Analysis
-
max time kernel
93s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
27/06/2024, 21:47
Static task
static1
Behavioral task
behavioral1
Sample
249fd2b1e898fd6ddb250d94bbe922ab4e0442a17caf5dd58bd0024ae017140b_NeikiAnalytics.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
249fd2b1e898fd6ddb250d94bbe922ab4e0442a17caf5dd58bd0024ae017140b_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
249fd2b1e898fd6ddb250d94bbe922ab4e0442a17caf5dd58bd0024ae017140b_NeikiAnalytics.exe
-
Size
49KB
-
MD5
f387a020854ff3ab3bc10520c54273d0
-
SHA1
e74904f8158c0af9f9f421d969313d4a7b6d2666
-
SHA256
249fd2b1e898fd6ddb250d94bbe922ab4e0442a17caf5dd58bd0024ae017140b
-
SHA512
f57009b449855f5a7c0d0e9228d3c2fd4297a816de3ef1a513857d3429529e92cb1bfc649768c463bdf57a536f1e12d9cbf7a6d75e2d1798468b35ea36cfeff0
-
SSDEEP
768:osJX+vzlGKec5+RZDKzepeNPmG6JX6UOFwk1023dY/ToBHuARr:osJElGKecg/DcepeNPmG6JX1yXtBBOSr
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation 249fd2b1e898fd6ddb250d94bbe922ab4e0442a17caf5dd58bd0024ae017140b_NeikiAnalytics.exe -
Executes dropped EXE 1 IoCs
pid Process 2528 updater.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4052 wrote to memory of 2528 4052 249fd2b1e898fd6ddb250d94bbe922ab4e0442a17caf5dd58bd0024ae017140b_NeikiAnalytics.exe 81 PID 4052 wrote to memory of 2528 4052 249fd2b1e898fd6ddb250d94bbe922ab4e0442a17caf5dd58bd0024ae017140b_NeikiAnalytics.exe 81 PID 4052 wrote to memory of 2528 4052 249fd2b1e898fd6ddb250d94bbe922ab4e0442a17caf5dd58bd0024ae017140b_NeikiAnalytics.exe 81
Processes
-
C:\Users\Admin\AppData\Local\Temp\249fd2b1e898fd6ddb250d94bbe922ab4e0442a17caf5dd58bd0024ae017140b_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\249fd2b1e898fd6ddb250d94bbe922ab4e0442a17caf5dd58bd0024ae017140b_NeikiAnalytics.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4052 -
C:\Users\Admin\AppData\Local\Temp\updater.exe"C:\Users\Admin\AppData\Local\Temp\updater.exe"2⤵
- Executes dropped EXE
PID:2528
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
49KB
MD56b0ac68822a78dca9a3e4a9cee17663f
SHA1eb5a1a88c716c7f9b886b7232075a0031fc971d7
SHA2566bc953b59990035386325a1bf80e558ba3c7ca6e0fe6d4740e894ea141bac679
SHA512faf3c116f713214d3bf6d9e6780564770074cca66d2b82fa51c4956cac89737a67009136469daae15d5d649e2b473d43069a70bf467701feb6450be624f8b84d