Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25/06/2024, 15:08

General

  • Target

    6f4504eb017ae781659a2e6cd0607f69c09b12f132152cf142e2969be76acc74_NeikiAnalytics.exe

  • Size

    134KB

  • MD5

    1a69bf3b3a4c1968e9147e4d0857d880

  • SHA1

    e0e834a4338f42dfd1f9977c823395fb5e8f61be

  • SHA256

    6f4504eb017ae781659a2e6cd0607f69c09b12f132152cf142e2969be76acc74

  • SHA512

    2d80725f82836f1e39026ddb234c7d7fdafc5f82eb2e4d1cd24926a1d3e83a8b6998417739e358fcf0d65f461bd358eb176d79e1c7525760c103fabf478ed450

  • SSDEEP

    1536:YGYU/W2/HG6QMauSV3ixJHABLrmhH7i9eNOOg00GqMIK7aGZh3SOK:YfU/WF6QMauSuiWNi9eNOl0007NZIOK

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • UPX packed file 6 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6f4504eb017ae781659a2e6cd0607f69c09b12f132152cf142e2969be76acc74_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\6f4504eb017ae781659a2e6cd0607f69c09b12f132152cf142e2969be76acc74_NeikiAnalytics.exe"
    1⤵
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:232
    • C:\ProgramData\Update\wuauclt.exe
      "C:\ProgramData\Update\wuauclt.exe" /run
      2⤵
      • Executes dropped EXE
      PID:4464
    • C:\windows\SysWOW64\cmd.exe
      "C:\windows\system32\cmd.exe" /c del /q "C:\Users\Admin\AppData\Local\Temp\6f4504eb017ae781659a2e6cd0607f69c09b12f132152cf142e2969be76acc74_NeikiAnalytics.exe" >> NUL
      2⤵
        PID:1428

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\ProgramData\Update\wuauclt.exe

      Filesize

      134KB

      MD5

      1f3100e14340fc430a90be5e61284ea2

      SHA1

      86030368690885f17d9ccf990af6e14c84a95a22

      SHA256

      0627a47ea0aacef743821a16b5a9edcbc4551b0dec4ea6ac80118be689961eef

      SHA512

      94041fe542e0ed3a483cf441bc098fefaa0729bbe040be565762b0494d84989ef674800931b72fd586b90b3336b922847fbe5f3115076c9b3581546ee7275485

    • memory/232-0-0x0000000000EC0000-0x0000000000EE8000-memory.dmp

      Filesize

      160KB

    • memory/232-6-0x0000000000EC0000-0x0000000000EE8000-memory.dmp

      Filesize

      160KB

    • memory/232-8-0x0000000000EC0000-0x0000000000EE8000-memory.dmp

      Filesize

      160KB

    • memory/4464-4-0x0000000000340000-0x0000000000368000-memory.dmp

      Filesize

      160KB

    • memory/4464-7-0x0000000000340000-0x0000000000368000-memory.dmp

      Filesize

      160KB