Analysis

  • max time kernel
    129s
  • max time network
    126s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-05-2024 01:53

General

  • Target

    71f440955fb2c27ea03f185d37f97a50_NeikiAnalytics.exe

  • Size

    41KB

  • MD5

    71f440955fb2c27ea03f185d37f97a50

  • SHA1

    447040c3058a20e69339c43d8a6d83441b2c8814

  • SHA256

    764ab83124ba3e11b7af7b174623f824101bd6caa80a565a6468e035314b7154

  • SHA512

    496872635730ebf6e1f5d03f14a711111fc30ca7d69dc340e6989538354cd53d4d4c9800609bf2bcd9f61d426f832833f76e0cf685bc1a0e445ac84bcb77a3f1

  • SSDEEP

    768:MApQr0ovdFJI34eGxusOy9Rp1pLeAxoeC48PqK1h7:MAaDJlMsh7pWezq

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Drops file in System32 directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\71f440955fb2c27ea03f185d37f97a50_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\71f440955fb2c27ea03f185d37f97a50_NeikiAnalytics.exe"
    1⤵
    • Checks computer location settings
    • Drops file in System32 directory
    • Suspicious use of WriteProcessMemory
    PID:1720
    • C:\windows\SysWOW64\sal.exe
      "C:\windows\system32\sal.exe"
      2⤵
      • Executes dropped EXE
      PID:468

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\sal.exe

    Filesize

    41KB

    MD5

    8270b006ebbb60df5bc2c29495b8fe18

    SHA1

    138484e63d150e60f1bf7ca80ea424e66f7146ed

    SHA256

    3f68648417cb4619ab96118df11f6bb525a19276672c8e91db98a07b130793ab

    SHA512

    08627e9dcc5bad90593bd935e0e10803eea8beb1a633d2642aadbc24623c9ba165c9d0baff6c61943046b7cda32ff92c6615b83a12a759f0e9b2cde2c0d2971b

  • memory/468-10-0x0000000000400000-0x0000000000409000-memory.dmp

    Filesize

    36KB

  • memory/1720-1-0x0000000000400000-0x0000000000409000-memory.dmp

    Filesize

    36KB

  • memory/1720-9-0x0000000000400000-0x0000000000409000-memory.dmp

    Filesize

    36KB