Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27-05-2024 20:16

General

  • Target

    16d198ca2b1f719d9405e9da959dcc30_NeikiAnalytics.exe

  • Size

    53KB

  • MD5

    16d198ca2b1f719d9405e9da959dcc30

  • SHA1

    ef183037f9d3c1ff4717ae16d5e67cccb2ef9c14

  • SHA256

    741a05eba3488de5a1dd2ab19f88ece45ac69d3df279deca173e40414243942c

  • SHA512

    9656a86c41d9c84cde06312ac29a674c1021938c9c21362b7905c4defe4478442370c7800b6f47df105a70160c912e532384f044de0f0a888636eef68ad4b3a7

  • SSDEEP

    1536:vNfg8r8QEydz2Af7Kp3StjEMjmLM3ztDJWZsXy4JzxPMk:GyddJJjmLM3zRJWZsXy4JN

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\16d198ca2b1f719d9405e9da959dcc30_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\16d198ca2b1f719d9405e9da959dcc30_NeikiAnalytics.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2744
    • C:\Users\Admin\yeioki.exe
      "C:\Users\Admin\yeioki.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:744

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\yeioki.exe

    Filesize

    53KB

    MD5

    bfeeaaa4d88cc1307a580a9098888e76

    SHA1

    0adae96c815ac88643cfbc6c65ed6235b524bb13

    SHA256

    159b7915528850ed2dfe31990282d803d3a918a60ab8fd9d4ccbe3582ec298b5

    SHA512

    044af93808475b50696570edd5b4fed97880b13acd10e646baea424f575a863dce486bb87c18b74c2e5c41b2ab92166403de30d3eae6f74c0596dbe09db09bf1

  • memory/744-34-0x0000000000400000-0x0000000000412000-memory.dmp

    Filesize

    72KB

  • memory/2744-0-0x0000000000400000-0x0000000000412000-memory.dmp

    Filesize

    72KB