Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
28/05/2024, 08:41
Static task
static1
Behavioral task
behavioral1
Sample
3b9e0346ac4522c0778ccaf272668510_NeikiAnalytics.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
3b9e0346ac4522c0778ccaf272668510_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
3b9e0346ac4522c0778ccaf272668510_NeikiAnalytics.exe
-
Size
52KB
-
MD5
3b9e0346ac4522c0778ccaf272668510
-
SHA1
193c3adb4dd1f7292048eb47e26bc47be3f3030b
-
SHA256
a661734451170b277591255a719af1d3b43d263cbb7f322b6496f0a09f66fc59
-
SHA512
d0802e64c613db7a4877f6a0b33db9485a158a91140cb1f6f51362254ba3168820cd19e45d4f2477fe1fc557e963905e20d36beb02a81ce972a39f4207058bb9
-
SSDEEP
768:373OtJDvhzNsyXk58sCuSw26eWp12hzORvmGpYO1oN6GO3bIMp6nM:3a/DvVNe58kSw2tw21ORvm7M3UlM
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation 3b9e0346ac4522c0778ccaf272668510_NeikiAnalytics.exe -
Executes dropped EXE 1 IoCs
pid Process 3168 pdfmarks.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1852 wrote to memory of 3168 1852 3b9e0346ac4522c0778ccaf272668510_NeikiAnalytics.exe 83 PID 1852 wrote to memory of 3168 1852 3b9e0346ac4522c0778ccaf272668510_NeikiAnalytics.exe 83 PID 1852 wrote to memory of 3168 1852 3b9e0346ac4522c0778ccaf272668510_NeikiAnalytics.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\3b9e0346ac4522c0778ccaf272668510_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\3b9e0346ac4522c0778ccaf272668510_NeikiAnalytics.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1852 -
C:\Users\Admin\AppData\Local\Temp\pdfmarks.exe"C:\Users\Admin\AppData\Local\Temp\pdfmarks.exe"2⤵
- Executes dropped EXE
PID:3168
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
52KB
MD5e027b5eaeecde3dab87d9926adcca918
SHA19fc1335b2f41cace32d747d09bc4e0573ab6798a
SHA256f78410037771790447cae4df9d350278932adb01b5caa546fef68e77bcdc57ba
SHA5125dd7a3124531a1c186c7588e42f12c57584f7ce84584bf86faf4b9918204f2d2da148865e9389e4de77f85d6ea56d7999d629fdc435c5a3b50c1e08877b4b842