Analysis
-
max time kernel
146s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
03-06-2024 01:41
Static task
static1
Behavioral task
behavioral1
Sample
970ab7302a9b5b9ee4634396988cff50_NeikiAnalytics.exe
Resource
win7-20240508-en
General
-
Target
970ab7302a9b5b9ee4634396988cff50_NeikiAnalytics.exe
-
Size
6.5MB
-
MD5
970ab7302a9b5b9ee4634396988cff50
-
SHA1
f7c34ca04b3e3620e92d8d9e375b738b0d102b73
-
SHA256
a30922df99e9ccdad5da7ae843f0177ba29a075338128937da4982aac777bd45
-
SHA512
763e05a2eabbdeb24e873a388eb4f0ac7f99c295fe4344b5bfc09f90eda6786888ddfc03cab133b5a563caccdfde83646d650886034bad5cd6c2e3a78944d9a1
-
SSDEEP
98304:Roc5swrA2XGxlHKcjTjNk3o659yrnfKtDrKIAyyks+Ctf8mQZVSc:i0LrA2kHKQHNk3og9unipQyOaOc
Malware Config
Extracted
urelas
218.54.31.165
218.54.31.226
Signatures
-
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
970ab7302a9b5b9ee4634396988cff50_NeikiAnalytics.exefapyo.exetygyto.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\International\Geo\Nation 970ab7302a9b5b9ee4634396988cff50_NeikiAnalytics.exe Key value queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\International\Geo\Nation fapyo.exe Key value queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\International\Geo\Nation tygyto.exe -
Executes dropped EXE 3 IoCs
Processes:
fapyo.exetygyto.exedikuv.exepid process 2200 fapyo.exe 692 tygyto.exe 2356 dikuv.exe -
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\dikuv.exe upx behavioral2/memory/2356-67-0x0000000000400000-0x0000000000599000-memory.dmp upx behavioral2/memory/2356-73-0x0000000000400000-0x0000000000599000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 30 IoCs
Processes:
970ab7302a9b5b9ee4634396988cff50_NeikiAnalytics.exefapyo.exetygyto.exedikuv.exepid process 1984 970ab7302a9b5b9ee4634396988cff50_NeikiAnalytics.exe 1984 970ab7302a9b5b9ee4634396988cff50_NeikiAnalytics.exe 2200 fapyo.exe 2200 fapyo.exe 692 tygyto.exe 692 tygyto.exe 2356 dikuv.exe 2356 dikuv.exe 2356 dikuv.exe 2356 dikuv.exe 2356 dikuv.exe 2356 dikuv.exe 2356 dikuv.exe 2356 dikuv.exe 2356 dikuv.exe 2356 dikuv.exe 2356 dikuv.exe 2356 dikuv.exe 2356 dikuv.exe 2356 dikuv.exe 2356 dikuv.exe 2356 dikuv.exe 2356 dikuv.exe 2356 dikuv.exe 2356 dikuv.exe 2356 dikuv.exe 2356 dikuv.exe 2356 dikuv.exe 2356 dikuv.exe 2356 dikuv.exe -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
970ab7302a9b5b9ee4634396988cff50_NeikiAnalytics.exefapyo.exetygyto.exedescription pid process target process PID 1984 wrote to memory of 2200 1984 970ab7302a9b5b9ee4634396988cff50_NeikiAnalytics.exe fapyo.exe PID 1984 wrote to memory of 2200 1984 970ab7302a9b5b9ee4634396988cff50_NeikiAnalytics.exe fapyo.exe PID 1984 wrote to memory of 2200 1984 970ab7302a9b5b9ee4634396988cff50_NeikiAnalytics.exe fapyo.exe PID 1984 wrote to memory of 3536 1984 970ab7302a9b5b9ee4634396988cff50_NeikiAnalytics.exe cmd.exe PID 1984 wrote to memory of 3536 1984 970ab7302a9b5b9ee4634396988cff50_NeikiAnalytics.exe cmd.exe PID 1984 wrote to memory of 3536 1984 970ab7302a9b5b9ee4634396988cff50_NeikiAnalytics.exe cmd.exe PID 2200 wrote to memory of 692 2200 fapyo.exe tygyto.exe PID 2200 wrote to memory of 692 