Analysis

  • max time kernel
    133s
  • max time network
    102s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27/05/2024, 06:45

General

  • Target

    235252db5d64931a529eb28ca8fde390_NeikiAnalytics.exe

  • Size

    31KB

  • MD5

    235252db5d64931a529eb28ca8fde390

  • SHA1

    bc648cb220c1540293b6ecf45c23482be72d9275

  • SHA256

    8e5835c157f592744a72a5ad222497ed23a02aacf243fcba49b5ae83add878c3

  • SHA512

    b32072c513aed08634987a56288bc32f0192cfa5aa266bfcb2388029fa6c0bc8df09e5cc66e597cf83ac0e6d4f38d9b1270698d3eed938f9f03490c58f63576f

  • SSDEEP

    192:KlApk98m4e0/IDJh/5ZQcvoyne4t/PQ3Pw1C0SluWbiWBNEckcVhJriE/mB1:MApc8m4e0GvQak4JI341C0abnk6hJPi

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Drops file in System32 directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\235252db5d64931a529eb28ca8fde390_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\235252db5d64931a529eb28ca8fde390_NeikiAnalytics.exe"
    1⤵
    • Checks computer location settings
    • Drops file in System32 directory
    • Suspicious use of WriteProcessMemory
    PID:2812
    • C:\windows\SysWOW64\sal.exe
      "C:\windows\system32\sal.exe"
      2⤵
      • Executes dropped EXE
      PID:3120

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Windows\SysWOW64\sal.exe

          Filesize

          31KB

          MD5

          983ef30884a3df98e304ccab6fec7743

          SHA1

          c82797209d1df102da2ec1438dda9b88aa396120

          SHA256

          9471edafe68744b99dc67e940f09f74e5d50c8382dc2d8410add3e6bc3d6f931

          SHA512

          dea124058d8a997c70b4615dffd3dd2f02f48b2b586a54b33da8bb6b5dc51f569254811905685778a61be32e8685b9fd5b7bf0069b2045acff2f0130fa7e135b

        • memory/2812-1-0x0000000000400000-0x0000000000409000-memory.dmp

          Filesize

          36KB

        • memory/3120-8-0x0000000000400000-0x0000000000409000-memory.dmp

          Filesize

          36KB

        • memory/3120-10-0x0000000000400000-0x0000000000409000-memory.dmp

          Filesize

          36KB