Analysis

  • max time kernel
    132s
  • max time network
    133s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03/06/2024, 11:34

General

  • Target

    a1fad08826b8fe95a7c226adf3d486a0_NeikiAnalytics.exe

  • Size

    58KB

  • MD5

    a1fad08826b8fe95a7c226adf3d486a0

  • SHA1

    aed87097358bd47de493900263f3f014526fccb1

  • SHA256

    00c759af590238b4c0e51d3b128d74b896bada592b015be63577d03c42956b24

  • SHA512

    8c8af1abd779f218feaa476bec179f3748d5ab04da61dbefd001da0044e964a4273f291d85880a2705fed34fc0e013d6ff6718820d2b4ca16dad69943fea2395

  • SSDEEP

    384:5ItlYLkfSoxGMwIfUzAI7+U5QY8PfOc9cCWRLzENdloN1T8F0pEEu6AZkSX3uo9n:5+CLZoyIm5Vz2srIFLI63VvKP3KfiSiS

Score
7/10
upx

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a1fad08826b8fe95a7c226adf3d486a0_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\a1fad08826b8fe95a7c226adf3d486a0_NeikiAnalytics.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:3024
    • C:\Users\Admin\AppData\Local\Temp\hhcbrnaff.exe
      "C:\Users\Admin\AppData\Local\Temp\hhcbrnaff.exe"
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      PID:1856

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\hhcbrnaff.exe

    Filesize

    58KB

    MD5

    78ecc3f74da081b3a1287365df66f89f

    SHA1

    3aeef2fc0d24bef62a8a72da933b77c471f6c32c

    SHA256

    1fade7ed93a56b89d91bfdd5d4320c7ca00f43e33d3c27e895387fbd20e9e45e

    SHA512

    4cffe34021cdb49a295bdca18593dff14fa249f4935984c0fa4784fcb9a378da70d96d3931bc31100fbfc549e7361cb4f955641b57c4e18cdab98d80b0ac0967

  • C:\Users\Admin\AppData\Local\Temp\hhgnrddkjee.exe

    Filesize

    140B

    MD5

    ea8eef7d26ecc45b6a56c5ecdb494d42

    SHA1

    fd621efeb3a6649e0a7ed0a178fa51be3d5d7e1e

    SHA256

    1af29706d2a6b604a0e552114f17bb1789014da70e98d6cf05af542bafaca04f

    SHA512

    12aea78e33d411033ab3fb235f17013161d32c52c3a9b29e76c03dfe1c7ff97b39daadb9a02904923fb1fac0000a910dca2c692d949a8fa83620d09c0df62252

  • memory/1856-13-0x0000000002530000-0x0000000002930000-memory.dmp

    Filesize

    4.0MB

  • memory/1856-12-0x00000000020C0000-0x00000000020C1000-memory.dmp

    Filesize

    4KB

  • memory/1856-26-0x0000000000400000-0x000000000040D000-memory.dmp

    Filesize

    52KB

  • memory/3024-0-0x0000000000400000-0x000000000040D000-memory.dmp

    Filesize

    52KB

  • memory/3024-3-0x0000000002580000-0x0000000002980000-memory.dmp

    Filesize

    4.0MB

  • memory/3024-2-0x0000000002570000-0x0000000002571000-memory.dmp

    Filesize

    4KB

  • memory/3024-11-0x0000000000400000-0x000000000040D000-memory.dmp

    Filesize

    52KB