Analysis
-
max time kernel
145s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
30-05-2024 00:11
Static task
static1
Behavioral task
behavioral1
Sample
5beb5c1df539fdefc47491e06b7c6510_NeikiAnalytics.exe
Resource
win7-20240221-en
General
-
Target
5beb5c1df539fdefc47491e06b7c6510_NeikiAnalytics.exe
-
Size
6.4MB
-
MD5
5beb5c1df539fdefc47491e06b7c6510
-
SHA1
fe79e82fa0bc860454fd6c0721fc7c117b7cf23c
-
SHA256
92c1e8cd4c189dd0f3670de1facbd3b10db0a1696fce4f7f328c2adc37961fc6
-
SHA512
04edbfdd82b7ffcbd7471b7ac5c2da29c947a74848c7d87b6003576a5da43a84072aad72c2ec9d9b08f8c6004f7a6b8bbfb111611209d4b495a8150903cf30f3
-
SSDEEP
98304:Roc5swrA2XGxlHKcjTjNk3o659yrnfKtDrKIAyyks+Ctf8mQZVSc:i0LrA2kHKQHNk3og9unipQyOaOc
Malware Config
Extracted
urelas
218.54.31.165
218.54.31.226
Signatures
-
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
5beb5c1df539fdefc47491e06b7c6510_NeikiAnalytics.exetafuo.execugeij.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\Control Panel\International\Geo\Nation 5beb5c1df539fdefc47491e06b7c6510_NeikiAnalytics.exe Key value queried \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\Control Panel\International\Geo\Nation tafuo.exe Key value queried \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\Control Panel\International\Geo\Nation cugeij.exe -
Executes dropped EXE 3 IoCs
Processes:
tafuo.execugeij.exeywtuz.exepid process 976 tafuo.exe 3048 cugeij.exe 836 ywtuz.exe -
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\ywtuz.exe upx behavioral2/memory/836-69-0x0000000000400000-0x0000000000599000-memory.dmp upx behavioral2/memory/836-73-0x0000000000400000-0x0000000000599000-memory.dmp upx behavioral2/memory/836-77-0x0000000000400000-0x0000000000599000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 30 IoCs
Processes:
5beb5c1df539fdefc47491e06b7c6510_NeikiAnalytics.exetafuo.execugeij.exeywtuz.exepid process 1444 5beb5c1df539fdefc47491e06b7c6510_NeikiAnalytics.exe 1444 5beb5c1df539fdefc47491e06b7c6510_NeikiAnalytics.exe 976 tafuo.exe 976 tafuo.exe 3048 cugeij.exe 3048 cugeij.exe 836 ywtuz.exe 836 ywtuz.exe 836 ywtuz.exe 836 ywtuz.exe 836 ywtuz.exe 836 ywtuz.exe 836 ywtuz.exe 836 ywtuz.exe 836 ywtuz.exe 836 ywtuz.exe 836 ywtuz.exe 836 ywtuz.exe 836 ywtuz.exe 836 ywtuz.exe 836 ywtuz.exe 836 ywtuz.exe 836 ywtuz.exe 836 ywtuz.exe 836 ywtuz.exe 836 ywtuz.exe 836 ywtuz.exe 836 ywtuz.exe 836 ywtuz.exe 836 ywtuz.exe -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
5beb5c1df539fdefc47491e06b7c6510_NeikiAnalytics.exetafuo.execugeij.exedescription pid process target process PID 1444 wrote to memory of 976 1444 5beb5c1df539fdefc47491e06b7c6510_NeikiAnalytics.exe tafuo.exe PID 1444 wrote to memory of 976 1444 5beb5c1df539fdefc47491e06b7c6510_NeikiAnalytics.exe tafuo.exe PID 1444 wrote to memory of 976 1444 5beb5c1df539fdefc47491e06b7c6510_NeikiAnalytics.exe tafuo.exe PID 1444 wrote to memory of 5056 1444 5beb5c1df539fdefc47491e06b7c6510_NeikiAnalytics.exe cmd.exe PID 1444 wrote to memory of 5056 1444 5beb5c1df539fdefc47491e06b7c6510_NeikiAnalytics.exe cmd.exe PID 1444 wrote to memory of 5056 1444 5beb5c1df539fdefc47491e06b7c6510_NeikiAnalytics.exe cmd.exe PID 976 wrote to memory of 3048 976 tafuo.exe