Analysis

  • max time kernel
    149s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26/05/2024, 00:02

General

  • Target

    3b20406ddd0c99d5d30b98ace4cfb420_NeikiAnalytics.exe

  • Size

    92KB

  • MD5

    3b20406ddd0c99d5d30b98ace4cfb420

  • SHA1

    17a0a2992119eef6f100f9634bbd7326551b227d

  • SHA256

    fe722a7aea3b7badc22d80cf2056d09cd8248a9ed1c63ca9417e2a40bf0d7dfa

  • SHA512

    963ea03d4a4604d6fe2628173c5db46ee40b327d63bcf548d83b440784c3fd1677ed7ea8f702c5bddc5d5afb7c553bfbbc602387f20edf387d48d756168fc510

  • SSDEEP

    1536:Ow0BdeTxqaLb+J0wonDsIy39L3DkmsmL8Faj2:OJd4cae+lA/x3DkmXkK

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3b20406ddd0c99d5d30b98ace4cfb420_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\3b20406ddd0c99d5d30b98ace4cfb420_NeikiAnalytics.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:3008
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\system32\cmd.exe" /q /c "C:\Users\Admin\AppData\Local\Temp\Obp..bat" > nul 2> nul
      2⤵
        PID:1636

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\Obp..bat

            Filesize

            240B

            MD5

            31a5057191deb4e060e06038dc0d2ca2

            SHA1

            52395085685018666cf90a5444436b57a037d942

            SHA256

            60dd58e31f1696b3109c3c5a7c8a60930477a17dd317e483e198c7d159679b06

            SHA512

            489f8e865f2550ab2a1e615264f571dc158eb9fa564c6c14d1afe2d43f3e1f0d090d9f550ae23c7d0dbb1fb3c0f41e131f0fca93d031d8dffd0f11ea15f33d6f

          • memory/3008-0-0x00000000023A0000-0x00000000023BB000-memory.dmp

            Filesize

            108KB

          • memory/3008-1-0x0000000000400000-0x000000000041A000-memory.dmp

            Filesize

            104KB

          • memory/3008-3-0x0000000000400000-0x000000000041A000-memory.dmp

            Filesize

            104KB