Analysis
-
max time kernel
150s -
max time network
83s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
11-06-2024 22:51
Static task
static1
Behavioral task
behavioral1
Sample
0a5299aad2c051d927fbf424d98bb080_NeikiAnalytics.exe
Resource
win7-20240220-en
General
-
Target
0a5299aad2c051d927fbf424d98bb080_NeikiAnalytics.exe
-
Size
331KB
-
MD5
0a5299aad2c051d927fbf424d98bb080
-
SHA1
d70a7563a998e324969a42b0a346eb5079513e08
-
SHA256
0e5558661eb5f41024501a214e450206e8000f27d528053126db9055df520d27
-
SHA512
1113535074cf4a4b06ed86bc9694ebfafdb882cce759ed09fbd65e0d0676e51192b2e31f2a3eddfb61afbeffc8209239c8a55ddbc05ed33cdac0ad0f017d0a5b
-
SSDEEP
6144:yty5fbpxDuMcHYwt1gxloqtaE5iWbUMqfn8EijRUNafrHBw/iA:ytCLD7+51gxeq3gOU9EEQrhMz
Malware Config
Extracted
urelas
218.54.31.165
218.54.31.226
Signatures
-
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
0a5299aad2c051d927fbf424d98bb080_NeikiAnalytics.exeamyvf.exeruxiko.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation 0a5299aad2c051d927fbf424d98bb080_NeikiAnalytics.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation amyvf.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation ruxiko.exe -
Executes dropped EXE 3 IoCs
Processes:
amyvf.exeruxiko.exegokue.exepid process 216 amyvf.exe 1180 ruxiko.exe 3328 gokue.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
gokue.exepid process 3328 gokue.exe 3328 gokue.exe 3328 gokue.exe 3328 gokue.exe 3328 gokue.exe 3328 gokue.exe 3328 gokue.exe 3328 gokue.exe 3328 gokue.exe 3328 gokue.exe 3328 gokue.exe 3328 gokue.exe 3328 gokue.exe 3328 gokue.exe 3328 gokue.exe 3328 gokue.exe 3328 gokue.exe 3328 gokue.exe 3328 gokue.exe 3328 gokue.exe 3328 gokue.exe 3328 gokue.exe 3328 gokue.exe 3328 gokue.exe 3328 gokue.exe 3328 gokue.exe 3328 gokue.exe 3328 gokue.exe 3328 gokue.exe 3328 gokue.exe 3328 gokue.exe 3328 gokue.exe 3328 gokue.exe 3328 gokue.exe 3328 gokue.exe 3328 gokue.exe 3328 gokue.exe 3328 gokue.exe 3328 gokue.exe 3328 gokue.exe 3328 gokue.exe 3328 gokue.exe 3328 gokue.exe 3328 gokue.exe 3328 gokue.exe 3328 gokue.exe 3328 gokue.exe 3328 gokue.exe 3328 gokue.exe 3328 gokue.exe 3328 gokue.exe 3328 gokue.exe 3328 gokue.exe 3328 gokue.exe 3328 gokue.exe 3328 gokue.exe 3328 gokue.exe 3328 gokue.exe 3328 gokue.exe 3328 gokue.exe 3328 gokue.exe 3328 gokue.exe 3328 gokue.exe 3328 gokue.exe -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
0a5299aad2c051d927fbf424d98bb080_NeikiAnalytics.exeamyvf.exeruxiko.exedescription pid process target process PID 100 wrote to memory of 216 100 0a5299aad2c051d927fbf424d98bb080_NeikiAnalytics.exe amyvf.exe PID 100 wrote to memory of 216 100 0a5299aad2c051d927fbf424d98bb080_NeikiAnalytics.exe amyvf.exe PID 100 wrote to memory of 216 100 0a5299aad2c051d927fbf424d98bb080_NeikiAnalytics.exe amyvf.exe PID 100 wrote to memory of 2400 100 0a5299aad2c051d927fbf424d98bb080_NeikiAnalytics.exe cmd.exe PID 100 wrote to memory of 2400 100 0a5299aad2c051d927fbf424d98bb080_NeikiAnalytics.exe cmd.exe PID 100 wrote to memory of 2400 100 0a5299aad2c051d927fbf424d98bb080_NeikiAnalytics.exe cmd.exe PID 216 wrote to memory of 1180 216 amyvf.exe ruxiko.exe PID 216 wrote to memory of 