Analysis
-
max time kernel
91s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
05/06/2024, 08:19
Static task
static1
Behavioral task
behavioral1
Sample
4b2493295303400c36fbc99285710fe0_NeikiAnalytics.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
4b2493295303400c36fbc99285710fe0_NeikiAnalytics.exe
Resource
win10v2004-20240426-en
General
-
Target
4b2493295303400c36fbc99285710fe0_NeikiAnalytics.exe
-
Size
12KB
-
MD5
4b2493295303400c36fbc99285710fe0
-
SHA1
c2045cabb2078d4e217fe3631039b0e0a6f22596
-
SHA256
eb8f94a7ed05a3972b9d53d9c50add9c06324dda19774e403bfe2be924515a99
-
SHA512
4e3377da9d033ed1b3d505ce464946202c9c7cee77ff66bc83e21e7bac09a4b34418886350f56350c5ac8efcb21557b6e058c6f0dcc4692581c83cddf911a6f0
-
SSDEEP
384:0L7li/2zyJq2DcEQvdQcJKLTp/NK9xa4W:i0MCQ9c4W
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\Control Panel\International\Geo\Nation 4b2493295303400c36fbc99285710fe0_NeikiAnalytics.exe -
Deletes itself 1 IoCs
pid Process 1160 tmp5082.tmp.exe -
Executes dropped EXE 1 IoCs
pid Process 1160 tmp5082.tmp.exe -
Uses the VBS compiler for execution 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3084 4b2493295303400c36fbc99285710fe0_NeikiAnalytics.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 3084 wrote to memory of 4184 3084 4b2493295303400c36fbc99285710fe0_NeikiAnalytics.exe 85 PID 3084 wrote to memory of 4184 3084 4b2493295303400c36fbc99285710fe0_NeikiAnalytics.exe 85 PID 3084 wrote to memory of 4184 3084 4b2493295303400c36fbc99285710fe0_NeikiAnalytics.exe 85 PID 4184 wrote to memory of 2080 4184 vbc.exe 87 PID 4184 wrote to memory of 2080 4184 vbc.exe 87 PID 4184 wrote to memory of 2080 4184 vbc.exe 87 PID 3084 wrote to memory of 1160 3084 4b2493295303400c36fbc99285710fe0_NeikiAnalytics.exe 88 PID 3084 wrote to memory of 1160 3084 4b2493295303400c36fbc99285710fe0_NeikiAnalytics.exe 88 PID 3084 wrote to memory of 1160 3084 4b2493295303400c36fbc99285710fe0_NeikiAnalytics.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\4b2493295303400c36fbc99285710fe0_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\4b2493295303400c36fbc99285710fe0_NeikiAnalytics.exe"1⤵
- Checks computer location settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3084 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\ettmowz3\ettmowz3.cmdline"2⤵
- Suspicious use of WriteProcessMemory
PID:4184 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES519A.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc4B301EA4C77E4093A6295219201F597C.TMP"3⤵PID:2080
-
-
-
C:\Users\Admin\AppData\Local\Temp\tmp5082.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp5082.tmp.exe" C:\Users\Admin\AppData\Local\Temp\4b2493295303400c36fbc99285710fe0_NeikiAnalytics.exe2⤵
- Deletes itself
- Executes dropped EXE
PID:1160
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD516ff3ef6ff9020e570f42b94ef6ef59c
SHA178e1667064c3ed8a785af24fd196f982b152d19a
SHA2566cf02b097ed3365b52fcb21506872030f97f6091741a4b0aa639e6168c31c1b0
SHA512d519f85d8b82dbedac27607777226a528de1a14de7f624eeddf95ae22424a5021a33fd3ca02f1edfcf53f4f7783f52e1a5e394bc855240b1da96fd8dafda817b
-
Filesize
1KB
MD5891fc5a2538e64340badb17251fb5b45
SHA1a5d27e86d8a1634c1fab361fb387af122736e27c
SHA256e67e9ca6508bfda6fb482085d87374fdfe63efe870a33716c9d3ba6b284b2334
SHA512bb2fb515b0bce7884aaf38fddceec2a5e74349187d3ba1ba1f78289e14516f097a86cbe0a2bc5087b921bad05f5ce8e0eb226475c236c037dfb74f8ea4c82e72
-
Filesize
2KB
MD518c89170270aacd60db1f787b316f45a
SHA15b98b6ce3cf6767285fc54c6dde61f1170946e5f
SHA25671552cf5f196e9162833e78a6ef53ce86e947143acfc972090644e240846f88c
SHA512cdc4a923d39e6cd24d831d22723ced222615dee308e2593497a8a1ccba1f4fa44660dcf09a3e112d589a38362e9f2b63c1408333e54df5c3d4f522994f72895a
-
Filesize
273B
MD58f75e64a3cbd9c9e12bfc4f0a8c458b6
SHA1611174a33fb21b9de0cd5c0fe7ea4b1a52404564
SHA256732c0d0e5b621a139607d80113420e688dcac13b3c6cf329f5cb196de927c316
SHA512ac546a9381ec3d95234e17125bbd716df67b0b7da923b8318a9f33e6520dc46a5f2e72837e56862632fa20bb76f71a882610fcdd2d2bfe853f79113b7bdf4e2a
-
Filesize
12KB
MD5a54d11ff0278d600782328cc6ff964af
SHA1b015161c5817b933d5cb054a38e7274f0879fda3
SHA25643e475d5ef6b591db67403d9cfdcfffdcfa04018a0ad60778de9c939d4a58936
SHA512a082dbb97754449eb5da6a118fe42b599b65edd2cbb3678e45947aea1a92f66a11a73f3f24d5eeee39b1d2f9903670bff94990876c5ac76e069581e6e0847e17
-
Filesize
1KB
MD596a340201a5062aa65513b8f11f1c005
SHA12f89f28eeb282ee79ef3c929f95696d62760f026
SHA2561987670349059d2dcea5b44b0de767644ca7ee7bed92399c793c8bd1a7c50b08
SHA512c1d6ff63415d411c81157a2e73dcd3dd65a8ba04ddfd07acd06f736c98f990905f864a7c72bc7ce25a380685f404518f178c5aee32ee8b71fc1a8c980f261887