Analysis
-
max time kernel
142s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
04/06/2024, 03:19
Static task
static1
Behavioral task
behavioral1
Sample
26773287c87a1f9e06880ffa9ead7e90_NeikiAnalytics.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
26773287c87a1f9e06880ffa9ead7e90_NeikiAnalytics.exe
Resource
win10v2004-20240226-en
General
-
Target
26773287c87a1f9e06880ffa9ead7e90_NeikiAnalytics.exe
-
Size
12KB
-
MD5
26773287c87a1f9e06880ffa9ead7e90
-
SHA1
d6ab965dada593f263c3274c0a28a58490e556de
-
SHA256
99dfa27fb032ed7c25f027975a06957f11d00a0ad63b409361c229ef6f672347
-
SHA512
ed91ea42126c437c182285e378d903251783886e8c55a11add9fc4b8505d5402bbbab0a438f07f20328ab847059160eac5d4db10a10dfd32d7b7ad9ac530f3a9
-
SSDEEP
384:xL7li/2z/q2DcEQvdQcJKLTp/NK9xaDj:xjMCQ9cDj
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation 26773287c87a1f9e06880ffa9ead7e90_NeikiAnalytics.exe -
Deletes itself 1 IoCs
pid Process 5028 tmp135.tmp.exe -
Executes dropped EXE 1 IoCs
pid Process 5028 tmp135.tmp.exe -
Uses the VBS compiler for execution 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 628 26773287c87a1f9e06880ffa9ead7e90_NeikiAnalytics.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 628 wrote to memory of 3192 628 26773287c87a1f9e06880ffa9ead7e90_NeikiAnalytics.exe 91 PID 628 wrote to memory of 3192 628 26773287c87a1f9e06880ffa9ead7e90_NeikiAnalytics.exe 91 PID 628 wrote to memory of 3192 628 26773287c87a1f9e06880ffa9ead7e90_NeikiAnalytics.exe 91 PID 3192 wrote to memory of 3184 3192 vbc.exe 93 PID 3192 wrote to memory of 3184 3192 vbc.exe 93 PID 3192 wrote to memory of 3184 3192 vbc.exe 93 PID 628 wrote to memory of 5028 628 26773287c87a1f9e06880ffa9ead7e90_NeikiAnalytics.exe 94 PID 628 wrote to memory of 5028 628 26773287c87a1f9e06880ffa9ead7e90_NeikiAnalytics.exe 94 PID 628 wrote to memory of 5028 628 26773287c87a1f9e06880ffa9ead7e90_NeikiAnalytics.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\26773287c87a1f9e06880ffa9ead7e90_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\26773287c87a1f9e06880ffa9ead7e90_NeikiAnalytics.exe"1⤵
- Checks computer location settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:628 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\baha1eiq\baha1eiq.cmdline"2⤵
- Suspicious use of WriteProcessMemory
PID:3192 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES15D5.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc729D70CC561343AE9F8373E226A9F0BE.TMP"3⤵PID:3184
-
-
-
C:\Users\Admin\AppData\Local\Temp\tmp135.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp135.tmp.exe" C:\Users\Admin\AppData\Local\Temp\26773287c87a1f9e06880ffa9ead7e90_NeikiAnalytics.exe2⤵
- Deletes itself
- Executes dropped EXE
PID:5028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4444 --field-trial-handle=2248,i,10247514684337323751,15511974759131734137,262144 --variations-seed-version /prefetch:81⤵PID:4964
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD57d3049eda040d9a5b382a46d16993118
SHA11af8a96e1033e8270796ca59456b9c38fa18d76a
SHA25617ae20caa826760ccea145b1875ee6defb9b244c854e62fb34a1440047c10cc6
SHA512e3994ea6033f0da65eebf01b4975005c49ee377a7d9a2e2d032673d59c1759adab26d09d4ab4e6b7c407ebc72133286ecd4ef67b765eb41a0e84d877b44f794b
-
Filesize
1KB
MD553336addb249dbac8599bf9f318d9f93
SHA15dba0a9c5c671f598fb072acec4db0cb7077ab8d
SHA2560baa86114e44e1f3ef7cc134c52f9f63c0506647f052a5214e561db7162ad9f3
SHA512870a698e7a7c5906a18604df29f3a3fc6eb122e802c6c2c616542e7b54c94bd5b5c9822ab7f726e0ddb29a360753d919dc8168bac48484642893ad112f410f88
-
Filesize
2KB
MD5a5828d9a389d34fccad91d8714f29370
SHA1506638cb17576f49689cced4fa6ee192bb094ab9
SHA25605909832ab9c13eb1d09b9091417bd8a0e078e4610fcd716360f923149ec682c
SHA5121a913e1bb1644d683bd2f3d97fcde91f21851afdc69e9d22335d37eac46edd3be8223a602e0cc610326aa0568ba20f30db934c181a84c21cd370329f7a4318d2
-
Filesize
272B
MD559ae751e9f8da99ab5ad5959d9df0e81
SHA172e80fea07e5de2f8ead6d2da694e0df8b3de3a5
SHA256d94539650ef05f534443ccd2a349c78e1443647a29041fc6cc46c0f371e513f2
SHA512ff5024eefdabb01c731187b836a45e514758382ac1700bc39b68c0e05ac32daff47c8aec3fe3e47b4d0b206c6b41d234decdcfe6cbe08a455ddec9330f3c1295
-
Filesize
12KB
MD5c3dafffc44f891f0d3a7e77083ae5b5d
SHA11127df7667959276b1e1a92e8d7db1774bbd6d3d
SHA256c98d4a35dfd15e7dce9167e144348580f79ef9be122d7b78bc841f8726d31c3d
SHA5120786de471b92053fe1e1a67fc347016e1c9249da26ac13d6591f163d3c75e0a83e0f862905ff0165e40bc92e43964c2efbdce907151ff8e88d9586a0982de4fb
-
Filesize
1KB
MD52e4ebdae53080a2422e5734e66ba4807
SHA1201c5e588ad309626cf36600ad1a0e638f55dd77
SHA256986f026c9b46dbf6cd9f005b005daae389b139a0905aa2fa3223331f160c644a
SHA5123b208e1b91fed29a44ce54a044fc95518ea03918e5367bdbb3ef9b479589482eb03204e127b7d7dcb3c2ae0f31b9b6ee6fa614cbc0919fd88c573731a6041eff