Analysis Overview
SHA256
1990cf8c487f837d2a9ba7d0288e38040ef9f0d58fbc890b22cd7c59d343972c
Threat Level: Shows suspicious behavior
The file 1990cf8c487f837d2a9ba7d0288e38040ef9f0d58fbc890b22cd7c59d343972c_NeikiAnalytics.exe was found to be: Shows suspicious behavior.
Malicious Activity Summary
Checks computer location settings
ASPack v2.12-2.42
Executes dropped EXE
Loads dropped DLL
Unsigned PE
Enumerates physical storage devices
Suspicious use of WriteProcessMemory
MITRE ATT&CK
Enterprise Matrix V15
Analysis: static1
Detonation Overview
Reported
2024-06-23 22:54
Signatures
ASPack v2.12-2.42
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Unsigned PE
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Analysis: behavioral1
Detonation Overview
Submitted
2024-06-23 22:54
Reported
2024-06-23 22:57
Platform
win7-20240508-en
Max time kernel
149s
Max time network
117s
Command Line
Signatures
ASPack v2.12-2.42
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Executes dropped EXE
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\kdwco.exe | N/A |
Loads dropped DLL
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\1990cf8c487f837d2a9ba7d0288e38040ef9f0d58fbc890b22cd7c59d343972c_NeikiAnalytics.exe | N/A |
Enumerates physical storage devices
Suspicious use of WriteProcessMemory
| Description | Indicator | Process | Target |
| PID 2988 wrote to memory of 1748 | N/A | C:\Users\Admin\AppData\Local\Temp\1990cf8c487f837d2a9ba7d0288e38040ef9f0d58fbc890b22cd7c59d343972c_NeikiAnalytics.exe | C:\Users\Admin\AppData\Local\Temp\kdwco.exe |
| PID 2988 wrote to memory of 1748 | N/A | C:\Users\Admin\AppData\Local\Temp\1990cf8c487f837d2a9ba7d0288e38040ef9f0d58fbc890b22cd7c59d343972c_NeikiAnalytics.exe | C:\Users\Admin\AppData\Local\Temp\kdwco.exe |
| PID 2988 wrote to memory of 1748 | N/A | C:\Users\Admin\AppData\Local\Temp\1990cf8c487f837d2a9ba7d0288e38040ef9f0d58fbc890b22cd7c59d343972c_NeikiAnalytics.exe | C:\Users\Admin\AppData\Local\Temp\kdwco.exe |
| PID 2988 wrote to memory of 1748 | N/A | C:\Users\Admin\AppData\Local\Temp\1990cf8c487f837d2a9ba7d0288e38040ef9f0d58fbc890b22cd7c59d343972c_NeikiAnalytics.exe | C:\Users\Admin\AppData\Local\Temp\kdwco.exe |
Processes
C:\Users\Admin\AppData\Local\Temp\1990cf8c487f837d2a9ba7d0288e38040ef9f0d58fbc890b22cd7c59d343972c_NeikiAnalytics.exe
"C:\Users\Admin\AppData\Local\Temp\1990cf8c487f837d2a9ba7d0288e38040ef9f0d58fbc890b22cd7c59d343972c_NeikiAnalytics.exe"
C:\Users\Admin\AppData\Local\Temp\kdwco.exe
"C:\Users\Admin\AppData\Local\Temp\kdwco.exe"
Network
Files
memory/2988-0-0x0000000000400000-0x0000000000412000-memory.dmp
memory/2988-2-0x0000000000401000-0x0000000000403000-memory.dmp
\Users\Admin\AppData\Local\Temp\kdwco.exe
| MD5 | 4b4b6a26a55c8f35bee5e85908b81370 |
| SHA1 | 2f51a1af8795ef88b51e9678e875c8a01ae42c3b |
| SHA256 | cfd173cb5302148a2dba19dca591574aed17f5aa8c77a1e46eed69cae02e3a77 |
| SHA512 | 38f0d40dd7538085a507089a91619749e08eab90a189f54bfa624b4910d11d905ac42d9c61700426e2183b0881aa6cfc5139c0dc5d35643e0a2ce4cb5315dab5 |
