Analysis
-
max time kernel
145s -
max time network
100s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
05-06-2024 13:22
Static task
static1
Behavioral task
behavioral1
Sample
563ec7c004371e55dbcabdefe0a068a0_NeikiAnalytics.exe
Resource
win7-20240221-en
General
-
Target
563ec7c004371e55dbcabdefe0a068a0_NeikiAnalytics.exe
-
Size
6.4MB
-
MD5
563ec7c004371e55dbcabdefe0a068a0
-
SHA1
f37214fbf7124578f0bfa4e5793cf79cb0e0a0b8
-
SHA256
d9ca4bb93c3b8d1e662f0bbb62db56b1de422ba641a51affc7f6ec5ecf1b7f7a
-
SHA512
6223244be3a7b48095b5264060bb1066c2d4a94ca6b103dd97aa8ae47aaf249b2f3f12da6684ceafe0cc7923661ef49e62814162171abdd23a79b0115647d6f0
-
SSDEEP
98304:Roc5swrA2XGxlHKcjTjNk3o659yrnfKtDrKIAyyks+Ctf8mQZVSX:i0LrA2kHKQHNk3og9unipQyOaOX
Malware Config
Extracted
urelas
218.54.31.165
218.54.31.226
Signatures
-
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
563ec7c004371e55dbcabdefe0a068a0_NeikiAnalytics.exemuebo.exelocugu.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation 563ec7c004371e55dbcabdefe0a068a0_NeikiAnalytics.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation muebo.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation locugu.exe -
Executes dropped EXE 3 IoCs
Processes:
muebo.exelocugu.exeqopos.exepid process 4532 muebo.exe 5004 locugu.exe 5100 qopos.exe -
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\qopos.exe upx behavioral2/memory/5100-70-0x0000000000400000-0x0000000000599000-memory.dmp upx behavioral2/memory/5100-74-0x0000000000400000-0x0000000000599000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 30 IoCs
Processes:
563ec7c004371e55dbcabdefe0a068a0_NeikiAnalytics.exemuebo.exelocugu.exeqopos.exepid process 1216 563ec7c004371e55dbcabdefe0a068a0_NeikiAnalytics.exe 1216 563ec7c004371e55dbcabdefe0a068a0_NeikiAnalytics.exe 4532 muebo.exe 4532 muebo.exe 5004 locugu.exe 5004 locugu.exe 5100 qopos.exe 5100 qopos.exe 5100 qopos.exe 5100 qopos.exe 5100 qopos.exe 5100 qopos.exe 5100 qopos.exe 5100 qopos.exe 5100 qopos.exe 5100 qopos.exe 5100 qopos.exe 5100 qopos.exe 5100 qopos.exe 5100 qopos.exe 5100 qopos.exe 5100 qopos.exe 5100 qopos.exe 5100 qopos.exe 5100 qopos.exe 5100 qopos.exe 5100 qopos.exe 5100 qopos.exe 5100 qopos.exe 5100 qopos.exe -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
563ec7c004371e55dbcabdefe0a068a0_NeikiAnalytics.exemuebo.exelocugu.exedescription pid process target process PID 1216 wrote to memory of 4532 1216 563ec7c004371e55dbcabdefe0a068a0_NeikiAnalytics.exe muebo.exe PID 1216 wrote to memory of 4532 1216 563ec7c004371e55dbcabdefe0a068a0_NeikiAnalytics.exe muebo.exe PID 1216 wrote to memory of 4532 1216 563ec7c004371e55dbcabdefe0a068a0_NeikiAnalytics.exe muebo.exe PID 1216 wrote to memory of 2396 1216 563ec7c004371e55dbcabdefe0a068a0_NeikiAnalytics.exe cmd.exe PID 1216 wrote to memory of 2396 1216 563ec7c004371e55dbcabdefe0a068a0_NeikiAnalytics.exe cmd.exe PID 1216 wrote to memory of 2396 1216 563ec7c004371e55dbcabdefe0a068a0_NeikiAnalytics.exe cmd.exe PID 4532 wrote to memory of 5004 4532 muebo.exe locugu.exe PID 4532 wrote to memory of 5004 4532 muebo.exe locugu.exe PID 4532 wrote