cugeij.exe PID 976 wrote to memory of 3048 976 tafuo.exe cugeij.exe PID 976 wrote to memory of 3048 976 tafuo.exe cugeij.exe PID 3048 wrote to memory of 836 3048 cugeij.exe ywtuz.exe PID 3048 wrote to memory of 836 3048 cugeij.exe ywtuz.exe PID 3048 wrote to memory of 836 3048 cugeij.exe ywtuz.exe PID 3048 wrote to memory of 4556 3048 cugeij.exe cmd.exe PID 3048 wrote to memory of 4556 3048 cugeij.exe cmd.exe PID 3048 wrote to memory of 4556 3048 cugeij.exe cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\5beb5c1df539fdefc47491e06b7c6510_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\5beb5c1df539fdefc47491e06b7c6510_NeikiAnalytics.exe"1⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1444 -
C:\Users\Admin\AppData\Local\Temp\tafuo.exe"C:\Users\Admin\AppData\Local\Temp\tafuo.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:976 -
C:\Users\Admin\AppData\Local\Temp\cugeij.exe"C:\Users\Admin\AppData\Local\Temp\cugeij.exe" OK3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3048 -
C:\Users\Admin\AppData\Local\Temp\ywtuz.exe"C:\Users\Admin\AppData\Local\Temp\ywtuz.exe"4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:836 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\_vslite.bat" "4⤵PID:4556
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\_vslite.bat" "2⤵PID:5056
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
306B
MD5a8165f163d9ab545285de169675344b2
SHA1db50944f989467d57346d14239d7831bc9b1937e
SHA256571ed356a8cbd6ee680de68bc353b8991889386be6bb80467cb2a7d44873cc46
SHA5129cd0b4fbd131a7dc3d46bef2ea813dec1663d0ea2a3ed27410ec17e6adaf1f175a037d940067d8469acdfc26f6a73ba5952d28839afdee9339f14ad491767e58
-
Filesize
224B
MD59ff05c79e3093a73515d3d3d74401080
SHA1bfad4fd653abd32d6bfdaaf0050ec88ff6f429f0
SHA2561b650111f3d6531024769061832a28101ffbe0b4b113a79437a63b74e1eac311
SHA51245c17e144020c638e796ab243ee98649ba2d14695af47afba4171fb395a3b5e39214796cfd5c7afefefa8d18175539823df4a440f6becf526403fb1943bceef9
-
Filesize
104B
MD5dbef593bccc2049f860f718cd6fec321
SHA1e7e9f8235b4eb70aa99dd2c38009f2152575a8d0
SHA25630f820bb1ca6c20bcd77113c7377e01f31cdf0ec5b64864f22887d41a9bf3c7a
SHA5123e87c661c343b72f5dff4587b99688dbf655be9d6d903a75151bd9f204f55858e90388591f660bcbded5278ef94e322bf3e7c57374c9b16fce1eef7082395a2a
-
Filesize
512B
MD5f58b9de5a02d58182475066fd9132bde
SHA1968576c2df315d823b218f2bf5a2672b90744ac2
SHA256ea8fab7cb692ff54691746b8998bcdd5eb0550a2f33d5da35dc9ed3e58c4e794
SHA5129ed5d81acb54498e3e2a0d8ab46161d0848a14bbb61a0ff02a55892c56a2fe394c05f8fae39bc7fdb3146e26cf70cab9f0f755527ebd808a93c8fa8d3909837e
-
Filesize
6.4MB
MD5951cf5294eb9426b80821690b85b4513
SHA1e8656e8d3f801a7a4cbec34eac3e8db5a8c8cb4c
SHA25645d41442de5f32479ecbfbde8497e5283cd105779c99ea9918e1eb6b49728024
SHA512242a8fb1400e65885336377ae37e73e2d6dcc13968c251354d0f81d9069dee2d24e539938970b048052fb36a516fe93d5c1b6c475cfea49a9803ef9be2755b29
-
Filesize
459KB
MD520b87a2a3dff99f9eee4879e74e96c35
SHA165420920085926a32407f17798244588febd1829
SHA2562b8254e98294926d8d4f2cf4d84f79046dd8368e2b41ecc5c8cb068a93174162
SHA512e334cfe5de96df551c69ce6e45afca72b0aa9d9863cc3aec2a1656ecfb5b8b8d5f1df1aabcb630cb909f4391dffbaf88f4a6c5244e3c5f0c5496570c82e82d8a