Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
19-06-2024 09:00
Static task
static1
Behavioral task
behavioral1
Sample
aeab4161e9560703eacffcf0b2eb4ff0_NeikiAnalytics.exe
Resource
win7-20231129-en
General
-
Target
aeab4161e9560703eacffcf0b2eb4ff0_NeikiAnalytics.exe
-
Size
329KB
-
MD5
aeab4161e9560703eacffcf0b2eb4ff0
-
SHA1
ee1b406cbd6669467c3a999bae34e7a262ec6b27
-
SHA256
99b0e6c557256717472ab8b99a91e7f819c1f4cc77f165566985c694a86dd1d2
-
SHA512
2dd53a07f71dc97c9bb4dd8c701be0648ed66e067d35ddbd0f073504b8171bd4277e8ab4a761654840d6d002e8fad8614c89c12a46a8b40118ba864cce84a897
-
SSDEEP
6144:sY4zSop9m06QbGTCnTRoOIH3FPA7AthtLpSRFe:PkXpd6jqiOIHZAj3e
Malware Config
Extracted
urelas
218.54.31.165
218.54.31.226
Signatures
-
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
zequd.exebofoax.exeaeab4161e9560703eacffcf0b2eb4ff0_NeikiAnalytics.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation zequd.exe Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation bofoax.exe Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation aeab4161e9560703eacffcf0b2eb4ff0_NeikiAnalytics.exe -
Executes dropped EXE 3 IoCs
Processes:
zequd.exebofoax.exeordit.exepid process 4540 zequd.exe 636 bofoax.exe 3640 ordit.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
ordit.exepid process 3640 ordit.exe 3640 ordit.exe 3640 ordit.exe 3640 ordit.exe 3640 ordit.exe 3640 ordit.exe 3640 ordit.exe 3640 ordit.exe 3640 ordit.exe 3640 ordit.exe 3640 ordit.exe 3640 ordit.exe 3640 ordit.exe 3640 ordit.exe 3640 ordit.exe 3640 ordit.exe 3640 ordit.exe 3640 ordit.exe 3640 ordit.exe 3640 ordit.exe 3640 ordit.exe 3640 ordit.exe 3640 ordit.exe 3640 ordit.exe 3640 ordit.exe 3640 ordit.exe 3640 ordit.exe 3640 ordit.exe 3640 ordit.exe 3640 ordit.exe 3640 ordit.exe 3640 ordit.exe 3640 ordit.exe 3640 ordit.exe 3640 ordit.exe 3640 ordit.exe 3640 ordit.exe 3640 ordit.exe 3640 ordit.exe 3640 ordit.exe 3640 ordit.exe 3640 ordit.exe 3640 ordit.exe 3640 ordit.exe 3640 ordit.exe 3640 ordit.exe 3640 ordit.exe 3640 ordit.exe 3640 ordit.exe 3640 ordit.exe 3640 ordit.exe 3640 ordit.exe 3640 ordit.exe 3640 ordit.exe 3640 ordit.exe 3640 ordit.exe 3640 ordit.exe 3640 ordit.exe 3640 ordit.exe 3640 ordit.exe 3640 ordit.exe 3640 ordit.exe 3640 ordit.exe 3640 ordit.exe -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
aeab4161e9560703eacffcf0b2eb4ff0_NeikiAnalytics.exezequd.exebofoax.exedescription pid process target process PID 3140 wrote to memory of 4540 3140 aeab4161e9560703eacffcf0b2eb4ff0_NeikiAnalytics.exe zequd.exe PID 3140 wrote to memory of 4540 3140 aeab4161e9560703eacffcf0b2eb4ff0_NeikiAnalytics.exe zequd.exe PID 3140 wrote to memory of 4540 3140 aeab4161e9560703eacffcf0b2eb4ff0_NeikiAnalytics.exe zequd.exe PID 3140 wrote to memory of 3792 3140 aeab4161e9560703eacffcf0b2eb4ff0_NeikiAnalytics.exe cmd.exe PID 3140 wrote to memory of 3792 3140 aeab4161e9560703eacffcf0b2eb4ff0_NeikiAnalytics.exe cmd.exe PID 3140 wrote to memory of 3792 3140 aeab4161e9560703eacffcf0b2eb4ff0_NeikiAnalytics.exe cmd.exe PID 4540 wrote to memory of 636 4540 zequd.exe bofoax.exe PID 4540 wrote to memory of 636 4540 zequd.exe