Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240611-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24/06/2024, 06:27

General

  • Target

    4945e070694e0ba643197930ec6c62d372c6fd0a8c19aa9d0ff30fe0a7e5d0e0_NeikiAnalytics.exe

  • Size

    41KB

  • MD5

    7a5780ffe34014be8bf1e63c79bd2eb0

  • SHA1

    5e5040bfd1efb8841eb312202a7de01146833118

  • SHA256

    4945e070694e0ba643197930ec6c62d372c6fd0a8c19aa9d0ff30fe0a7e5d0e0

  • SHA512

    6a633eca1c96d2542d9139741dde899369ad56c6aa1b0645eab71121ab3ebff99ef2f5448632816a13da24ce0cd47007290b6a803a5a3e8e863c6355fe50df69

  • SSDEEP

    384:DLR7iSYIwM+6GyXzQNSOwOmOzO6iQspWGqYx1jYCKt7VpEi6xX+K2OexXjbuR6x0:DLR7ix70zQozpW7YYCqgiQ0OEmAmMn9O

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4945e070694e0ba643197930ec6c62d372c6fd0a8c19aa9d0ff30fe0a7e5d0e0_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\4945e070694e0ba643197930ec6c62d372c6fd0a8c19aa9d0ff30fe0a7e5d0e0_NeikiAnalytics.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:2484
    • C:\Users\Admin\AppData\Local\Temp\lasis.exe
      "C:\Users\Admin\AppData\Local\Temp\lasis.exe"
      2⤵
      • Executes dropped EXE
      PID:2820

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\lasis.exe

          Filesize

          41KB

          MD5

          072fd937a545e49e0062fa72a6a5c077

          SHA1

          6d3ebe0a0f4ef2059ea6d715ede422f3498eab72

          SHA256

          b728be6fb9715aedd9e7abf84968b7201d8faa76a3958fba1d1e23e124103143

          SHA512

          3746fad905a1981b57faaacc45959923273b223e6ec412a66910a8a055975b78bf6203b9acb1f1a095d0d5815636dfc249560ab97574c5369125dc123cdb1002

        • memory/2484-1-0x0000000000402000-0x0000000000403000-memory.dmp

          Filesize

          4KB

        • memory/2820-9-0x0000000000400000-0x0000000000408000-memory.dmp

          Filesize

          32KB