Analysis
-
max time kernel
149s -
max time network
84s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
17-06-2024 06:26
Behavioral task
behavioral1
Sample
59b46d52fbe1241c3ef7fea2830eca60_NeikiAnalytics.exe
Resource
win7-20240508-en
General
-
Target
59b46d52fbe1241c3ef7fea2830eca60_NeikiAnalytics.exe
-
Size
415KB
-
MD5
59b46d52fbe1241c3ef7fea2830eca60
-
SHA1
ac2375cb83e8e93964a5ba4283bff4b3c5fadce8
-
SHA256
876b680120060000c51f5f13ad20fc5f53ff9036c2249dcd94fff0479be93de4
-
SHA512
51101ad0a7ab1c1059ce8d3dcf3804e1f31495910b8c037c14b50c5ad82dc5a0dd56ee52ee4a4523b4b706a4c2e4f11a170c647f741eac9611ea6462c88b6cf4
-
SSDEEP
6144:GzU7blKaP2iCWhWapKRaRXOkN4Swel6f3IsInODgr:oU7M5ijWh0XOW4sEfeO8r
Malware Config
Extracted
urelas
218.54.31.226
218.54.31.165
Signatures
-
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\loivx.exe aspack_v212_v242 -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
59b46d52fbe1241c3ef7fea2830eca60_NeikiAnalytics.exefutog.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation 59b46d52fbe1241c3ef7fea2830eca60_NeikiAnalytics.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation futog.exe -
Executes dropped EXE 2 IoCs
Processes:
futog.exeloivx.exepid process 2184 futog.exe 3376 loivx.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
loivx.exepid process 3376 loivx.exe 3376 loivx.exe 3376 loivx.exe 3376 loivx.exe 3376 loivx.exe 3376 loivx.exe 3376 loivx.exe 3376 loivx.exe 3376 loivx.exe 3376 loivx.exe 3376 loivx.exe 3376 loivx.exe 3376 loivx.exe 3376 loivx.exe 3376 loivx.exe 3376 loivx.exe 3376 loivx.exe 3376 loivx.exe 3376 loivx.exe 3376 loivx.exe 3376 loivx.exe 3376 loivx.exe 3376 loivx.exe 3376 loivx.exe 3376 loivx.exe 3376 loivx.exe 3376 loivx.exe 3376 loivx.exe 3376 loivx.exe 3376 loivx.exe 3376 loivx.exe 3376 loivx.exe 3376 loivx.exe 3376 loivx.exe 3376 loivx.exe 3376 loivx.exe 3376 loivx.exe 3376 loivx.exe 3376 loivx.exe 3376 loivx.exe 3376 loivx.exe 3376 loivx.exe 3376 loivx.exe 3376 loivx.exe 3376 loivx.exe 3376 loivx.exe 3376 loivx.exe 3376 loivx.exe 3376 loivx.exe 3376 loivx.exe 3376 loivx.exe 3376 loivx.exe 3376 loivx.exe 3376 loivx.exe 3376 loivx.exe 3376 loivx.exe 3376 loivx.exe 3376 loivx.exe 3376 loivx.exe 3376 loivx.exe 3376 loivx.exe 3376 loivx.exe 3376 loivx.exe 3376 loivx.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
59b46d52fbe1241c3ef7fea2830eca60_NeikiAnalytics.exefutog.exedescription pid process target process PID 1392 wrote to memory of 2184 1392 59b46d52fbe1241c3ef7fea2830eca60_NeikiAnalytics.exe futog.exe PID 1392 wrote to memory of 2184 1392 59b46d52fbe1241c3ef7fea2830eca60_NeikiAnalytics.exe futog.exe PID 1392 wrote to memory of 2184 1392 59b46d52fbe1241c3ef7fea2830eca60_NeikiAnalytics.exe futog.exe PID 1392 wrote to memory of 2912 1392 59b46d52fbe1241c3ef7fea2830eca60_NeikiAnalytics.exe cmd.exe PID 1392 wrote to memory of 2912 1392 59b46d52fbe1241c3ef7fea2830eca60_NeikiAnalytics.exe cmd.exe PID 1392 wrote to memory of 2912 1392 59b46d52fbe1241c3ef7fea2830eca60_NeikiAnalytics.exe cmd.exe PID 2184 wrote to memory of 3376 2184 futog.exe loivx.exe PID 2184 wrote to memory of 3376 2184 futog.exe loivx.exe PID 2184 wrote to memory of 3376 2184 futog.exe loivx.