Analysis

  • max time kernel
    91s
  • max time network
    95s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240611-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13/06/2024, 06:10

General

  • Target

    6489b4ceac77c3bf4685d7c16c113ac0_NeikiAnalytics.exe

  • Size

    56KB

  • MD5

    6489b4ceac77c3bf4685d7c16c113ac0

  • SHA1

    ee00f69e4ee20fe6eb597e7cd9948238d56f3bd7

  • SHA256

    50aeab4bcd0135c166d6ba87b17363f3fe4e5398d67b68bf44f241a70b6cfaa1

  • SHA512

    ff89a7674cbaeeff93129233a262851ba602bcee1e5a22a1b43f7144eedc59c77d534aa6154472a9826a4e37da7aa94091dc2abea673cdd9acd27c659925546b

  • SSDEEP

    768:MApQr0DWvdFJI34HGxusOy9Rp1pLeAxoeC48PqK1OtaP6cCFzENREMZ7vC2t3:MAaJJlTsh7pWezEPJB+OW2N

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Drops file in System32 directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6489b4ceac77c3bf4685d7c16c113ac0_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\6489b4ceac77c3bf4685d7c16c113ac0_NeikiAnalytics.exe"
    1⤵
    • Checks computer location settings
    • Drops file in System32 directory
    • Suspicious use of WriteProcessMemory
    PID:3816
    • C:\windows\SysWOW64\sal.exe
      "C:\windows\system32\sal.exe"
      2⤵
      • Executes dropped EXE
      PID:2896

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\sal.exe

    Filesize

    56KB

    MD5

    34fc023408e49d0f99e89d95008a204a

    SHA1

    c737841dd56c219e285ac6b7f17b8a94e297736d

    SHA256

    b5a11f758a80ac14488a5dffbf325621496cf884d0317ae91649d9fa6be772f5

    SHA512

    601e6a251060b805a5d19c68d4c966107443074b1a96b14ca6ecc88847aff2f054895607723b76bdf49faa738caa66cde0a3ad23c3a2e5193ee87cdea974187e

  • memory/2896-9-0x0000000000400000-0x0000000000409000-memory.dmp

    Filesize

    36KB

  • memory/3816-0-0x0000000000400000-0x0000000000409000-memory.dmp

    Filesize

    36KB

  • memory/3816-10-0x0000000000400000-0x0000000000409000-memory.dmp

    Filesize

    36KB