Analysis
-
max time kernel
150s -
max time network
83s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
18-06-2024 23:22
Behavioral task
behavioral1
Sample
6497276021f583f26c60188ca0e18930_NeikiAnalytics.exe
Resource
win7-20240611-en
General
-
Target
6497276021f583f26c60188ca0e18930_NeikiAnalytics.exe
-
Size
365KB
-
MD5
6497276021f583f26c60188ca0e18930
-
SHA1
e8b38782979babaeb5dad7c8894e0b35fae25941
-
SHA256
efbfdb4e4673402686c4cefa55e1f34eee026615b70b06b9bad40f07cbcd0fad
-
SHA512
af61d6a94ad332acf139a1a5da5917c5fc0c92308c3c8b2215c65743e705a1105e56e3548e23740224f4b0cc66f5e4065b09674e2b06fe1b786335475ca8002d
-
SSDEEP
6144:OuJkl8DV12C28tLN2/FkCOfHVm0fMaHftvCGCBhDOHjTPmXHk62p+:OzGL2C2aZ2/F1WHHUaveOHjTC
Malware Config
Extracted
urelas
1.234.83.146
133.242.129.155
218.54.31.165
218.54.31.226
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
6497276021f583f26c60188ca0e18930_NeikiAnalytics.exebudix.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation 6497276021f583f26c60188ca0e18930_NeikiAnalytics.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation budix.exe -
Executes dropped EXE 2 IoCs
Processes:
budix.exedeunt.exepid process 1300 budix.exe 4296 deunt.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
deunt.exepid process 4296 deunt.exe 4296 deunt.exe 4296 deunt.exe 4296 deunt.exe 4296 deunt.exe 4296 deunt.exe 4296 deunt.exe 4296 deunt.exe 4296 deunt.exe 4296 deunt.exe 4296 deunt.exe 4296 deunt.exe 4296 deunt.exe 4296 deunt.exe 4296 deunt.exe 4296 deunt.exe 4296 deunt.exe 4296 deunt.exe 4296 deunt.exe 4296 deunt.exe 4296 deunt.exe 4296 deunt.exe 4296 deunt.exe 4296 deunt.exe 4296 deunt.exe 4296 deunt.exe 4296 deunt.exe 4296 deunt.exe 4296 deunt.exe 4296 deunt.exe 4296 deunt.exe 4296 deunt.exe 4296 deunt.exe 4296 deunt.exe 4296 deunt.exe 4296 deunt.exe 4296 deunt.exe 4296 deunt.exe 4296 deunt.exe 4296 deunt.exe 4296 deunt.exe 4296 deunt.exe 4296 deunt.exe 4296 deunt.exe 4296 deunt.exe 4296 deunt.exe 4296 deunt.exe 4296 deunt.exe 4296 deunt.exe 4296 deunt.exe 4296 deunt.exe 4296 deunt.exe 4296 deunt.exe 4296 deunt.exe 4296 deunt.exe 4296 deunt.exe 4296 deunt.exe 4296 deunt.exe 4296 deunt.exe 4296 deunt.exe 4296 deunt.exe 4296 deunt.exe 4296 deunt.exe 4296 deunt.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
6497276021f583f26c60188ca0e18930_NeikiAnalytics.exebudix.exedescription pid process target process PID 1736 wrote to memory of 1300 1736 6497276021f583f26c60188ca0e18930_NeikiAnalytics.exe budix.exe PID 1736 wrote to memory of 1300 1736 6497276021f583f26c60188ca0e18930_NeikiAnalytics.exe budix.exe PID 1736 wrote to memory of 1300 1736 6497276021f583f26c60188ca0e18930_NeikiAnalytics.exe budix.exe PID 1736 wrote to memory of 2900 1736 6497276021f583f26c60188ca0e18930_NeikiAnalytics.exe cmd.exe PID 1736 wrote to memory of 2900 1736 6497276021f583f26c60188ca0e18930_NeikiAnalytics.exe cmd.exe PID 1736 wrote to memory of 2900 1736 6497276021f583f26c60188ca0e18930_NeikiAnalytics.exe cmd.exe PID 1300 wrote to memory of 4296 1300 budix.exe deunt.exe PID 1300 wrote to memory of 4296 1300 budix.exe deunt.exe PID 1300 wrote to memory of 4296 1300 budix.exe deunt.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\6497276021f583f26c60188ca0e18930_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\6497276021f583f26c60188ca0e18930_NeikiAnalytics.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1736 -
C:\Users\Admin\AppData\Local\Temp\budix.exe"C:\Users\Admin\AppData\Local\Temp\budix.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1300 -
C:\Users\Admin\AppData\Local\Temp\deunt.exe"C:\Users\Admin\AppData\Local\Temp\deunt.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:4296
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\_uinsey.bat" "2⤵PID:2900
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
306B
MD566de5e3c497ffc05f778d6f9cdb5046d
SHA17dc1b2ba3d7f04d3366b93d3a9ca3220a1120a67
SHA256eb48fae57a89542c7c4db9a51c9c850181f44cac621ec4a8fa64808f50db03a9
SHA5127ae2e80879a9b3e452b4d256dba366ddc15a2e2a9a0bca2ba3cede55454af084eac8399d879e9604c398d3310871b09e7a954f01a53a6a35e0b8deb49838e575
-
Filesize
365KB
MD56ccaee050452a4373974244d3157c8a3
SHA1a048e5f7afa1196a9dca7dca84d18b8251d8918e
SHA25602090343539e67b8ae3849a777dcc74d20348003499273efdffb72ab2eac5270
SHA51280fa5f6b2409f0ef5e3013de58ba4a746394c3ce1a945c70b16186bedad0d2cfc6231bcaba807aff763cd323c57d9e4f4a1dce5f9fe5d4bbf6507892568f3ac7
-
Filesize
303KB
MD58cf116c393aa78bb58305e70178d863b
SHA1312dfa74a8529d3f197f0756fc55272aab851138
SHA256a3a87b304fc3195221063855fba34d455874cfb0740b29c5783412c5aded549d
SHA512f7ba94203699296e30ed9bbb2e4f807b1c7ff9dc9f0e43d37188626798f15e006b130e7fdcf1a06ba894ad368d29c1e02f28860e00f1470c03cde7d7735cdb5d
-
Filesize
512B
MD554800be827fef6bfd11712d6502785db
SHA1ea540016c3cfb4ab334c41fca4054ba7443981f7
SHA256f09724576edc12d1a4d1bc1d1921aa332d56fc83ee61ecfe7c691ad44ccf3f7b
SHA51263dd88fd16924619f7b2f0c5f688042f737e10b1a00cf525c65d3451603342753b95aed67c47f89bc64a37ab10206ba971abf962779b338ddf2283afb75aabe4