Analysis
-
max time kernel
145s -
max time network
111s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
03-06-2024 03:21
Static task
static1
Behavioral task
behavioral1
Sample
99b190ed6216121ae2891701a69dce80_NeikiAnalytics.exe
Resource
win7-20240508-en
General
-
Target
99b190ed6216121ae2891701a69dce80_NeikiAnalytics.exe
-
Size
6.4MB
-
MD5
99b190ed6216121ae2891701a69dce80
-
SHA1
60f12632d15f201007941a3b785e236e0939ed22
-
SHA256
9f174ff451b88060789fe123b3ac78118c10ceb6c765e6b2e47dbb759b4ff4ab
-
SHA512
b528829f748b1b2bbb0e4b7cdfcbfe1676935211c9fb67a91f144cf06761bdca799c6f60576078781ab75651cb74ea92915ec5d5e0f255db35369565c76d2813
-
SSDEEP
98304:Roc5swrA2XGxlHKcjTjNk3o659yrnfKtDrKIAyyks+Ctf8mQZVSR:i0LrA2kHKQHNk3og9unipQyOaOR
Malware Config
Extracted
urelas
218.54.31.165
218.54.31.226
Signatures
-
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
99b190ed6216121ae2891701a69dce80_NeikiAnalytics.exeveaqu.exeapornu.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation 99b190ed6216121ae2891701a69dce80_NeikiAnalytics.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation veaqu.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation apornu.exe -
Executes dropped EXE 3 IoCs
Processes:
veaqu.exeapornu.exegopap.exepid process 1528 veaqu.exe 4580 apornu.exe 968 gopap.exe -
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\gopap.exe upx behavioral2/memory/968-70-0x0000000000400000-0x0000000000599000-memory.dmp upx behavioral2/memory/968-74-0x0000000000400000-0x0000000000599000-memory.dmp upx behavioral2/memory/968-75-0x0000000000400000-0x0000000000599000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 28 IoCs
Processes:
99b190ed6216121ae2891701a69dce80_NeikiAnalytics.exeveaqu.exeapornu.exegopap.exepid process 4888 99b190ed6216121ae2891701a69dce80_NeikiAnalytics.exe 4888 99b190ed6216121ae2891701a69dce80_NeikiAnalytics.exe 1528 veaqu.exe 1528 veaqu.exe 4580 apornu.exe 4580 apornu.exe 968 gopap.exe 968 gopap.exe 968 gopap.exe 968 gopap.exe 968 gopap.exe 968 gopap.exe 968 gopap.exe 968 gopap.exe 968 gopap.exe 968 gopap.exe 968 gopap.exe 968 gopap.exe 968 gopap.exe 968 gopap.exe 968 gopap.exe 968 gopap.exe 968 gopap.exe 968 gopap.exe 968 gopap.exe 968 gopap.exe 968 gopap.exe 968 gopap.exe -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
99b190ed6216121ae2891701a69dce80_NeikiAnalytics.exeveaqu.exeapornu.exedescription pid process target process PID 4888 wrote to memory of 1528 4888 99b190ed6216121ae2891701a69dce80_NeikiAnalytics.exe veaqu.exe PID 4888 wrote to memory of 1528 4888 99b190ed6216121ae2891701a69dce80_NeikiAnalytics.exe veaqu.exe PID 4888 wrote to memory of 1528 4888 99b190ed6216121ae2891701a69dce80_NeikiAnalytics.exe veaqu.exe PID 4888 wrote to memory of 4424 4888 99b190ed6216121ae2891701a69dce80_NeikiAnalytics.exe cmd.exe PID 4888 wrote to memory of 4424 4888 99b190ed6216121ae2891701a69dce80_NeikiAnalytics.exe cmd.exe PID 4888 wrote to memory of 4424 4888 99b190ed6216121ae2891701a69dce80_NeikiAnalytics.exe cmd.exe PID 1528 wrote to memory of 4580 1528 veaqu.exe apornu.exe PID 1528 wrote to memory of 4580 1528 veaqu.exe apornu.exe