Analysis
-
max time kernel
133s -
max time network
123s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
26-05-2024 04:16
Static task
static1
Behavioral task
behavioral1
Sample
639cfdfbff010fd8867a0511ee819750_NeikiAnalytics.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
639cfdfbff010fd8867a0511ee819750_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
639cfdfbff010fd8867a0511ee819750_NeikiAnalytics.exe
-
Size
1.4MB
-
MD5
639cfdfbff010fd8867a0511ee819750
-
SHA1
73d6e2c9c605eafb3ee260c047a83d69622a2c6a
-
SHA256
3b6154ebe6f99baa90e7c7c2a73d47898eed72d548b90b32b916eca4f0c830fe
-
SHA512
4541e3080e31e108d3027042b93e2b4d3facbbc83a088c07dd479dc2e6fd54ce282601755ce6bdd388e7f858f945170aa2fabf0b0d60636a01550b634b3c0bd4
-
SSDEEP
24576:BD39v74lfGQrFUspugRNJI2DJ53J/J/L5dJPjoA:Bp7E+QrFUBgq29
Malware Config
Extracted
remcos
Host
213.183.58.19:4000
-
audio_folder
audio
-
audio_path
%AppData%
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
5
-
copy_file
remcos.exe
-
copy_folder
remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
true
-
install_flag
false
-
install_path
%AppData%
-
keylog_crypt
true
-
keylog_file
read.dat
-
keylog_flag
false
-
keylog_folder
CastC
-
keylog_path
%AppData%
-
mouse_option
false
-
mutex
remcos_sccafsoidz
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screens
-
screenshot_path
%AppData%
-
screenshot_time
1
-
startup_value
remcos
-
take_screenshot_option
false
-
take_screenshot_time
5
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
639cfdfbff010fd8867a0511ee819750_NeikiAnalytics.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation 639cfdfbff010fd8867a0511ee819750_NeikiAnalytics.exe -
Executes dropped EXE 2 IoCs
Processes:
sbietrcl.exesbietrcl.exepid process 1972 sbietrcl.exe 3128 sbietrcl.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
639cfdfbff010fd8867a0511ee819750_NeikiAnalytics.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Application = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\Templates\\sbietrcl.exe" 639cfdfbff010fd8867a0511ee819750_NeikiAnalytics.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
sbietrcl.exedescription pid process target process PID 1972 set thread context of 3128 1972 sbietrcl.exe sbietrcl.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 12 IoCs
Processes:
639cfdfbff010fd8867a0511ee819750_NeikiAnalytics.exesbietrcl.exepid process 996 639cfdfbff010fd8867a0511ee819750_NeikiAnalytics.exe 996 639cfdfbff010fd8867a0511ee819750_NeikiAnalytics.exe 996 639cfdfbff010fd8867a0511ee819750_NeikiAnalytics.exe 996 639cfdfbff010fd8867a0511ee819750_NeikiAnalytics.exe 996 639cfdfbff010fd8867a0511ee819750_NeikiAnalytics.exe 996 639cfdfbff010fd8867a0511ee819750_NeikiAnalytics.exe 1972 sbietrcl.exe 1972 sbietrcl.exe 1972 sbietrcl.exe 1972 sbietrcl.exe 1972 sbietrcl.exe 1972 sbietrcl.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
639cfdfbff010fd8867a0511ee819750_NeikiAnalytics.exesbietrcl.exedescription pid process Token: SeDebugPrivilege 996 639cfdfbff010fd8867a0511ee819750_NeikiAnalytics.exe Token: SeDebugPrivilege 1972 sbietrcl.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
639cfdfbff010fd8867a0511ee819750_NeikiAnalytics.exesbietrcl.exedescription pid process target process PID 996 wrote to memory of 1972 996 639cfdfbff010fd8867a0511ee819750_NeikiAnalytics.exe sbietrcl.exe PID 996 wrote to memory of 1972 996 639cfdfbff010fd8867a0511ee819750_NeikiAnalytics.exe sbietrcl.exe PID 996 wrote to memory of 1972 996 639cfdfbff010fd8867a0511ee819750_NeikiAnalytics.exe sbietrcl.exe PID 1972 wrote to memory of 3128 1972 sbietrcl.exe sbietrcl.exe PID 1972 wrote to memory of 3128 1972 sbietrcl.exe sbietrcl.exe PID 1972 wrote to memory of 3128 1972 sbietrcl.exe sbietrcl.exe PID 1972 wrote to memory of 3128 1972 sbietrcl.exe sbietrcl.exe PID 1972 wrote to memory of 3128 1972 sbietrcl.exe sbietrcl.exe PID 1972 wrote to memory of 3128 1972 sbietrcl.exe sbietrcl.exe PID 1972 wrote to memory of 3128 1972 sbietrcl.exe sbietrcl.exe PID 1972 wrote to memory of 3128 1972 sbietrcl.exe sbietrcl.exe PID 1972 wrote to memory of 3128 1972 sbietrcl.exe sbietrcl.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\639cfdfbff010fd8867a0511ee819750_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\639cfdfbff010fd8867a0511ee819750_NeikiAnalytics.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:996 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\sbietrcl.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\sbietrcl.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1972 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\sbietrcl.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\sbietrcl.exe"3⤵
- Executes dropped EXE
PID:3128
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.4MB
MD5824a11b6a9b09b598bb59078c97f1587
SHA145b90a88e8ed27ea501b5283ed4f6b2e79ccd4d1
SHA256eb3bc96a26c01ea01d05d856d270ca420acc0dc620c4a5d31b5d54b25418e48c
SHA512ca3d5969e51e8716349d51aeaabd26f8f5caa3471bdcb9bb1b79f67f1a7ac36da5259669230f21c0ee3b80b72b9e975f8bdc562b019bf586a4dc24f687f39b8b