Analysis

  • max time kernel
    150s
  • max time network
    147s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30-05-2024 22:26

General

  • Target

    6acdc4430dc3cbf04e5615203b99d3f0_NeikiAnalytics.exe

  • Size

    67KB

  • MD5

    6acdc4430dc3cbf04e5615203b99d3f0

  • SHA1

    d43978d2f46825aa05e7df0c20e09c2813fcabc1

  • SHA256

    5cecb288ee1f9d5adc4ac8005567c69a8c5bcc567a3f6817eaf0178b59424120

  • SHA512

    b04edc0c1bc43fa9997b4f2f01c1ef99645428996851f80007092ba1abf39b92d994681979b1cdab074d19f671f5b637fccd97d7840850f9b2b2470ba735323e

  • SSDEEP

    1536:mUL/o7EjR2I0WtdgI2MyzNORQtOflIwoHNV2XBFV72BOlA7ZsryrEgxSF:mq/5jMIPtdgI2MyzNORQtOflIwoHNV2h

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6acdc4430dc3cbf04e5615203b99d3f0_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\6acdc4430dc3cbf04e5615203b99d3f0_NeikiAnalytics.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:212
    • C:\Users\Admin\AppData\Local\Temp\ghyte.exe
      "C:\Users\Admin\AppData\Local\Temp\ghyte.exe"
      2⤵
      • Executes dropped EXE
      PID:4160

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\ghyte.exe

    Filesize

    67KB

    MD5

    934494a687424b5acaf6c29ecfdd99ac

    SHA1

    a58537abc5e4ba7a418908d1716ba2e2b042c797

    SHA256

    6d320cb6a46fd2e4db38c369c3220d8ebb21f4bd81564648e9d2a744689e504f

    SHA512

    6ba6c2778d37bc9876bb6eeca4b115622a9ad5af5c11260cb0ff15726bfa1d8e72a534c71d8bc48dbfa22baa7d53840f976f6ae627542b0cdd11068ddc38cb3d

  • memory/212-0-0x0000000000720000-0x0000000000726000-memory.dmp

    Filesize

    24KB

  • memory/212-1-0x0000000000400000-0x0000000000406000-memory.dmp

    Filesize

    24KB

  • memory/212-8-0x0000000000720000-0x0000000000726000-memory.dmp

    Filesize

    24KB

  • memory/4160-25-0x0000000002210000-0x0000000002216000-memory.dmp

    Filesize

    24KB