PID 1528 wrote to memory of 4580 1528 veaqu.exe apornu.exe PID 4580 wrote to memory of 968 4580 apornu.exe gopap.exe PID 4580 wrote to memory of 968 4580 apornu.exe gopap.exe PID 4580 wrote to memory of 968 4580 apornu.exe gopap.exe PID 4580 wrote to memory of 3976 4580 apornu.exe cmd.exe PID 4580 wrote to memory of 3976 4580 apornu.exe cmd.exe PID 4580 wrote to memory of 3976 4580 apornu.exe cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\99b190ed6216121ae2891701a69dce80_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\99b190ed6216121ae2891701a69dce80_NeikiAnalytics.exe"1⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4888 -
C:\Users\Admin\AppData\Local\Temp\veaqu.exe"C:\Users\Admin\AppData\Local\Temp\veaqu.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1528 -
C:\Users\Admin\AppData\Local\Temp\apornu.exe"C:\Users\Admin\AppData\Local\Temp\apornu.exe" OK3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4580 -
C:\Users\Admin\AppData\Local\Temp\gopap.exe"C:\Users\Admin\AppData\Local\Temp\gopap.exe"4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:968 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\_vslite.bat" "4⤵PID:3976
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\_vslite.bat" "2⤵PID:4424
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
224B
MD5aad05f379c24ecb408552aeda26851f9
SHA1f436ce40fbe6fc798a263a1e1ec91cdcb2626b97
SHA256f0f5948d49e67266b4aa324d9db59be334c8fc6a5556659a9983110c12eb0190
SHA5126757f0e03dd4a0ff50e8c15fe49c3e6186343dc05102394cfcb211849c38c44a5639d04a380dee34a6ad855682a8693251de3ea2b8a3d064456695c87d73f365
-
Filesize
306B
MD53ed6588c82e85611b665e78c61daf289
SHA1a59f53e3868fa93c7400bcf63b6be93ef0b6ad24
SHA256663bcb21898b10a56fcf642dbb12cea377d849a8f1a43cfe4c1fae62bbd6dd79
SHA5122c2ab7658a8ec2325d48b7a130cd2b33aff3d29a3cf853f7b180608d152fda8fe7e281b319f068a9705f0e5ce008024657782f5de264e780e7b251bb5594a955
-
Filesize
104B
MD5dbef593bccc2049f860f718cd6fec321
SHA1e7e9f8235b4eb70aa99dd2c38009f2152575a8d0
SHA25630f820bb1ca6c20bcd77113c7377e01f31cdf0ec5b64864f22887d41a9bf3c7a
SHA5123e87c661c343b72f5dff4587b99688dbf655be9d6d903a75151bd9f204f55858e90388591f660bcbded5278ef94e322bf3e7c57374c9b16fce1eef7082395a2a
-
Filesize
512B
MD5173d8b49560ebb7679f6b0eb85d9bb8e
SHA1428b9c624385973113746768e78512268b2212e8
SHA256feb56cebbaea498d6e2856ce572c7248152c61e28debe48b1f6ba7f10c1ba26d
SHA5120a15d2c527a865434b60cc8f8bd124d2e9f2d5dc7e248cf6b5dc4e08c244b7a09ba452b1c94274f18d275a37bc13d9bb6dd4ecac2effdbb3dcda99d18a545a2b
-
Filesize
459KB
MD5bddbc67e0cf1fd40a6c3506ba95b5f21
SHA12a9119bdc918865c726d60498de8db581be17f02
SHA256599cde30c6b27e8a1d7915144cdf255e2f27384fb5f1a83c886f08555393de0f
SHA512e1824b22817b8e9bf1d08dedabf7c33c3568afa0b3de5c2181ea644eead6af0ed75b5cb6a5f6c35d4b700e983dd96cddfe6914e6c008da541bc37a40d22eddfd
-
Filesize
6.4MB
MD52f07fe3ccb14ad876f5f56a4fbf4323b
SHA162abf893b5d518cc08b7b11de20b7ff4b669da12
SHA256e639d360d894755ee59e45febdab17d3566fa53eb993c7f11b607bc23cf2d57b
SHA512604a6a1a5ebf027b7b8f2c4adcd5bb4a211b021068aa2e5ee570084159ab4a660a81cf6361bfb5c75e2642a36ca6735662e1eb79d22fdf9cbce752474067b44e