to memory of 5004 4532 muebo.exe locugu.exe PID 5004 wrote to memory of 5100 5004 locugu.exe qopos.exe PID 5004 wrote to memory of 5100 5004 locugu.exe qopos.exe PID 5004 wrote to memory of 5100 5004 locugu.exe qopos.exe PID 5004 wrote to memory of 4732 5004 locugu.exe cmd.exe PID 5004 wrote to memory of 4732 5004 locugu.exe cmd.exe PID 5004 wrote to memory of 4732 5004 locugu.exe cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\563ec7c004371e55dbcabdefe0a068a0_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\563ec7c004371e55dbcabdefe0a068a0_NeikiAnalytics.exe"1⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1216 -
C:\Users\Admin\AppData\Local\Temp\muebo.exe"C:\Users\Admin\AppData\Local\Temp\muebo.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4532 -
C:\Users\Admin\AppData\Local\Temp\locugu.exe"C:\Users\Admin\AppData\Local\Temp\locugu.exe" OK3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:5004 -
C:\Users\Admin\AppData\Local\Temp\qopos.exe"C:\Users\Admin\AppData\Local\Temp\qopos.exe"4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:5100
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\_vslite.bat" "4⤵PID:4732
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\_vslite.bat" "2⤵PID:2396
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
306B
MD5dcc8b487dfae5d29a2ebd248933341d4
SHA1c0d87277716ea0072a3a9667d7483048c4573979
SHA2561b1ecbc4bf3bcf79f5aa92a699e60fd723a5bcb93184baeeee1a9736ee0546c2
SHA512aa03571400e9a29ae0dfb6fc2fe8e23e69eaba24ca794fd957ce03b16b980a22a45015ec09ce6dc2c21f20d0e78ec91bf28e8dc51080c65654642690755a87a6
-
Filesize
224B
MD572bfec1d9f1b6508ad708a6bec515754
SHA1435875e2ae52c56792a1db734947551b185ea8fb
SHA2564b3c41af184451a2507b298ededb9e6cb180ffa03376b48169c42cdea3c0af53
SHA512321fd53fd04016c39d422e6ec152bd21227a0718f8a86d4b258e9371f17d284776d583ab8a829df238ff4510c49a53fa8a22344d5ae2f362f58232677faadf40
-
Filesize
104B
MD5dbef593bccc2049f860f718cd6fec321
SHA1e7e9f8235b4eb70aa99dd2c38009f2152575a8d0
SHA25630f820bb1ca6c20bcd77113c7377e01f31cdf0ec5b64864f22887d41a9bf3c7a
SHA5123e87c661c343b72f5dff4587b99688dbf655be9d6d903a75151bd9f204f55858e90388591f660bcbded5278ef94e322bf3e7c57374c9b16fce1eef7082395a2a
-
Filesize
512B
MD5a95d41ae4f01657e0ec47e5d70ca96fe
SHA18fc7928df9031974214961a1a9e9f62bcc4cbba3
SHA2562dc12482b984d754f7a0ce20e949137d8b825335cf56b8c941cde3b07cacd0dc
SHA512a462beeb76b2bbfe4864a7b02e2c17fc25a681a2506960b318c7d3624175abda340dad6a8883d06439c2c416a41dc4d37b6a6d6e86e4c465c2a2c267b416d714
-
Filesize
6.4MB
MD578c3ddd827f5420b9fd47345ed78c3f3
SHA19e5d30f537798497eebe42ba363b2ead3b6c7aa6
SHA2564625d5652089ddd8f10d964a69fc17219079f7cd01f7be1268e05718e6a4c4bd
SHA5120068d5475455a39c72b51568363dc7e6acec984d96613ca07ab7adb1e48fa25ea1bc32d0e320cc28eaccea0f8ca97a8882d740734d67aad748bc322bcdb6047a
-
Filesize
459KB
MD58229318e8dbd0380b3223b2aff95580b
SHA1391225b64f6eee11431dae8019b30002c46b22c1
SHA256229474bb92aff5b122b9e84eea93630c412ca3aeee2ddb83bc4525df4c2a6542
SHA5127dc490cf3fc791425cf93f83bf9306b45fd5e6ef547dd909e60e4e9a0528016f2d5dadfb166aeda29f286bf054a8e73bd01a9d0b28f21967d9c2e3e0d89cccf7