Analysis

  • max time kernel
    141s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26/05/2024, 06:28

General

  • Target

    7ca18fda2c02326a5c41c3415618fa60_NeikiAnalytics.exe

  • Size

    80KB

  • MD5

    7ca18fda2c02326a5c41c3415618fa60

  • SHA1

    ff4b7d74736e954231f9f1d7f06c99ec9e66659a

  • SHA256

    fdfddb7f7154f2908ff636c9759eab6127218046ee4dda576eb3074be487ed66

  • SHA512

    5556f6c634648d7760f22067728c679a996365703440867b7bd9626bb8f6d59eed29ef500e102e31e7b9107c90bd1bb21e546934e14ba8572aa4443b73c9bb06

  • SSDEEP

    1536:bDcWLfIbgEp10gyX/dtnTHNWnnn6222227:bDXL0n0gyX/d1re22227

Score
8/10

Malware Config

Signatures

  • Sets file to hidden 1 TTPs 1 IoCs

    Modifies file attributes to stop it showing in Explorer etc.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Drops file in Windows directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs
  • Views/modifies file attributes 1 TTPs 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7ca18fda2c02326a5c41c3415618fa60_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\7ca18fda2c02326a5c41c3415618fa60_NeikiAnalytics.exe"
    1⤵
    • Checks computer location settings
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2060
    • C:\Windows\SysWOW64\attrib.exe
      attrib +a +s +h +r C:\Windows\Debug\smahost.exe
      2⤵
      • Sets file to hidden
      • Drops file in Windows directory
      • Views/modifies file attributes
      PID:2548
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\7CA18F~1.EXE > nul
      2⤵
        PID:3020
    • C:\Windows\Debug\smahost.exe
      C:\Windows\Debug\smahost.exe
      1⤵
      • Executes dropped EXE
      • Checks processor information in registry
      PID:4520

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Windows\debug\smahost.exe

      Filesize

      80KB

      MD5

      b3bd39acd62306225ae84f0d0b641181

      SHA1

      4bf379aa2d73e55971c601aafeb5f02ae2538fde

      SHA256

      6991421ec16c94e5eddca409a9d8bea4bbfcd8beb0373cb7e03ae4b20e54f412

      SHA512

      0682686aadb80a6f57154cb1f9ed5d7dd037c1473e145d8583fdbcf8fc935a93bbf37ca86c62216c73bbb98c0f7b4529838af70fc56bae3d126f848290590421

    • memory/2060-0-0x0000000000400000-0x0000000000410000-memory.dmp

      Filesize

      64KB

    • memory/2060-5-0x0000000000400000-0x0000000000410000-memory.dmp

      Filesize

      64KB

    • memory/4520-6-0x0000000000400000-0x0000000000410000-memory.dmp

      Filesize

      64KB