e205f0009f8771fc1e169cab6953cd151861cda98a162e7b8e68f3d9198f98797a60aa1997aa6e68058

  • SSDEEP

    49152:cnsHyjtk2MYC5GDDpqzgwIoCnkxkV2a3Y2a17w:cnsmtk2aApqzgwjCnkxkV2AY317w

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 3 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 2 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 5 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6e5ba601b8835e7b987230b15fb90e70_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\6e5ba601b8835e7b987230b15fb90e70_NeikiAnalytics.exe"
    1⤵
    • Checks computer location settings
    • Adds Run key to start application
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:4060
    • C:\Users\Admin\AppData\Local\Temp\._cache_6e5ba601b8835e7b987230b15fb90e70_NeikiAnalytics.exe
      "C:\Users\Admin\AppData\Local\Temp\._cache_6e5ba601b8835e7b987230b15fb90e70_NeikiAnalytics.exe"
      2⤵
      • Executes dropped EXE
      PID:1728
    • C:\ProgramData\Synaptics\Synaptics.exe
      "C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:3260
      • C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe
        "C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe" InjUpdate
        3⤵
        • Executes dropped EXE
        PID:1616
  • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" /automation -Embedding
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:428
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --field-trial-handle=3740,i,3724086843943218842,1026644135694712596,262144 --variations-seed-version --mojo-platform-channel-handle=3252 /prefetch:8
    1⤵
      PID:3080

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\ProgramData\Synaptics\Synaptics.exe

      Filesize

      2.9MB

      MD5

      6e5ba601b8835e7b987230b15fb90e70

      SHA1

      b3abc401a4a61ecab97a05fd22a3fb211240188c

      SHA256

      0df1f2ab9fbe44cee953fbae00318f186bf33d71e3d7b75c95c7a0d7c3ba26e3

      SHA512

      980be0d8d5f1d4e465e9082f6dd94894d5156ab068a05e205f0009f8771fc1e169cab6953cd151861cda98a162e7b8e68f3d9198f98797a60aa1997aa6e68058

    • C:\Users\Admin\AppData\Local\Temp\._cache_6e5ba601b8835e7b987230b15fb90e70_NeikiAnalytics.exe

      Filesize

      2.2MB

      MD5

      dcd3e3a2699d181ecbdd7b5665f1b9a5

      SHA1

      fa9e4c39e4c1370a15c2cf3f73ab50ca1f9db517

      SHA256

      58deaf8336df1dc6c4b6fd7487a3a0dd31247bb943d3a69516eaaf1fc790bdda

      SHA512

      a107b730da6472139ee6af2bab806c90deeb0bec2023c205923f0b7b9fa4473629fe5f03706f41ad72c3edefd901770b56b9a14353d4e099f045ee513faef8d0

    • C:\Users\Admin\AppData\Local\Temp\637PAGIt.xlsm

      Filesize

      17KB

      MD5

      e566fc53051035e1e6fd0ed1823de0f9

      SHA1

      00bc96c48b98676ecd67e81a6f1d7754e4156044

      SHA256

      8e574b4ae6502230c0829e2319a6c146aebd51b7008bf5bbfb731424d7952c15

      SHA512

      a12f56ff30ea35381c2b8f8af2446cf1daa21ee872e98cad4b863db060acd4c33c5760918c277dadb7a490cb4ca2f925d59c70dc5171e16601a11bc4a6542b04

    • memory/428-138-0x00007FFF53B90000-0x00007FFF53BA0000-memory.dmp

      Filesize

      64KB

    • memory/428-137-0x00007FFF53B90000-0x00007FFF53BA0000-memory.dmp

      Filesize

      64KB

    • memory/428-139-0x00007FFF53B90000-0x00007FFF53BA0000-memory.dmp

      Filesize

      64KB

    • memory/428-136-0x00007FFF53B90000-0x00007FFF53BA0000-memory.dmp

      Filesize

      64KB

    • memory/428-135-0x00007FFF53B90000-0x00007FFF53BA0000-memory.dmp

      Filesize

      64KB

    • memory/428-141-0x00007FFF51230000-0x00007FFF51240000-memory.dmp

      Filesize

      64KB

    • memory/428-142-0x00007FFF51230000-0x00007FFF51240000-memory.dmp

      Filesize

      64KB

    • memory/3260-102-0x0000000000840000-0x0000000000841000-memory.dmp

      Filesize

      4KB

    • memory/3260-156-0x0000000000400000-0x00000000006EB000-memory.dmp

      Filesize

      2.9MB

    • memory/3260-161-0x0000000000840000-0x0000000000841000-memory.dmp

      Filesize

      4KB

    • memory/3260-188-0x0000000000400000-0x00000000006EB000-memory.dmp

      Filesize

      2.9MB

    • memory/4060-0-0x0000000002450000-0x0000000002451000-memory.dmp

      Filesize

      4KB

    • memory/4060-101-0x0000000000400000-0x00000000006EB000-memory.dmp

      Filesize

      2.9MB