Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29-05-2024 23:42

General

  • Target

    5af1662476acf0f2c48eb894ef7e8b00_NeikiAnalytics.exe

  • Size

    94KB

  • MD5

    5af1662476acf0f2c48eb894ef7e8b00

  • SHA1

    f3d53cd0e28606f3fc70cbd3110541edb71bc441

  • SHA256

    fa3da96c0adf663ad371ce41a8b41cb0519e7e306a9ff453cb0a3a22a092491a

  • SHA512

    9c6fadf28d5059ff5234ed3684eda32f9325c4dcee9869b0bee64c1ae51b66b51435d731012aae2fb36ec850a142f79b7b813921ecbe653268941c986cddb733

  • SSDEEP

    1536:Udsah74bTxku0WlxDMtiJEVKH/tEzXwdt7:0ho2IfpJEVKH1KAd9

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5af1662476acf0f2c48eb894ef7e8b00_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\5af1662476acf0f2c48eb894ef7e8b00_NeikiAnalytics.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:184
    • C:\Users\Admin\jfliep.exe
      "C:\Users\Admin\jfliep.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:4388

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\jfliep.exe

    Filesize

    94KB

    MD5

    29c80ea93a949f807a64a9d069211b84

    SHA1

    aa4ae4d49b08a93c5a379a3b3ece433ba51dec7c

    SHA256

    dd8a9b6fb808b9598444bedb7fda6977a5ea8fbbaf7cda2c97062311d988d15d

    SHA512

    6599abd5e93fec271972a89948bfe13ab19ce251f93ff88e6623a584e8a988b891c1affefcd60fae98376cbdd55f72177029d84e704db5b36cdc2695a698d45b

  • memory/184-0-0x0000000000400000-0x000000000041C000-memory.dmp

    Filesize

    112KB

  • memory/184-37-0x0000000000400000-0x000000000041C000-memory.dmp

    Filesize

    112KB

  • memory/4388-34-0x0000000000400000-0x000000000041C000-memory.dmp

    Filesize

    112KB

  • memory/4388-38-0x0000000000400000-0x000000000041C000-memory.dmp

    Filesize

    112KB