Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03/06/2024, 11:45

General

  • Target

    a24aad0014271d97dfb5058a21f6f2f0_NeikiAnalytics.exe

  • Size

    2.6MB

  • MD5

    a24aad0014271d97dfb5058a21f6f2f0

  • SHA1

    72fc790426855b9a983e8488978096ff47d311d1

  • SHA256

    4340d54293ad85c0f88184b67b7ae1bb55c1b8d2da4357b7e541d5ce8c14c352

  • SHA512

    c2ec2497915453b88f683e8d9ad883a65f7642faa6e0ed0da2c413920312d64296b5e899f876c17548ce3d3a34e0efcd50af77e85f234744dafdb312aefc278c

  • SSDEEP

    49152:LtckVb96j61vhCcD0Tgy0LXu1qoTzmYvr6/TH:ekVSGvkcD+v49pN/T

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • Modifies system certificate store 2 TTPs 5 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a24aad0014271d97dfb5058a21f6f2f0_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\a24aad0014271d97dfb5058a21f6f2f0_NeikiAnalytics.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1192
    • C:\Users\Admin\AppData\Local\Temp\562E.tmp
      "C:\Users\Admin\AppData\Local\Temp\562E.tmp" --pingC:\Users\Admin\AppData\Local\Temp\a24aad0014271d97dfb5058a21f6f2f0_NeikiAnalytics.exe 862BD699BEC5CD20ACE56161D47018AA1677F8D036A99518315C71EC8B0A8DB19C30756BAF538FD8C22DFE9E9FD81467E9DA9ACA33B7FC23FFFA2E7018B9AD39
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Suspicious behavior: RenamesItself
      • Suspicious use of WriteProcessMemory
      PID:752
      • C:\Users\Admin\AppData\Local\Temp\a24aad0014271d97dfb5058a21f6f2f0_NeikiAnalytics.exe
        "C:\Users\Admin\AppData\Local\Temp\a24aad0014271d97dfb5058a21f6f2f0_NeikiAnalytics.exe"
        3⤵
        • Executes dropped EXE
        • Modifies system certificate store
        • Suspicious use of SetWindowsHookEx
        PID:4256
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4256 -s 2512
          4⤵
          • Program crash
          PID:4972
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4256 -ip 4256
    1⤵
      PID:3280

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\562E.tmp

            Filesize

            2.6MB

            MD5

            09024c8874a4aae84b9357fb6b50f69f

            SHA1

            089b996a9319ad1ec53c6e782c62e69eab3a7dd1

            SHA256

            8481b4a9d760baa7e34e9a127493af6e007404414b501c3a3b470659b9970d12

            SHA512

            86681c51e7d59eec2000c4b03f33a30e1568ad810a35ea7923af4dd9e9fec0fccf56df1d1ab86e228cebae7f74ddee551c1c1427ad4bcf7ff00902570d337f5f

          • C:\Users\Admin\AppData\Local\Temp\a24aad0014271d97dfb5058a21f6f2f0_NeikiAnalytics.exe

            Filesize

            1.0MB

            MD5

            03b18ee5ae548b01cf455ca56aa2daae

            SHA1

            3149878b9d40624265bd1abd63632ec21bf36c8d

            SHA256

            9f581b5730b3f10de2a3b3a21d3e476f3094feef3e4dd92ffdaa103f6c410802

            SHA512

            919b9e512a30c643052337e461fa1fbd055932b4a557753fe03ebab29925bfc6d1aba61a92f320729569a5ad3d60e7493b43e366313f5328caf0597772f60721

          • memory/4256-15-0x0000000000400000-0x00000000004B4000-memory.dmp

            Filesize

            720KB

          • memory/4256-35-0x0000000000400000-0x00000000004B4000-memory.dmp

            Filesize

            720KB