Analysis

  • max time kernel
    93s
  • max time network
    95s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27/06/2024, 21:47

General

  • Target

    249fd2b1e898fd6ddb250d94bbe922ab4e0442a17caf5dd58bd0024ae017140b_NeikiAnalytics.exe

  • Size

    49KB

  • MD5

    f387a020854ff3ab3bc10520c54273d0

  • SHA1

    e74904f8158c0af9f9f421d969313d4a7b6d2666

  • SHA256

    249fd2b1e898fd6ddb250d94bbe922ab4e0442a17caf5dd58bd0024ae017140b

  • SHA512

    f57009b449855f5a7c0d0e9228d3c2fd4297a816de3ef1a513857d3429529e92cb1bfc649768c463bdf57a536f1e12d9cbf7a6d75e2d1798468b35ea36cfeff0

  • SSDEEP

    768:osJX+vzlGKec5+RZDKzepeNPmG6JX6UOFwk1023dY/ToBHuARr:osJElGKecg/DcepeNPmG6JX1yXtBBOSr

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\249fd2b1e898fd6ddb250d94bbe922ab4e0442a17caf5dd58bd0024ae017140b_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\249fd2b1e898fd6ddb250d94bbe922ab4e0442a17caf5dd58bd0024ae017140b_NeikiAnalytics.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:4052
    • C:\Users\Admin\AppData\Local\Temp\updater.exe
      "C:\Users\Admin\AppData\Local\Temp\updater.exe"
      2⤵
      • Executes dropped EXE
      PID:2528

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\updater.exe

          Filesize

          49KB

          MD5

          6b0ac68822a78dca9a3e4a9cee17663f

          SHA1

          eb5a1a88c716c7f9b886b7232075a0031fc971d7

          SHA256

          6bc953b59990035386325a1bf80e558ba3c7ca6e0fe6d4740e894ea141bac679

          SHA512

          faf3c116f713214d3bf6d9e6780564770074cca66d2b82fa51c4956cac89737a67009136469daae15d5d649e2b473d43069a70bf467701feb6450be624f8b84d

        • memory/4052-0-0x0000000004000000-0x0000000004005000-memory.dmp

          Filesize

          20KB

        • memory/4052-3-0x0000000004000000-0x0000000004005000-memory.dmp

          Filesize

          20KB

        • memory/4052-1-0x0000000004000000-0x0000000004005000-memory.dmp

          Filesize

          20KB