Analysis
-
max time kernel
144s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
07/06/2024, 03:47
Static task
static1
Behavioral task
behavioral1
Sample
3478b150467c23f1d1a978d49fd85a10_NeikiAnalytics.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
3478b150467c23f1d1a978d49fd85a10_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
3478b150467c23f1d1a978d49fd85a10_NeikiAnalytics.exe
-
Size
65KB
-
MD5
3478b150467c23f1d1a978d49fd85a10
-
SHA1
f89f2c2f37c08ba189c873d428e9076ab115a1a9
-
SHA256
9ff9623055f8121b92655584fb9c51d4e017d974cd5adf92c0ba63288f08fe34
-
SHA512
40142290aa573936ca1ce33b12f5f28564ceb64e7ee7f1bef1b727002bc311f683a823040bb744096b9df0d8dd4d731d95fd01e2fab97887d5b0b8d1c8211f69
-
SSDEEP
1536:NLI4qg9+Q/KMJqSsGpdNmLUIsWsdM5T233AFCz:Bb/jq0LNmLUIsWsdM5T233AFCz
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation 3478b150467c23f1d1a978d49fd85a10_NeikiAnalytics.exe -
Executes dropped EXE 1 IoCs
pid Process 3236 kbjhost.exe -
resource yara_rule behavioral2/memory/5064-0-0x0000000010000000-0x000000001000E000-memory.dmp upx behavioral2/memory/5064-3-0x0000000010000000-0x000000001000E000-memory.dmp upx behavioral2/memory/3236-11-0x0000000010000000-0x000000001000E000-memory.dmp upx behavioral2/memory/3236-12-0x0000000010000000-0x000000001000E000-memory.dmp upx behavioral2/memory/3236-14-0x0000000010000000-0x000000001000E000-memory.dmp upx behavioral2/memory/3236-15-0x0000000010000000-0x000000001000E000-memory.dmp upx behavioral2/memory/3236-16-0x0000000010000000-0x000000001000E000-memory.dmp upx behavioral2/memory/3236-17-0x0000000010000000-0x000000001000E000-memory.dmp upx behavioral2/memory/3236-19-0x0000000010000000-0x000000001000E000-memory.dmp upx behavioral2/memory/3236-21-0x0000000010000000-0x000000001000E000-memory.dmp upx behavioral2/memory/3236-23-0x0000000010000000-0x000000001000E000-memory.dmp upx behavioral2/memory/3236-25-0x0000000010000000-0x000000001000E000-memory.dmp upx -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\Debug\kbjhost.exe 3478b150467c23f1d1a978d49fd85a10_NeikiAnalytics.exe File opened for modification C:\Windows\Debug\kbjhost.exe 3478b150467c23f1d1a978d49fd85a10_NeikiAnalytics.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 5064 3478b150467c23f1d1a978d49fd85a10_NeikiAnalytics.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 5064 wrote to memory of 4584 5064 3478b150467c23f1d1a978d49fd85a10_NeikiAnalytics.exe 86 PID 5064 wrote to memory of 4584 5064 3478b150467c23f1d1a978d49fd85a10_NeikiAnalytics.exe 86 PID 5064 wrote to memory of 4584 5064 3478b150467c23f1d1a978d49fd85a10_NeikiAnalytics.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\3478b150467c23f1d1a978d49fd85a10_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\3478b150467c23f1d1a978d49fd85a10_NeikiAnalytics.exe"1⤵
- Checks computer location settings
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5064 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\3478B1~1.EXE > nul2⤵PID:4584
-
-
C:\Windows\Debug\kbjhost.exeC:\Windows\Debug\kbjhost.exe1⤵
- Executes dropped EXE
PID:3236
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
65KB
MD5cb96305810ca69f1d26859ef9872aea2
SHA13cba4bc8b00debceed88f4445ca29ec3cb04c92e
SHA25637483055473428f35112192a5a8c2f44dec2c77c2ac26190deeb811be77257f2
SHA512461fcb549ba813e4b943cbd2814d98d3ec6bc013cfbbb2d5fa82834315d1aed8fa96f357755b6564762018d80023842c718af1b60b9c5397556c10027d32c338