Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
25/06/2024, 15:08
Behavioral task
behavioral1
Sample
6f4504eb017ae781659a2e6cd0607f69c09b12f132152cf142e2969be76acc74_NeikiAnalytics.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
6f4504eb017ae781659a2e6cd0607f69c09b12f132152cf142e2969be76acc74_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
6f4504eb017ae781659a2e6cd0607f69c09b12f132152cf142e2969be76acc74_NeikiAnalytics.exe
-
Size
134KB
-
MD5
1a69bf3b3a4c1968e9147e4d0857d880
-
SHA1
e0e834a4338f42dfd1f9977c823395fb5e8f61be
-
SHA256
6f4504eb017ae781659a2e6cd0607f69c09b12f132152cf142e2969be76acc74
-
SHA512
2d80725f82836f1e39026ddb234c7d7fdafc5f82eb2e4d1cd24926a1d3e83a8b6998417739e358fcf0d65f461bd358eb176d79e1c7525760c103fabf478ed450
-
SSDEEP
1536:YGYU/W2/HG6QMauSV3ixJHABLrmhH7i9eNOOg00GqMIK7aGZh3SOK:YfU/WF6QMauSuiWNi9eNOl0007NZIOK
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation 6f4504eb017ae781659a2e6cd0607f69c09b12f132152cf142e2969be76acc74_NeikiAnalytics.exe -
Executes dropped EXE 1 IoCs
pid Process 4464 wuauclt.exe -
resource yara_rule behavioral2/memory/232-0-0x0000000000EC0000-0x0000000000EE8000-memory.dmp upx behavioral2/memory/4464-4-0x0000000000340000-0x0000000000368000-memory.dmp upx behavioral2/files/0x000900000002341d-3.dat upx behavioral2/memory/232-6-0x0000000000EC0000-0x0000000000EE8000-memory.dmp upx behavioral2/memory/4464-7-0x0000000000340000-0x0000000000368000-memory.dmp upx behavioral2/memory/232-8-0x0000000000EC0000-0x0000000000EE8000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Window Update = "\"C:\\ProgramData\\Update\\wuauclt.exe\" /run" 6f4504eb017ae781659a2e6cd0607f69c09b12f132152cf142e2969be76acc74_NeikiAnalytics.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 232 wrote to memory of 4464 232 6f4504eb017ae781659a2e6cd0607f69c09b12f132152cf142e2969be76acc74_NeikiAnalytics.exe 81 PID 232 wrote to memory of 4464 232 6f4504eb017ae781659a2e6cd0607f69c09b12f132152cf142e2969be76acc74_NeikiAnalytics.exe 81 PID 232 wrote to memory of 4464 232 6f4504eb017ae781659a2e6cd0607f69c09b12f132152cf142e2969be76acc74_NeikiAnalytics.exe 81 PID 232 wrote to memory of 1428 232 6f4504eb017ae781659a2e6cd0607f69c09b12f132152cf142e2969be76acc74_NeikiAnalytics.exe 90 PID 232 wrote to memory of 1428 232 6f4504eb017ae781659a2e6cd0607f69c09b12f132152cf142e2969be76acc74_NeikiAnalytics.exe 90 PID 232 wrote to memory of 1428 232 6f4504eb017ae781659a2e6cd0607f69c09b12f132152cf142e2969be76acc74_NeikiAnalytics.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\6f4504eb017ae781659a2e6cd0607f69c09b12f132152cf142e2969be76acc74_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\6f4504eb017ae781659a2e6cd0607f69c09b12f132152cf142e2969be76acc74_NeikiAnalytics.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:232 -
C:\ProgramData\Update\wuauclt.exe"C:\ProgramData\Update\wuauclt.exe" /run2⤵
- Executes dropped EXE
PID:4464
-
-
C:\windows\SysWOW64\cmd.exe"C:\windows\system32\cmd.exe" /c del /q "C:\Users\Admin\AppData\Local\Temp\6f4504eb017ae781659a2e6cd0607f69c09b12f132152cf142e2969be76acc74_NeikiAnalytics.exe" >> NUL2⤵PID:1428
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
134KB
MD51f3100e14340fc430a90be5e61284ea2
SHA186030368690885f17d9ccf990af6e14c84a95a22
SHA2560627a47ea0aacef743821a16b5a9edcbc4551b0dec4ea6ac80118be689961eef
SHA51294041fe542e0ed3a483cf441bc098fefaa0729bbe040be565762b0494d84989ef674800931b72fd586b90b3336b922847fbe5f3115076c9b3581546ee7275485