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\59b46d52fbe1241c3ef7fea2830eca60_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\59b46d52fbe1241c3ef7fea2830eca60_NeikiAnalytics.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\futog.exe"C:\Users\Admin\AppData\Local\Temp\futog.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\loivx.exe"C:\Users\Admin\AppData\Local\Temp\loivx.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\_uinsey.bat" "2⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\_uinsey.batFilesize
306B
MD59e9123ea1198bdd81248b11102e78a8e
SHA1846c2c9a50fd61390df1eed539662eb6e06bc4d4
SHA2562160bbe0e9d2051e3737b08cbcafd91ff91f87eed3484d97afd19f5274c07ce7
SHA512b8e31b48e56efff69b2d85ba8dfe7002b2c52ab3682966743cfacc7fc48a7c5ba1cc26375a2d1682f47a36aa80ae637f5ee6966bf1326b3421c78067a1ed0bca
-
C:\Users\Admin\AppData\Local\Temp\futog.exeFilesize
415KB
MD550692059b149638fe262014aba5999c0
SHA171e1d6c136b9741cf363573fa7ff58c09d3ae5dc
SHA2563c516e04e3d6e1c65a130183b1e3b0e4170a320a0b09606af7a68e66b50d8604
SHA51255d9cb9e8bce0d519bbe35de175d45f762983c28c128dd2d1404a849e0469149b0db6bf5c1ce0544ae1884ed457b6a100008872f2a5943a53cff75cfc9ef6c39
-
C:\Users\Admin\AppData\Local\Temp\golfinfo.iniFilesize
512B
MD5b941b3c81bcc4547f0486c4134742088
SHA1c56b8664b3a60d8b8214a3ae730cb0b20cd1196a
SHA2568d90530eb5f2b385b713ec504e945c61150e3adbc6595ff2205741a3310f146c
SHA51285c3c6af72067d9a00245518c3d884b7b52a1e3dbe00ecd295d6e1432e580bad40bd9bac00c63f8067cb1c11698f45777005d67cd3043539095cd22e16c78f5e
-
C:\Users\Admin\AppData\Local\Temp\loivx.exeFilesize
212KB
MD5d58eded4bd0eefe55a87531a76bd24d1
SHA1319703a3aa70385f4d770a36124f9f3788deedab
SHA2566ca5b6caa0014af0f6d040a2543e83881c7e4caa90a1ee280f8fb8d3f39b48c8
SHA512e94569c08a2b130813bfef0b4d9f913169eb58efa85307bd610031decdb984398b944347681c36f787e1ce8a385bfcdb1ea6a69be210bba3746a209f9e16a191
-
memory/1392-0-0x0000000000400000-0x0000000000465000-memory.dmpFilesize
404KB
-
memory/1392-13-0x0000000000400000-0x0000000000465000-memory.dmpFilesize
404KB
-
memory/2184-28-0x0000000000400000-0x0000000000465000-memory.dmpFilesize
404KB
-
memory/3376-26-0x0000000000810000-0x00000000008A4000-memory.dmpFilesize
592KB
-
memory/3376-27-0x0000000000810000-0x00000000008A4000-memory.dmpFilesize
592KB
-
memory/3376-25-0x0000000000810000-0x00000000008A4000-memory.dmpFilesize
592KB
-
memory/3376-23-0x0000000000810000-0x00000000008A4000-memory.dmpFilesize
592KB
-
memory/3376-30-0x0000000000810000-0x00000000008A4000-memory.dmpFilesize
592KB
-
memory/3376-31-0x0000000000810000-0x00000000008A4000-memory.dmpFilesize
592KB
-
memory/3376-32-0x0000000000810000-0x00000000008A4000-memory.dmpFilesize
592KB
-
memory/3376-33-0x0000000000810000-0x00000000008A4000-memory.dmpFilesize
592KB
-
memory/3376-34-0x0000000000810000-0x00000000008A4000-memory.dmpFilesize
592KB