Analysis

  • max time kernel
    150s
  • max time network
    123s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24-05-2024 04:59

General

  • Target

    add31980a5ab936ef2587cd0241a92b0_NeikiAnalytics.exe

  • Size

    53KB

  • MD5

    add31980a5ab936ef2587cd0241a92b0

  • SHA1

    aea631aabaf634edf80237efb38e55c5a5ab5b3e

  • SHA256

    5a008594118c8a7436827d5c6fb277f9c38106fba60f700d126ab437a56f41ab

  • SHA512

    ba4b45223ce433e3cf2567fc3a3e2097ec6e8923f3767838783648346456c301148b1583622e5a4757885a999e2643d88080d98a37ad01ed3eb7e80bd3d78fbb

  • SSDEEP

    1536:vNvg8r8Q6CUS/X7Kp3StjEMjmLM3ztDJWZsXy4JzxPMU:ECUS/XJJjmLM3zRJWZsXy4Jd

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\add31980a5ab936ef2587cd0241a92b0_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\add31980a5ab936ef2587cd0241a92b0_NeikiAnalytics.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3304
    • C:\Users\Admin\qiotoo.exe
      "C:\Users\Admin\qiotoo.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2508

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\qiotoo.exe

    Filesize

    53KB

    MD5

    1c4ec15da61718d7349b50fa37f75cc8

    SHA1

    f13b8ef2eedf8afed577a25a5d63846f80ad1aae

    SHA256

    e8f878a8c2d444a6cef7a5365c3b1da3fb443d7cf00acc4b18c0f3f98086bf4f

    SHA512

    d5168e623cea7f0a8ad9f7d9961b545de55be12f58509a058fdfe693a3ec6f3b501a8041355172c8b31cdcfaaef4d875a601938fe08abf7b3ec11f12d3828cf9

  • memory/2508-33-0x0000000000400000-0x0000000000412000-memory.dmp

    Filesize

    72KB

  • memory/3304-0-0x0000000000400000-0x0000000000412000-memory.dmp

    Filesize

    72KB