Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
08-06-2024 03:26
Behavioral task
behavioral1
Sample
87df4aa743aa38020380f61c9cee9100_NeikiAnalytics.exe
Resource
win7-20240221-en
General
-
Target
87df4aa743aa38020380f61c9cee9100_NeikiAnalytics.exe
-
Size
399KB
-
MD5
87df4aa743aa38020380f61c9cee9100
-
SHA1
891fa34174bd7386a255659d2e1a43dc133c65fb
-
SHA256
a173df64c5cac8fade7a480d53d0c55af138f41ae25a11a0f1653984eb3cf019
-
SHA512
54b59e529a7ac51c3819cb5f437edcb869bea35c796f7fbbdbce91238c5a83f997542845a4fd12dd848c60b43fb04df12f78bf9670500b6bcc18eeb1d7c30a3d
-
SSDEEP
6144:1sa1jZVgy03se7k5kBTTg7YMz6j8GuHEqqtKKUrBwj3bT3RzS:rtVgyuse2kBXg7Cj81cKK7jfRS
Malware Config
Extracted
urelas
1.234.83.146
133.242.129.155
218.54.31.165
218.54.31.226
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
87df4aa743aa38020380f61c9cee9100_NeikiAnalytics.exeypnek.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation 87df4aa743aa38020380f61c9cee9100_NeikiAnalytics.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation ypnek.exe -
Executes dropped EXE 2 IoCs
Processes:
ypnek.exeiszux.exepid process 5072 ypnek.exe 3036 iszux.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
iszux.exepid process 3036 iszux.exe 3036 iszux.exe 3036 iszux.exe 3036 iszux.exe 3036 iszux.exe 3036 iszux.exe 3036 iszux.exe 3036 iszux.exe 3036 iszux.exe 3036 iszux.exe 3036 iszux.exe 3036 iszux.exe 3036 iszux.exe 3036 iszux.exe 3036 iszux.exe 3036 iszux.exe 3036 iszux.exe 3036 iszux.exe 3036 iszux.exe 3036 iszux.exe 3036 iszux.exe 3036 iszux.exe 3036 iszux.exe 3036 iszux.exe 3036 iszux.exe 3036 iszux.exe 3036 iszux.exe 3036 iszux.exe 3036 iszux.exe 3036 iszux.exe 3036 iszux.exe 3036 iszux.exe 3036 iszux.exe 3036 iszux.exe 3036 iszux.exe 3036 iszux.exe 3036 iszux.exe 3036 iszux.exe 3036 iszux.exe 3036 iszux.exe 3036 iszux.exe 3036 iszux.exe 3036 iszux.exe 3036 iszux.exe 3036 iszux.exe 3036 iszux.exe 3036 iszux.exe 3036 iszux.exe 3036 iszux.exe 3036 iszux.exe 3036 iszux.exe 3036 iszux.exe 3036 iszux.exe 3036 iszux.exe 3036 iszux.exe 3036 iszux.exe 3036 iszux.exe 3036 iszux.exe 3036 iszux.exe 3036 iszux.exe 3036 iszux.exe 3036 iszux.exe 3036 iszux.exe 3036 iszux.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
87df4aa743aa38020380f61c9cee9100_NeikiAnalytics.exeypnek.exedescription pid process target process PID 3280 wrote to memory of 5072 3280 87df4aa743aa38020380f61c9cee9100_NeikiAnalytics.exe ypnek.exe PID 3280 wrote to memory of 5072 3280 87df4aa743aa38020380f61c9cee9100_NeikiAnalytics.exe ypnek.exe PID 3280 wrote to memory of 5072 3280 87df4aa743aa38020380f61c9cee9100_NeikiAnalytics.exe ypnek.exe PID 3280 wrote to memory of 3568 3280 87df4aa743aa38020380f61c9cee9100_NeikiAnalytics.exe cmd.exe PID 3280 wrote to memory of 3568 3280 87df4aa743aa38020380f61c9cee9100_NeikiAnalytics.exe cmd.exe PID 3280 wrote to memory of 3568 3280 87df4aa743aa38020380f61c9cee9100_NeikiAnalytics.exe cmd.exe PID 5072 wrote to memory of 3036 5072 ypnek.exe iszux.exe PID 5072 wrote to memory of 3036 5072 ypnek.exe iszux.exe PID 5072 wrote to memory of 3036 5072 ypnek.exe iszux.