Analysis

  • max time kernel
    150s
  • max time network
    124s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30/05/2024, 09:33

General

  • Target

    ef532c781404252f3cf97590c18dc000_NeikiAnalytics.exe

  • Size

    53KB

  • MD5

    ef532c781404252f3cf97590c18dc000

  • SHA1

    d53433c233182dbcbaeae3bccd7fc99cd026d3f3

  • SHA256

    98258de69259c7602ac27b8bd730e0d4d54384cb3ef9f324eb210ea832ecbbae

  • SHA512

    ccf50236e8fb6f4e8c7879a118c20b1fa8d57dd05a7dd3b784188fef39bd0dd649c1ab950304a2859b7d183da8702f8e42e754fc879d52b123a5c20fec396524

  • SSDEEP

    1536:vN8g8r8QNxXNh18r7Kp3StjEMjmLM3ztDJWZsXy4JzxPMk:8XNh6rJJjmLM3zRJWZsXy4JN

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ef532c781404252f3cf97590c18dc000_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\ef532c781404252f3cf97590c18dc000_NeikiAnalytics.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:800
    • C:\Users\Admin\jkroim.exe
      "C:\Users\Admin\jkroim.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1820

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\jkroim.exe

          Filesize

          53KB

          MD5

          c65563ff48fdc21fdb65b165245b464e

          SHA1

          219131169b39915b80104d8b9955dd23a89a2c44

          SHA256

          4af922bb9625138ab755207f053f72db55b3e92df102658beb3be048a8a832dd

          SHA512

          2ae1db11b4a4e93d52d1a18ba5c93439398c940849db8c080d7c27621a115616e153096b04f171071b1392d4bbe5f4b1516723aaaac0bd305ec8f090225d71e4

        • memory/800-0-0x0000000000400000-0x0000000000412000-memory.dmp

          Filesize

          72KB

        • memory/1820-34-0x0000000000400000-0x0000000000412000-memory.dmp

          Filesize

          72KB