2200 fapyo.exe tygyto.exe PID 2200 wrote to memory of 692 2200 fapyo.exe tygyto.exe PID 692 wrote to memory of 2356 692 tygyto.exe dikuv.exe PID 692 wrote to memory of 2356 692 tygyto.exe dikuv.exe PID 692 wrote to memory of 2356 692 tygyto.exe dikuv.exe PID 692 wrote to memory of 1360 692 tygyto.exe cmd.exe PID 692 wrote to memory of 1360 692 tygyto.exe cmd.exe PID 692 wrote to memory of 1360 692 tygyto.exe cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\970ab7302a9b5b9ee4634396988cff50_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\970ab7302a9b5b9ee4634396988cff50_NeikiAnalytics.exe"1⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1984 -
C:\Users\Admin\AppData\Local\Temp\fapyo.exe"C:\Users\Admin\AppData\Local\Temp\fapyo.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2200 -
C:\Users\Admin\AppData\Local\Temp\tygyto.exe"C:\Users\Admin\AppData\Local\Temp\tygyto.exe" OK3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:692 -
C:\Users\Admin\AppData\Local\Temp\dikuv.exe"C:\Users\Admin\AppData\Local\Temp\dikuv.exe"4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2356 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\_vslite.bat" "4⤵PID:1360
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\_vslite.bat" "2⤵PID:3536
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
224B
MD5b3a68871ad9adac0a62e6f4a8aa634df
SHA18cf77bf93fade0269f0c3bc561df4f982d755071
SHA256c5339d85d2a50b992300dc3b4a407399c5f8289c18be93d62c9743ce36b69624
SHA5126ada8ba9930f98a26e2fbb2b14dc5a133b1a963a52a4a9d19eec2e94b704c324b5a2482340bbc9107040d0f1a3eef6c1a1773aea57a50a623a2800c653b231ac
-
Filesize
306B
MD5fb27073afe344aa2e5faefe2801a8fb4
SHA132ac6bac56219ef31c4d6d19dc33fa1f2e0d240b
SHA256c3160269d61468e1837ea6163cf237e903bd81161269a36684c8ccf3863586af
SHA512e26d0931feeb1860401940b107d2a78fc3ad8106a5b5a83ae198c7dd1f033765fe297f84ffbfdb8ee3acdf3f81179ba5852de4913fb2e2e38a8317f84a9a0780
-
Filesize
459KB
MD562aceb0d684496e724e7831f227d7a05
SHA1618972806a5fe92705fbc66a67cde781ebb05e90
SHA2563022341e12e4a526204c53cabaa83c2689912a98738dd18e684d3fa901cd87bd
SHA512acc2c90fe240897266bf8030072fc5435efd19cbe7875580984968144097355e3c55f219e58d4114057d3c5d9a17b025301e9ad4c4fa3ad1b2e9c47e1fb6465c
-
Filesize
6.5MB
MD57ddf68bf52798413a75b3ee8f40901b0
SHA1930b690483cda200aa684b98a60093dd5847eb4e
SHA2562241bf7c78386781d60a0b4accd89410ccd61d763f7375b1d5a3ab0525727eda
SHA512d46b0074d92cce1867a49f7c1fd74cd94917399705434d34d5cd75787e5d8b0881a188309dc2a5894bdef18811004555eea4f0ca92701274c6023a2f81b35908
-
Filesize
104B
MD5dbef593bccc2049f860f718cd6fec321
SHA1e7e9f8235b4eb70aa99dd2c38009f2152575a8d0
SHA25630f820bb1ca6c20bcd77113c7377e01f31cdf0ec5b64864f22887d41a9bf3c7a
SHA5123e87c661c343b72f5dff4587b99688dbf655be9d6d903a75151bd9f204f55858e90388591f660bcbded5278ef94e322bf3e7c57374c9b16fce1eef7082395a2a
-
Filesize
512B
MD5131b96d335a3e26263b46f248f0aacd9
SHA1704bbf98746e679af8f7fc1f88a1c24ade7d3ac6
SHA25640fba4e992b5367cf594e4289181f4b329df9607dc1105d4556c62b07cb55989
SHA512347f4d161aff2c5ca2aa993853ab5c4e6e4c4e43d3c657dbfd1fca9e2b5993d6c4a7daef281194d98d8321b966a6a9c171b9805f0087cf7f11d5fa831851de31