Analysis

  • max time kernel
    150s
  • max time network
    145s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01/06/2024, 06:39

General

  • Target

    911fbcb408b969363540868e4568b4b0_NeikiAnalytics.exe

  • Size

    252KB

  • MD5

    911fbcb408b969363540868e4568b4b0

  • SHA1

    153b21e8654d3e435c459257b4e91fc3c1fcd84a

  • SHA256

    21f1abaab73aa33788815abbeca5feb5bb96ec5162e0e0206f5baee51e763e6e

  • SHA512

    2a9e1852014d5babbffeb7d829124365aedb572882da130b397dd614544c4bfee174634247eb2af9d8aeb89447b644c9a018cd246d173e25a82b1b29d24887a7

  • SSDEEP

    6144:hQtsxRpLPGO/7YBNPVlVRgoEA9Qx2fKHEZXrUEQO7w:RVjwPVlVRgoEA9Qx2fKHEZXrbPw

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 53 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\911fbcb408b969363540868e4568b4b0_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\911fbcb408b969363540868e4568b4b0_NeikiAnalytics.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2140
    • C:\Users\Admin\meeki.exe
      "C:\Users\Admin\meeki.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:5008

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\meeki.exe

    Filesize

    252KB

    MD5

    09856595ba3233070aefb44c85af39c7

    SHA1

    8e38f9610d2807df379630e985e217ebff22f3b7

    SHA256

    c91f2d48c26698047ce452702978c21e3f231e5c239dc94af6586702b6365062

    SHA512

    8a97ba7f5cfa6094efd1cbf69d8e17d1392a3b7be4ce144c2d3331ab040606f4b13494e5d2eed58c37e00a75c8a669cf1969b1171bb90b3098d0b0f12363a9d1

  • memory/2140-0-0x0000000000400000-0x0000000000440000-memory.dmp

    Filesize

    256KB

  • memory/2140-37-0x0000000000400000-0x0000000000440000-memory.dmp

    Filesize

    256KB

  • memory/5008-34-0x0000000000400000-0x0000000000440000-memory.dmp

    Filesize

    256KB

  • memory/5008-38-0x0000000000400000-0x0000000000440000-memory.dmp

    Filesize

    256KB