Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29/05/2024, 02:37

General

  • Target

    3084128dd081718b283ed6d53fb9fd80_NeikiAnalytics.exe

  • Size

    53KB

  • MD5

    3084128dd081718b283ed6d53fb9fd80

  • SHA1

    b56ee9d1f8a95985080aee0c939668853d37a9ac

  • SHA256

    7c2b1422bc02826ae5a30984a52a281ea5dbe071a2c3614a26c5097bf2de1f9e

  • SHA512

    3b4047a54aa9f47f9a2b194eecf17e79aad98050a3dcc6895b736a7679460b04d0053c837089701c34026a287e7280e0eb02023ab8daad89e6651d7f2e12a921

  • SSDEEP

    1536:vNOg8r8QHFc1yo7Kp3StjEMjmLM3ztDJWZsXy4JzxPMk:KFcooJJjmLM3zRJWZsXy4Jt

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3084128dd081718b283ed6d53fb9fd80_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\3084128dd081718b283ed6d53fb9fd80_NeikiAnalytics.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:5112
    • C:\Users\Admin\nioci.exe
      "C:\Users\Admin\nioci.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2436

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\nioci.exe

    Filesize

    53KB

    MD5

    d74a66bfda9410b4ad0d391998ecc420

    SHA1

    a76761836e2792c9a7a1d0227a9882e698eea909

    SHA256

    9624cf9a6cc47d2af48df3afafe69403418ed1c0a139703172666bdbaf188614

    SHA512

    caae271a9af2b82513885c65e6e835b1741dee6943bef612011eae2c33665b7188935175c3ebda77144261ef06599344ce6af839a6defbdfbd9cfcc447a32b75

  • memory/2436-34-0x0000000000400000-0x0000000000412000-memory.dmp

    Filesize

    72KB

  • memory/5112-0-0x0000000000400000-0x0000000000412000-memory.dmp

    Filesize

    72KB