Analysis
-
max time kernel
93s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
27/05/2024, 17:55
Static task
static1
Behavioral task
behavioral1
Sample
06bc72d9ef565b06e4498a6268e833a0_NeikiAnalytics.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
06bc72d9ef565b06e4498a6268e833a0_NeikiAnalytics.exe
Resource
win10v2004-20240426-en
General
-
Target
06bc72d9ef565b06e4498a6268e833a0_NeikiAnalytics.exe
-
Size
12KB
-
MD5
06bc72d9ef565b06e4498a6268e833a0
-
SHA1
c8ecccd08e945c073aae75995a0f9f223c858a8a
-
SHA256
035e7ac3415ccaa74b6e96764c1d0e56a24e29da4b92e0b8ba94a065be066d0b
-
SHA512
7ddf67fe6eb29aaec05bf82b90f147c9690ef28b195d0562188f7ee07f76481896a27959a9a81c424f62934dcafef82df5e73410b42ac6264fe2aca5f40d621b
-
SSDEEP
384:XL7li/2zjq2DcEQvdhcJKLTp/NK9xaOcF:b/M/Q9cXF
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\Control Panel\International\Geo\Nation 06bc72d9ef565b06e4498a6268e833a0_NeikiAnalytics.exe -
Deletes itself 1 IoCs
pid Process 3672 tmp43B1.tmp.exe -
Executes dropped EXE 1 IoCs
pid Process 3672 tmp43B1.tmp.exe -
Uses the VBS compiler for execution 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1892 06bc72d9ef565b06e4498a6268e833a0_NeikiAnalytics.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1892 wrote to memory of 2820 1892 06bc72d9ef565b06e4498a6268e833a0_NeikiAnalytics.exe 86 PID 1892 wrote to memory of 2820 1892 06bc72d9ef565b06e4498a6268e833a0_NeikiAnalytics.exe 86 PID 1892 wrote to memory of 2820 1892 06bc72d9ef565b06e4498a6268e833a0_NeikiAnalytics.exe 86 PID 2820 wrote to memory of 3660 2820 vbc.exe 88 PID 2820 wrote to memory of 3660 2820 vbc.exe 88 PID 2820 wrote to memory of 3660 2820 vbc.exe 88 PID 1892 wrote to memory of 3672 1892 06bc72d9ef565b06e4498a6268e833a0_NeikiAnalytics.exe 89 PID 1892 wrote to memory of 3672 1892 06bc72d9ef565b06e4498a6268e833a0_NeikiAnalytics.exe 89 PID 1892 wrote to memory of 3672 1892 06bc72d9ef565b06e4498a6268e833a0_NeikiAnalytics.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\06bc72d9ef565b06e4498a6268e833a0_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\06bc72d9ef565b06e4498a6268e833a0_NeikiAnalytics.exe"1⤵
- Checks computer location settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1892 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\ec3rhlwg\ec3rhlwg.cmdline"2⤵
- Suspicious use of WriteProcessMemory
PID:2820 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES4508.tmp" "C:\Users\Admin\AppData\Local\Temp\vbcA56D3713C22E463493B11B547656EE96.TMP"3⤵PID:3660
-
-
-
C:\Users\Admin\AppData\Local\Temp\tmp43B1.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp43B1.tmp.exe" C:\Users\Admin\AppData\Local\Temp\06bc72d9ef565b06e4498a6268e833a0_NeikiAnalytics.exe2⤵
- Deletes itself
- Executes dropped EXE
PID:3672
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD5f1aa5c432a8d836774b188d7f56dfaa3
SHA1bebd99db499cba57c71d2b7690e283e0d373712f
SHA256d8eaaaec34a31027c2a815b890fee4492ac3ce1d7996917abe272aef0f459e37
SHA5124b841e3bd3d2767d1d5df51bbcb81a2f57c7135e4fb1d279d55677c681d4ecef9f6b49b922bb02fa479c7a118bfb0b24fd3bb97e3feb659da62f12d4e88e2356
-
Filesize
1KB
MD5f6352f3df5f7beafe988137d8014d503
SHA19569615c13bb7e3a86e2a41e6643eed1e222fe49
SHA2567b3fbcc101a93bf978de25b449069a827c98f050a5feef981c0648fcf58285d6
SHA5123afbfc77f92182119f4d15e00507a3c00a99a3780013affd92cdcbd8c7650429b062ce6e4b45332f34f5d7874145e0fb9c47877939b9ab5ba1be0645714ae3a3
-
Filesize
2KB
MD5e1c8e59ac67a6094745876efb2b804c0
SHA19d8b17fda940ba9c87734890d165f23f21bb2f54
SHA25672453b5e3b5e0530714f5961fa4fb304f91b10c5428fc0dca2255cf3ea0db570
SHA51211ea5a32991f7aff02295dac215a7acd17d6b63d1e708575a8784e3638d235a9e9cb574bdfe038961d992d248222a35e51b625fc606fa61735de1116f8d9ea12
-
Filesize
273B
MD551a8b2865aa087909cc61b6816b66a5c
SHA16790824a5de98f9efa6b2b231a74f8b7076cec99
SHA25608ca6501d8659be11eaffad45bcba3899109044955b107ea5e6bf8b60b6bcee7
SHA512d2a3e1d85397d40184c68e21e53319353c2fef32dee494e84181045f4a24efb594abf0138859913a039a3e460285add3fd4fac0dc9f019fdb899c44e01407164
-
Filesize
12KB
MD509184b547550a30028605e4a74b5b6a7
SHA1fc23e7b165207c9e1009dc218f07485f60ccdf05
SHA256bc70262da76938b4660fe0a2235cb9d6721ae373027ee0e2e8c1e8e836d06113
SHA512274bc639372db7aaba11dd3447aed275e21e3ff50adc9a42cb0ab7a377dfc611c9e51ff0af4f0bc57a4239c8e9db70c91d45adcb3f22d0726c6937db79d1b95e
-
Filesize
1KB
MD5d7405c6b55555ad506d338b21c87d8af
SHA1ea0c849fd1df731e66f51f1050371c5a8f8972e0
SHA256a771073ab3a5503058c6509b8f28264b4d20be01a5b0ec4a5c2bc25caa9bb8a3
SHA512944b752f5394cd43458e23bb647c3dd335d1cf6aa34279ca8b7523e65ab3dd38d0d9b16956701f3f6774f8e5eeae7fa405675cf4d4da17140a3b6dc2e6f3f29e