Analysis
-
max time kernel
132s -
max time network
133s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
03/06/2024, 11:34
Behavioral task
behavioral1
Sample
a1fad08826b8fe95a7c226adf3d486a0_NeikiAnalytics.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
a1fad08826b8fe95a7c226adf3d486a0_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
a1fad08826b8fe95a7c226adf3d486a0_NeikiAnalytics.exe
-
Size
58KB
-
MD5
a1fad08826b8fe95a7c226adf3d486a0
-
SHA1
aed87097358bd47de493900263f3f014526fccb1
-
SHA256
00c759af590238b4c0e51d3b128d74b896bada592b015be63577d03c42956b24
-
SHA512
8c8af1abd779f218feaa476bec179f3748d5ab04da61dbefd001da0044e964a4273f291d85880a2705fed34fc0e013d6ff6718820d2b4ca16dad69943fea2395
-
SSDEEP
384:5ItlYLkfSoxGMwIfUzAI7+U5QY8PfOc9cCWRLzENdloN1T8F0pEEu6AZkSX3uo9n:5+CLZoyIm5Vz2srIFLI63VvKP3KfiSiS
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation a1fad08826b8fe95a7c226adf3d486a0_NeikiAnalytics.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation hhcbrnaff.exe -
Executes dropped EXE 1 IoCs
pid Process 1856 hhcbrnaff.exe -
resource yara_rule behavioral2/memory/3024-0-0x0000000000400000-0x000000000040D000-memory.dmp upx behavioral2/files/0x0008000000022f51-7.dat upx behavioral2/memory/3024-11-0x0000000000400000-0x000000000040D000-memory.dmp upx behavioral2/memory/1856-26-0x0000000000400000-0x000000000040D000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3024 wrote to memory of 1856 3024 a1fad08826b8fe95a7c226adf3d486a0_NeikiAnalytics.exe 83 PID 3024 wrote to memory of 1856 3024 a1fad08826b8fe95a7c226adf3d486a0_NeikiAnalytics.exe 83 PID 3024 wrote to memory of 1856 3024 a1fad08826b8fe95a7c226adf3d486a0_NeikiAnalytics.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\a1fad08826b8fe95a7c226adf3d486a0_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\a1fad08826b8fe95a7c226adf3d486a0_NeikiAnalytics.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3024 -
C:\Users\Admin\AppData\Local\Temp\hhcbrnaff.exe"C:\Users\Admin\AppData\Local\Temp\hhcbrnaff.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
PID:1856
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
58KB
MD578ecc3f74da081b3a1287365df66f89f
SHA13aeef2fc0d24bef62a8a72da933b77c471f6c32c
SHA2561fade7ed93a56b89d91bfdd5d4320c7ca00f43e33d3c27e895387fbd20e9e45e
SHA5124cffe34021cdb49a295bdca18593dff14fa249f4935984c0fa4784fcb9a378da70d96d3931bc31100fbfc549e7361cb4f955641b57c4e18cdab98d80b0ac0967
-
Filesize
140B
MD5ea8eef7d26ecc45b6a56c5ecdb494d42
SHA1fd621efeb3a6649e0a7ed0a178fa51be3d5d7e1e
SHA2561af29706d2a6b604a0e552114f17bb1789014da70e98d6cf05af542bafaca04f
SHA51212aea78e33d411033ab3fb235f17013161d32c52c3a9b29e76c03dfe1c7ff97b39daadb9a02904923fb1fac0000a910dca2c692d949a8fa83620d09c0df62252