Analysis

  • max time kernel
    133s
  • max time network
    137s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02-06-2024 22:07

General

  • Target

    72bcd32fe8e2701bc5415b24c9084390_NeikiAnalytics.exe

  • Size

    285KB

  • MD5

    72bcd32fe8e2701bc5415b24c9084390

  • SHA1

    49672200dc718711d0893def1481c41f696b5ff5

  • SHA256

    ecc9c891bbb12e2b6b74e3a3c7c52e84e5813bff8e9dcd2c28e33b58a0218c2a

  • SHA512

    5905218e46f5481520ef77d957315c48c521046beb725bf360063fdb8af9f5f9dbac0761c1f5bbded23d633211a4fc3f19abd26f00c61bcf90f4595af3d8cc94

  • SSDEEP

    6144:2ZibQcmlVD+BgotLvTtehd1wLIE92FJ1wZycpaiTyn:20q+BgotLvTtehd1wd92FJ1yA

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\72bcd32fe8e2701bc5415b24c9084390_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\72bcd32fe8e2701bc5415b24c9084390_NeikiAnalytics.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:2688
    • C:\Users\Admin\AppData\Local\Temp\huter.exe
      "C:\Users\Admin\AppData\Local\Temp\huter.exe"
      2⤵
      • Executes dropped EXE
      PID:4520
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\sanfdr.bat" "
      2⤵
        PID:1968
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --field-trial-handle=4372,i,6576818814118437872,11004518367271063231,262144 --variations-seed-version --mojo-platform-channel-handle=1032 /prefetch:8
      1⤵
        PID:2800

      Network

      MITRE ATT&CK Matrix ATT&CK v13

      Discovery

      Query Registry

      1
      T1012

      System Information Discovery

      2
      T1082

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\golfinfo.ini
        Filesize

        512B

        MD5

        a2de452e45db47c817b5ada178bd2e83

        SHA1

        44b16b5c0e400a2af95299d0c08a6a4fda14bc4c

        SHA256

        516ba3f510ebfd821b47f63ac2c47faa15d5f2ba8732c79c0265fa8aa3ad8fd4

        SHA512

        8799d95d502764a4266c37c1c5fbb24fb9ab94983310962deafd5e246c5900993dffb2c2b06ab6709cc4141aab3346a9cf65b2a62744dbf11c7d381af654be85

      • C:\Users\Admin\AppData\Local\Temp\huter.exe
        Filesize

        285KB

        MD5

        9654b4c271065c7631d3ca7418b6e9ff

        SHA1

        8955f00827beef64bb573b43afb3df0b3e831711

        SHA256

        336197ebc414a18014f3e80184b69af156bfaaa94cddaeff3497a8ac6d36a806

        SHA512

        03ad2028a1b7a98b558f651407774300e7d0377b43cc49b0a60a469978b0a049f334f4848e8c6064602cb5f88e6c9dac08de0c5bf734444f0af4605682533c6b

      • C:\Users\Admin\AppData\Local\Temp\sanfdr.bat
        Filesize

        304B

        MD5

        6625746f392cfa6b042038f885dceeb3

        SHA1

        fce49078f95c7d1f67f4c5008d88a851911908a3

        SHA256

        82b0b98932151939bd82dcfcd46e192942e929c56c7d40ba6af3e01ec2a1e08c

        SHA512

        e2f41a7a4c97727abf7ba2d65af28a3feb5ff44b840e72bfc5bc4ea6a1274a43f47da349431a5d564a5a510b69d860eb0257f8b6a5e987427899a60c78f2430f