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\87df4aa743aa38020380f61c9cee9100_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\87df4aa743aa38020380f61c9cee9100_NeikiAnalytics.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\ypnek.exe"C:\Users\Admin\AppData\Local\Temp\ypnek.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\iszux.exe"C:\Users\Admin\AppData\Local\Temp\iszux.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\_uinsey.bat" "2⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\_uinsey.batFilesize
306B
MD52583926963fac30b7d5af56123f46fa5
SHA1fb0328e4027c2bdf7464bf0a339016b64cc212b5
SHA256d78b8a268eb39c1875165e8a448a1b47c48aa446d3475218086167d440dcc198
SHA51275f6e4c90a4f679f8d0c8fba0bcf58b5b3b29abbc204f9e8045c12169bc061ecfc3dc33890d07844284f3f9bef111b1f903d9ad0d19f5fcf5004ffae88d415c7
-
C:\Users\Admin\AppData\Local\Temp\golfinfo.iniFilesize
512B
MD5c0fcc6625627dab9e2475084c0ccb0b1
SHA1091b4a30001194609ef160c8c24db3b40b9dbd21
SHA2560bd9e4b634d12457c54349697322535186bd149d019246e2dd36a99a7cac17cc
SHA51250d1fec93e7988462a71e588a975002020732a5b83a916d86d725ec5ff43fde9f45f2b0d25e2199f96cedd7645ae67e5c7335a23600fcc845de0ebc48853a4f2
-
C:\Users\Admin\AppData\Local\Temp\iszux.exeFilesize
206KB
MD5f6b11ffc62330659c5f07af4b8e67438
SHA13afd71d8410410c22eafad8008341425edd3d39c
SHA2565a78064736a0f0e18cf30dbc695ace1a63518d000e173783b768d81f77bf10b7
SHA512ca9e9ed6be2c7ddb9a904b1087e3668f0b1dc4014037ea787b890ccf9123e4742c67ac83c074a3d2c1a311e57c78eebda48ddd7a43887abb423b7b3d656433e9
-
C:\Users\Admin\AppData\Local\Temp\ypnek.exeFilesize
399KB
MD5ae3b768e51fb7b2a69a70dc847bd3309
SHA1098d7391c377f570f30de0d4833cb53f394b264d
SHA256b11453e5374ceed7bcb420134e599e5cfdbc66c1c6a36c885d458ad89d509cf5
SHA512e91746570ed1a13d45cc5f8668680d986c489fdd3f6301b8cd5cd14799ccda66de13c9a004209655616aa7b5da2b872a14b9b51f2b1a32db5d550439f46dfc9d
-
memory/3036-27-0x000000000065A000-0x000000000065B000-memory.dmpFilesize
4KB
-
memory/3036-26-0x00000000005C0000-0x000000000065B000-memory.dmpFilesize
620KB
-
memory/3036-29-0x00000000005C0000-0x000000000065B000-memory.dmpFilesize
620KB
-
memory/3036-30-0x00000000005C0000-0x000000000065B000-memory.dmpFilesize
620KB
-
memory/3036-31-0x00000000005C0000-0x000000000065B000-memory.dmpFilesize
620KB
-
memory/3036-32-0x00000000005C0000-0x000000000065B000-memory.dmpFilesize
620KB
-
memory/3036-33-0x00000000005C0000-0x000000000065B000-memory.dmpFilesize
620KB
-
memory/3280-14-0x0000000000840000-0x00000000008A8000-memory.dmpFilesize
416KB
-
memory/3280-0-0x0000000000840000-0x00000000008A8000-memory.dmpFilesize
416KB
-
memory/5072-25-0x0000000000430000-0x0000000000498000-memory.dmpFilesize
416KB
-
memory/5072-12-0x0000000000430000-0x0000000000498000-memory.dmpFilesize
416KB