Analysis

  • max time kernel
    150s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27-05-2024 01:46

General

  • Target

    16ae0aa2c1269316be210abd46059fa0_NeikiAnalytics.exe

  • Size

    4KB

  • MD5

    16ae0aa2c1269316be210abd46059fa0

  • SHA1

    2bd1032db6cd62542b816dbd0afd7eff7f54d698

  • SHA256

    ad2f173f03d0d3fcabd2e12751b59356b572c64b74441c61c0ceb38396fc26c5

  • SHA512

    955dd0945296681108cdcb5556620400beaedddbb9c35dc88d80f2889d649f6b8872c7f8dce7bd7080cc08c0f27411ae3b3ed74b797e1e7546463e3f9306f50a

  • SSDEEP

    48:Zdni+Wyi18DN0nCvTaE6nc9fhXcGEY3sJd9ga91RsKs+EOnA7B8mOo4jUx7OtKGc:Z0v4mUWKh9ctgC1RMJOnKymV44Sh

Score
10/10

Malware Config

Signatures

  • Upatre

    Upatre is a generic malware downloader.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\16ae0aa2c1269316be210abd46059fa0_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\16ae0aa2c1269316be210abd46059fa0_NeikiAnalytics.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:4128
    • C:\Users\Admin\AppData\Local\Temp\szgfw.exe
      "C:\Users\Admin\AppData\Local\Temp\szgfw.exe"
      2⤵
      • Deletes itself
      • Executes dropped EXE
      PID:3320

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\szgfw.exe

    Filesize

    4KB

    MD5

    76b1c3f0ed6a48184f88eccf5f39bfc3

    SHA1

    c503185b54b838145e47920c8b3ddee6a83551ec

    SHA256

    4f871770f04788a583f5407db408b0db222bdd1afb6080075bab59f1413b57b5

    SHA512

    2b283a91be6954875f216619411bdc4a0725bf0f716d4f3283fa7acc14f7a47a512b8a8cb1433a181bba2f653b70156348a69e5a36d1ee373fefbcd9e29b9f17