bofoax.exe PID 4540 wrote to memory of 636 4540 zequd.exe bofoax.exe PID 636 wrote to memory of 3640 636 bofoax.exe ordit.exe PID 636 wrote to memory of 3640 636 bofoax.exe ordit.exe PID 636 wrote to memory of 3640 636 bofoax.exe ordit.exe PID 636 wrote to memory of 4736 636 bofoax.exe cmd.exe PID 636 wrote to memory of 4736 636 bofoax.exe cmd.exe PID 636 wrote to memory of 4736 636 bofoax.exe cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\aeab4161e9560703eacffcf0b2eb4ff0_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\aeab4161e9560703eacffcf0b2eb4ff0_NeikiAnalytics.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3140 -
C:\Users\Admin\AppData\Local\Temp\zequd.exe"C:\Users\Admin\AppData\Local\Temp\zequd.exe" hi2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4540 -
C:\Users\Admin\AppData\Local\Temp\bofoax.exe"C:\Users\Admin\AppData\Local\Temp\bofoax.exe" OK3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:636 -
C:\Users\Admin\AppData\Local\Temp\ordit.exe"C:\Users\Admin\AppData\Local\Temp\ordit.exe"4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:3640
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\_vslite.bat" "4⤵PID:4736
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\_vslite.bat" "2⤵PID:3792
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
306B
MD5bc327c5350c2a174333677e1682c8e53
SHA15cc21084f5c3fca50f06fbfd270bce475dce7345
SHA256c82a23978e527e17336b3f6763b499608a74de4e5ed79464f0a3a57e80585f53
SHA5124ad5d1bed2fc87aee6b0c979ab18dfb5c6db54d8d4caf47725c96d658dc41d7fed868aae15aa71fb1243fa74b8d3f872db39207ab96040b2b698eb56e91ab74d
-
Filesize
224B
MD533d7629c506fa0511c5a52f1e52e1170
SHA1fc40fca46dfbc2fc213f5dbe4099dff6020c9a60
SHA256874ad2d37073829774691e3263f91f3458eb836cd488b66abc0962e353c608bc
SHA512fb509df5983d08f41b2732bcad0484890be6d6ffddb873b1c7dc3d50d2af1952491f84b0e3e40330a22a69d3b2355df6329195b603e74ecebfa2bc5d48012142
-
Filesize
329KB
MD59a84d5886ea4a8115ea65e18e4c79192
SHA15b6f4bab6146a4f8a1bf7d9e062cede3acfe48ca
SHA256f4a1f17847e4b53ae3e24167f9fa80e7e6875e04366933576b9293dcad4e59b9
SHA512f1c215ed74f8c3a1629395ec3ce4d8517b786607547cd72e43479e44cb378cfd8a18001ec3d7854c7256c23b1c26115867d708c79f4b14a7bf547131b9ac8e09
-
Filesize
512B
MD51055f0495d91ea7ac5032ef0c007f417
SHA11d3d811d1e8cb66135389a706f257a662a564dbc
SHA2565d4655b5f2b8e8e4737094b689e0d280e32039d498823e1d9c06d686f11bc4aa
SHA512c97a58973d3b83319ea8f04d661fa34793b075b057e0ce68bdbffa3458f2a449ef732318d72e602333b2b4ce65032123e649dc2a34f90ebb3c3a862f4ef52536
-
Filesize
223KB
MD55f4c731e45a7842e953277d5993d4eba
SHA1fe6c637fec169be9717444b1ce820bfbee7dd82e
SHA2562122985865a7b8fd79c45c1a18c14d90ca2db0c8b9aeb37d126189bbdd604f80
SHA512e2ff89a3d4f542892dae252edef15b2f9f9c4f37ee35858198a4101b22788e919112e9fb9ad25a4e53ad1ff97ed39f52472f30e0c421b0ccaeb58abca0ea8510
-
Filesize
329KB
MD52a97c522b4df3a04a73235e67327b926
SHA18d92573304665302e028449ce911d2a6b6b9ffea
SHA2563f354b724fde0e540b2b18119662432a203861d3632f5ffe719b3db46f94a69e
SHA512a818ef3b0407cbccff4588e11e23c3d7d21d06836f78234bb4d52cc1c28bd670b6fc2e056c4b9b16bd3a74c7fb6a70dfbf11ac175739c863acab7c26ea67ae16