Analysis
-
max time kernel
94s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
31/05/2024, 23:33
Static task
static1
Behavioral task
behavioral1
Sample
84729d6fc9f2e4164fce1c004bcb0d00_NeikiAnalytics.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
84729d6fc9f2e4164fce1c004bcb0d00_NeikiAnalytics.exe
Resource
win10v2004-20240426-en
General
-
Target
84729d6fc9f2e4164fce1c004bcb0d00_NeikiAnalytics.exe
-
Size
12KB
-
MD5
84729d6fc9f2e4164fce1c004bcb0d00
-
SHA1
b063e460eb56db53cd52fe5a7a52eca694e0a044
-
SHA256
fdf1fa0f023cd8c1a31303abb28a62aa03379200086e6c668c56483e943a1daf
-
SHA512
039e7e5bed78c9cee980f5c00e58378c20568dc457b4c7cce02fe64d508bc3f4ede9fe45f74b5a1f06b6c22be836ff94809cae7931b8d4bf31db47538f803a0b
-
SSDEEP
384:4L7li/2zEq2DcEQvdhcJKLTp/NK9xarC:GIM/Q9crC
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\Control Panel\International\Geo\Nation 84729d6fc9f2e4164fce1c004bcb0d00_NeikiAnalytics.exe -
Deletes itself 1 IoCs
pid Process 3936 tmp3B93.tmp.exe -
Executes dropped EXE 1 IoCs
pid Process 3936 tmp3B93.tmp.exe -
Uses the VBS compiler for execution 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4628 84729d6fc9f2e4164fce1c004bcb0d00_NeikiAnalytics.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4628 wrote to memory of 2396 4628 84729d6fc9f2e4164fce1c004bcb0d00_NeikiAnalytics.exe 84 PID 4628 wrote to memory of 2396 4628 84729d6fc9f2e4164fce1c004bcb0d00_NeikiAnalytics.exe 84 PID 4628 wrote to memory of 2396 4628 84729d6fc9f2e4164fce1c004bcb0d00_NeikiAnalytics.exe 84 PID 2396 wrote to memory of 4956 2396 vbc.exe 86 PID 2396 wrote to memory of 4956 2396 vbc.exe 86 PID 2396 wrote to memory of 4956 2396 vbc.exe 86 PID 4628 wrote to memory of 3936 4628 84729d6fc9f2e4164fce1c004bcb0d00_NeikiAnalytics.exe 87 PID 4628 wrote to memory of 3936 4628 84729d6fc9f2e4164fce1c004bcb0d00_NeikiAnalytics.exe 87 PID 4628 wrote to memory of 3936 4628 84729d6fc9f2e4164fce1c004bcb0d00_NeikiAnalytics.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\84729d6fc9f2e4164fce1c004bcb0d00_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\84729d6fc9f2e4164fce1c004bcb0d00_NeikiAnalytics.exe"1⤵
- Checks computer location settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4628 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\mhh3ulld\mhh3ulld.cmdline"2⤵
- Suspicious use of WriteProcessMemory
PID:2396 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES3DA5.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc53F020162E3748328EF7A5516B559FE7.TMP"3⤵PID:4956
-
-
-
C:\Users\Admin\AppData\Local\Temp\tmp3B93.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp3B93.tmp.exe" C:\Users\Admin\AppData\Local\Temp\84729d6fc9f2e4164fce1c004bcb0d00_NeikiAnalytics.exe2⤵
- Deletes itself
- Executes dropped EXE
PID:3936
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD5493f67d6275c42bab39b1c1a5a4247ef
SHA1d3f7d1e09032f81ddfe97aeca2f482d33fe52619
SHA256c76d66eac044b9aa50d6bc3edd6d8c3c6fe5d07cbc12a73784310fa1e8c2e48a
SHA5129247eee8744d691ddd40735ee1a2538e5adf9f137376196ec6ddcd9b239a16e90027d0ccb99cedb59d03da4fc5b41cbe728f99e97c7cbf80e410f24c01e74bdf
-
Filesize
1KB
MD52ea2752ba0fda1974e4a4a1d01bdf689
SHA1a6ffdc7a0f86d250b461c8d364eb50eb7afeb700
SHA2568b481d16454ca238aeb6a8576727824c818991753fe10317ae8e71e4dc2c649d
SHA512f0c5219e658d641df06efafe08f2eae13e85ff9e00c5c73e969128393bc833eaebad333806d378ab3b3fcbea257a2804d2314a8857bf676fdf78c8e40bd6d058
-
Filesize
2KB
MD582a7d70fce6ce22c55c3c0c066bf7b73
SHA1c1dff740d34c833fec97f2eaa93658ebd1b23fba
SHA256c0c966e6066998576955ac3e7314dad17dcad63599923b2e9f1d67bdb67cb824
SHA512f016864b906f6f093b61d4e53341ba36b43535f2802ca25e61d18a57e2f150475b66f2946ee1da829dc0b87eb42cb51454e86c8c1a31cde359cbe54647d6e975
-
Filesize
273B
MD53e4f790a8962c24ad38c0e5129ca4ede
SHA165887dca275c6e9a414cc2044241da5463b4caa6
SHA25683f7f5a6362336c57bfcb60cd5f9c9234e8736961e07e8bb2cc250e0eed7323e
SHA512319c73b4cb83c09e26cc40700696c1fa52774b74fe30072a6d6d0aeb12250813d979cbc007bcf50c8ef2fb2b6b4fa1fcea19bab3b6404a2326a839f93a86c184
-
Filesize
12KB
MD58962f4a167888c2be67280c867b8f789
SHA18d497763a419869f6516b520c10449aaab8775bf
SHA25690df187a8b6181135fe5b74704f68d95b155e369e282885636464e6c49434f45
SHA512d4eaae93ed471f2d8c28c16c8e7345cde1214cbe3f511f6e109356a840006b1eed84d4c394a19ad3d32d79222af2c3d42cd200bb2baab006a9e246a7545b0dc4
-
Filesize
1KB
MD582cfa28872232827124c8b2cc3b93808
SHA19b649698ec2c694015dc92443819d54b069ecedf
SHA2563c57a907a41fd678472bb7a5b6d750b0490d35ea671f308dd78b188c63d1d47c
SHA512a335bacb0fc190b3d539773599453b4dcf5240d8f23a87e0b0ac2c2d41f1a4f318e936d15e2a58f14bc19ca9c9ea4d0f177efe034aed7813d020f24fc124ca55