Analysis
-
max time kernel
135s -
max time network
106s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
23-05-2024 03:21
Static task
static1
Behavioral task
behavioral1
Sample
815e66cd30f5cf0e569245cd9408e940_NeikiAnalytics.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
815e66cd30f5cf0e569245cd9408e940_NeikiAnalytics.exe
Resource
win10v2004-20240426-en
General
-
Target
815e66cd30f5cf0e569245cd9408e940_NeikiAnalytics.exe
-
Size
280KB
-
MD5
815e66cd30f5cf0e569245cd9408e940
-
SHA1
344adc99cc2e69d748cba72d0c27cae203534a7d
-
SHA256
a537775693835bcb7faf5df32a53cc4b0e13ca1ad654b9d4ecb594783e5c70f9
-
SHA512
e70583b1e5254ea0cdc9b8642a0aa9af41162207bfaf5661f0c419a939f9ea0a51415231ffd9ee6e038bd647725a8660f41ec7a397edf053fda8c6d2c657e1a4
-
SSDEEP
6144:boy5p178U0MURaGyNXYWQzHazRfXrwSRnWwhrQ66fKkfo:boSeGUA5YZazpXUmZhZ6S5
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
815e66cd30f5cf0e569245cd9408e940_NeikiAnalytics.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\Control Panel\International\Geo\Nation 815e66cd30f5cf0e569245cd9408e940_NeikiAnalytics.exe -
Executes dropped EXE 1 IoCs
Processes:
a1punf5t2of.exepid process 540 a1punf5t2of.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
815e66cd30f5cf0e569245cd9408e940_NeikiAnalytics.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\b1b2dqljdx3 = "C:\\Users\\Admin\\AppData\\Roaming\\b1b2dqljdx3\\a1punf5t2of.exe" 815e66cd30f5cf0e569245cd9408e940_NeikiAnalytics.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
815e66cd30f5cf0e569245cd9408e940_NeikiAnalytics.exea1punf5t2of.exedescription pid process target process PID 3988 wrote to memory of 540 3988 815e66cd30f5cf0e569245cd9408e940_NeikiAnalytics.exe a1punf5t2of.exe PID 3988 wrote to memory of 540 3988 815e66cd30f5cf0e569245cd9408e940_NeikiAnalytics.exe a1punf5t2of.exe PID 3988 wrote to memory of 540 3988 815e66cd30f5cf0e569245cd9408e940_NeikiAnalytics.exe a1punf5t2of.exe PID 540 wrote to memory of 2088 540 a1punf5t2of.exe a1punf5t2of.exe PID 540 wrote to memory of 2088 540 a1punf5t2of.exe a1punf5t2of.exe PID 540 wrote to memory of 2088 540 a1punf5t2of.exe a1punf5t2of.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\815e66cd30f5cf0e569245cd9408e940_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\815e66cd30f5cf0e569245cd9408e940_NeikiAnalytics.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3988 -
C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe"C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:540 -
C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe"C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe"3⤵PID:2088
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
280KB
MD521536d4bdd37c06530953577e932960e
SHA1924c893b178466f3b7f0edeabaf3684aca055940
SHA256741cb464e7b0d73afdfcfb32c2b7a6fd5a6a75956f5e8e5b25b530c1dee1c9af
SHA512893cbc4b1b70684c2b26706378d46fea211570ed61016aabce87e9dfd052258f4f8a210e49ab9ab1235a4366fe20d8329d67b81dc094dee333417c917f2c61d9