memory/2988-5-0x0000000001E50000-0x0000000001E62000-memory.dmp
memory/1748-11-0x0000000000400000-0x0000000000412000-memory.dmp
memory/2988-10-0x0000000000400000-0x0000000000412000-memory.dmp
memory/2988-9-0x0000000000400000-0x0000000000412000-memory.dmp
memory/1748-15-0x0000000000400000-0x0000000000412000-memory.dmp
Analysis: behavioral2
Detonation Overview
Submitted
2024-06-23 22:54
Reported
2024-06-23 22:57
Platform
win10v2004-20240508-en
Max time kernel
149s
Max time network
53s
Command Line
Signatures
ASPack v2.12-2.42
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Checks computer location settings
| Description | Indicator | Process | Target |
| Key value queried | \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation | C:\Users\Admin\AppData\Local\Temp\1990cf8c487f837d2a9ba7d0288e38040ef9f0d58fbc890b22cd7c59d343972c_NeikiAnalytics.exe | N/A |
Executes dropped EXE
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\kdwco.exe | N/A |
Enumerates physical storage devices
Suspicious use of WriteProcessMemory
| Description | Indicator | Process | Target |
| PID 4472 wrote to memory of 4836 | N/A | C:\Users\Admin\AppData\Local\Temp\1990cf8c487f837d2a9ba7d0288e38040ef9f0d58fbc890b22cd7c59d343972c_NeikiAnalytics.exe | C:\Users\Admin\AppData\Local\Temp\kdwco.exe |
| PID 4472 wrote to memory of 4836 | N/A | C:\Users\Admin\AppData\Local\Temp\1990cf8c487f837d2a9ba7d0288e38040ef9f0d58fbc890b22cd7c59d343972c_NeikiAnalytics.exe | C:\Users\Admin\AppData\Local\Temp\kdwco.exe |
| PID 4472 wrote to memory of 4836 | N/A | C:\Users\Admin\AppData\Local\Temp\1990cf8c487f837d2a9ba7d0288e38040ef9f0d58fbc890b22cd7c59d343972c_NeikiAnalytics.exe | C:\Users\Admin\AppData\Local\Temp\kdwco.exe |
Processes
C:\Users\Admin\AppData\Local\Temp\1990cf8c487f837d2a9ba7d0288e38040ef9f0d58fbc890b22cd7c59d343972c_NeikiAnalytics.exe
"C:\Users\Admin\AppData\Local\Temp\1990cf8c487f837d2a9ba7d0288e38040ef9f0d58fbc890b22cd7c59d343972c_NeikiAnalytics.exe"
C:\Users\Admin\AppData\Local\Temp\kdwco.exe
"C:\Users\Admin\AppData\Local\Temp\kdwco.exe"
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | 8.8.8.8.in-addr.arpa | udp |
Files
memory/4472-0-0x0000000000400000-0x0000000000412000-memory.dmp
memory/4472-1-0x0000000000401000-0x0000000000403000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\kdwco.exe
| MD5 | 4b4b6a26a55c8f35bee5e85908b81370 |
| SHA1 | 2f51a1af8795ef88b51e9678e875c8a01ae42c3b |
| SHA256 | cfd173cb5302148a2dba19dca591574aed17f5aa8c77a1e46eed69cae02e3a77 |
| SHA512 | 38f0d40dd7538085a507089a91619749e08eab90a189f54bfa624b4910d11d905ac42d9c61700426e2183b0881aa6cfc5139c0dc5d35643e0a2ce4cb5315dab5 |
memory/4836-13-0x0000000000400000-0x0000000000412000-memory.dmp
memory/4472-15-0x0000000000400000-0x0000000000412000-memory.dmp
memory/4836-16-0x0000000000400000-0x0000000000412000-memory.dmp
memory/4836-19-0x0000000000400000-0x0000000000412000-memory.dmp