1180 216 amyvf.exe ruxiko.exe PID 216 wrote to memory of 1180 216 amyvf.exe ruxiko.exe PID 1180 wrote to memory of 3328 1180 ruxiko.exe gokue.exe PID 1180 wrote to memory of 3328 1180 ruxiko.exe gokue.exe PID 1180 wrote to memory of 3328 1180 ruxiko.exe gokue.exe PID 1180 wrote to memory of 1920 1180 ruxiko.exe cmd.exe PID 1180 wrote to memory of 1920 1180 ruxiko.exe cmd.exe PID 1180 wrote to memory of 1920 1180 ruxiko.exe cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\0a5299aad2c051d927fbf424d98bb080_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\0a5299aad2c051d927fbf424d98bb080_NeikiAnalytics.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:100 -
C:\Users\Admin\AppData\Local\Temp\amyvf.exe"C:\Users\Admin\AppData\Local\Temp\amyvf.exe" hi2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:216 -
C:\Users\Admin\AppData\Local\Temp\ruxiko.exe"C:\Users\Admin\AppData\Local\Temp\ruxiko.exe" OK3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1180 -
C:\Users\Admin\AppData\Local\Temp\gokue.exe"C:\Users\Admin\AppData\Local\Temp\gokue.exe"4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:3328
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\_vslite.bat" "4⤵PID:1920
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\_vslite.bat" "2⤵PID:2400
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
306B
MD5a011fbf19e5e6d993f257224c8c022ba
SHA119d0e28f14ee707c0a2adbddf93b3d7204b4fbe4
SHA2560f99d4760105424657c8d593e87b17ab5890381a8cea295396b6baae5657ca14
SHA512385d72981735bffa898b761b1122246dffc6c3cd2cb6b5b91d9b27e3d1beb742538218d30e457ecf8bf517848618ea4e37a73c9c2275fb8fa8e8b7cfd9530229
-
Filesize
224B
MD50645507e8ff36c4fbd93ffc29d34d0e1
SHA1ef6ebeae97032bbe919e66c058d6a9c9f3ab25e2
SHA256d0d1af0cfd519df2ff5632f6fbe9cdc1937891e2a4caeb9df230f873f6e4916d
SHA512db14abd137fda52111fd4d27c58cebae7e4158b9f9f87f2c3893153864f9a8a821c3294654046700cb0d50e1d806e9cbb716a2eaa79274b8adcde9a7fe410d0c
-
Filesize
331KB
MD5e2bec74958cdde9d203f5622ca1717e7
SHA1f514929651b991cf7998124be60b8ac91a42ece3
SHA2563719297383cc8c05fa5629aefbeb2b6458b35568cb28cbeb6063000d052ea19d
SHA5120e48768f18a03f2723765870b877b7885583ca289dc7e6983efa738a203fe25b6e50572a3b0d5d3fe752d72d543919c41daa711c8bae6f3723ff8362eceb69ad
-
Filesize
223KB
MD52c3eb74542e4cda86d9d16be4f577a7d
SHA19e8d362981338db406d5db1b47d48337183c8048
SHA256e98d6ea2c78f7244be3a85d9c56df34a2946e32decabbb09c8dab68ad044b8ba
SHA5123aa14174299a65258caa7ed6a77375195db7a7ea9f1ffb6d71ecb6b8102744b74cfc346628505aa308269628d46141f7e3d7fc660eeb112acf485930c6833386
-
Filesize
512B
MD5b73b858327b283b185f84e49c79549ae
SHA10eee43c68c775197877d0972b8dbc6a52659654e
SHA25604bc9f197f0c705560494c1bc2587bc08d4138c751242e9f590e57dcc7b84c5c
SHA512570c9707dc107ec9a30af219d4dff7ce8089b46617a38ec74d45ddd5d7968046694dbbd03b7df6bd43771b0bd83c4c678f480db350738c2c76bfe98557b4d23a
-
Filesize
331KB
MD55819a1602a5f61467d3aca4c1019cfad
SHA189e56ad12d31dbb6965c80a8eb399f107d0c5587
SHA2562e420e988c096afeae5785b3c8c9a9d5e9234ffe898cef7fbf24ad5a8ceb1bbd
SHA5127921015c097cb0f815912a8a13e8635efd8c54bc3a324c9b5ad972fa8b47f84a32bff255381ea87ff4451b51149b4b8d0f7c92a96f00b670a88b815ccf085042