Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
02-06-2024 06:12
Static task
static1
Behavioral task
behavioral1
Sample
46461646e15cce6829db4dcaa5d8bc20_NeikiAnalytics.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
46461646e15cce6829db4dcaa5d8bc20_NeikiAnalytics.exe
Resource
win10v2004-20240426-en
General
-
Target
46461646e15cce6829db4dcaa5d8bc20_NeikiAnalytics.exe
-
Size
53KB
-
MD5
46461646e15cce6829db4dcaa5d8bc20
-
SHA1
e5b44e3f90d3805b87831bce06e0add68341d18e
-
SHA256
d86bb5ad7022f157a24f38ad52390c4d60c28a95bc6ecb81701c068998826222
-
SHA512
ed4039a1dc4f82f9ef8f264478dd4ebd729ea284a01db9a28e593504beb4945133cc217348d3ad346461204baa331f4d1303df4f1740fdd51ad80ad68136908f
-
SSDEEP
768:EyW1yBtObv0U/qchMXEIPxQ3F5j0GoR+8Ode55B0j:24Bobv7ZhMRxQE48OsB+
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\Control Panel\International\Geo\Nation 46461646e15cce6829db4dcaa5d8bc20_NeikiAnalytics.exe -
Executes dropped EXE 1 IoCs
pid Process 2736 zbhnd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2872 wrote to memory of 2736 2872 46461646e15cce6829db4dcaa5d8bc20_NeikiAnalytics.exe 84 PID 2872 wrote to memory of 2736 2872 46461646e15cce6829db4dcaa5d8bc20_NeikiAnalytics.exe 84 PID 2872 wrote to memory of 2736 2872 46461646e15cce6829db4dcaa5d8bc20_NeikiAnalytics.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\46461646e15cce6829db4dcaa5d8bc20_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\46461646e15cce6829db4dcaa5d8bc20_NeikiAnalytics.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2872 -
C:\Users\Admin\AppData\Local\Temp\zbhnd.exe"C:\Users\Admin\AppData\Local\Temp\zbhnd.exe"2⤵
- Executes dropped EXE
PID:2736
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
53KB
MD50fee3ec200ac4f0c1bd75e138423584b
SHA1b520901b6538b38eaf707807a4d4c1ae1d36e6d1
SHA2560c50543a764f7560531b1e27f0a95e7a5047e84d9719430cf232e7f74a530d29
SHA51220772f4c5bb1674f8ac3e948828aec991c2b9b9702d37c620df883be2694ee847a641426c84a471d961df451aa62fcefe225f466ba86c71a8185a031c08a78ab