Analysis
-
max time kernel
133s -
max time network
102s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
27/05/2024, 06:45
Static task
static1
Behavioral task
behavioral1
Sample
235252db5d64931a529eb28ca8fde390_NeikiAnalytics.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
235252db5d64931a529eb28ca8fde390_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
235252db5d64931a529eb28ca8fde390_NeikiAnalytics.exe
-
Size
31KB
-
MD5
235252db5d64931a529eb28ca8fde390
-
SHA1
bc648cb220c1540293b6ecf45c23482be72d9275
-
SHA256
8e5835c157f592744a72a5ad222497ed23a02aacf243fcba49b5ae83add878c3
-
SHA512
b32072c513aed08634987a56288bc32f0192cfa5aa266bfcb2388029fa6c0bc8df09e5cc66e597cf83ac0e6d4f38d9b1270698d3eed938f9f03490c58f63576f
-
SSDEEP
192:KlApk98m4e0/IDJh/5ZQcvoyne4t/PQ3Pw1C0SluWbiWBNEckcVhJriE/mB1:MApc8m4e0GvQak4JI341C0abnk6hJPi
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation 235252db5d64931a529eb28ca8fde390_NeikiAnalytics.exe -
Executes dropped EXE 1 IoCs
pid Process 3120 sal.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created \??\c:\windows\SysWOW64\sal.exe 235252db5d64931a529eb28ca8fde390_NeikiAnalytics.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2812 wrote to memory of 3120 2812 235252db5d64931a529eb28ca8fde390_NeikiAnalytics.exe 84 PID 2812 wrote to memory of 3120 2812 235252db5d64931a529eb28ca8fde390_NeikiAnalytics.exe 84 PID 2812 wrote to memory of 3120 2812 235252db5d64931a529eb28ca8fde390_NeikiAnalytics.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\235252db5d64931a529eb28ca8fde390_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\235252db5d64931a529eb28ca8fde390_NeikiAnalytics.exe"1⤵
- Checks computer location settings
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2812 -
C:\windows\SysWOW64\sal.exe"C:\windows\system32\sal.exe"2⤵
- Executes dropped EXE
PID:3120
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
31KB
MD5983ef30884a3df98e304ccab6fec7743
SHA1c82797209d1df102da2ec1438dda9b88aa396120
SHA2569471edafe68744b99dc67e940f09f74e5d50c8382dc2d8410add3e6bc3d6f931
SHA512dea124058d8a997c70b4615dffd3dd2f02f48b2b586a54b33da8bb6b5dc51f569254811905685778a61be32e8685b9fd5b7bf0069b2045acff2f0130fa7e135b