Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
27-05-2024 01:46
Static task
static1
Behavioral task
behavioral1
Sample
16ae0aa2c1269316be210abd46059fa0_NeikiAnalytics.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
16ae0aa2c1269316be210abd46059fa0_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
16ae0aa2c1269316be210abd46059fa0_NeikiAnalytics.exe
-
Size
4KB
-
MD5
16ae0aa2c1269316be210abd46059fa0
-
SHA1
2bd1032db6cd62542b816dbd0afd7eff7f54d698
-
SHA256
ad2f173f03d0d3fcabd2e12751b59356b572c64b74441c61c0ceb38396fc26c5
-
SHA512
955dd0945296681108cdcb5556620400beaedddbb9c35dc88d80f2889d649f6b8872c7f8dce7bd7080cc08c0f27411ae3b3ed74b797e1e7546463e3f9306f50a
-
SSDEEP
48:Zdni+Wyi18DN0nCvTaE6nc9fhXcGEY3sJd9ga91RsKs+EOnA7B8mOo4jUx7OtKGc:Z0v4mUWKh9ctgC1RMJOnKymV44Sh
Malware Config
Signatures
-
Upatre
Upatre is a generic malware downloader.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation 16ae0aa2c1269316be210abd46059fa0_NeikiAnalytics.exe -
Deletes itself 1 IoCs
pid Process 3320 szgfw.exe -
Executes dropped EXE 1 IoCs
pid Process 3320 szgfw.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4128 wrote to memory of 3320 4128 16ae0aa2c1269316be210abd46059fa0_NeikiAnalytics.exe 84 PID 4128 wrote to memory of 3320 4128 16ae0aa2c1269316be210abd46059fa0_NeikiAnalytics.exe 84 PID 4128 wrote to memory of 3320 4128 16ae0aa2c1269316be210abd46059fa0_NeikiAnalytics.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\16ae0aa2c1269316be210abd46059fa0_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\16ae0aa2c1269316be210abd46059fa0_NeikiAnalytics.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4128 -
C:\Users\Admin\AppData\Local\Temp\szgfw.exe"C:\Users\Admin\AppData\Local\Temp\szgfw.exe"2⤵
- Deletes itself
- Executes dropped EXE
PID:3320
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4KB
MD576b1c3f0ed6a48184f88eccf5f39bfc3
SHA1c503185b54b838145e47920c8b3ddee6a83551ec
SHA2564f871770f04788a583f5407db408b0db222bdd1afb6080075bab59f1413b57b5
SHA5122b283a91be6954875f216619411bdc4a0725bf0f716d4f3283fa7acc14f7a47a512b8a8cb1433a181bba2f653b70156348a69e5a36d1ee373fefbcd9e29b9f17