Analysis
-
max time kernel
140s -
max time network
124s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
27/06/2024, 08:58
Behavioral task
behavioral1
Sample
7097c7aa9e6413067f4c8f7158776bf656e58c6dbf23296d2ab6e08ed9fd7a1c_NeikiAnalytics.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
7097c7aa9e6413067f4c8f7158776bf656e58c6dbf23296d2ab6e08ed9fd7a1c_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
7097c7aa9e6413067f4c8f7158776bf656e58c6dbf23296d2ab6e08ed9fd7a1c_NeikiAnalytics.exe
-
Size
33KB
-
MD5
38ecfff0db48029570b541aeab62df80
-
SHA1
d3380e637f1411d2d37c95f8168e4774a1082c05
-
SHA256
7097c7aa9e6413067f4c8f7158776bf656e58c6dbf23296d2ab6e08ed9fd7a1c
-
SHA512
f437fe60f3f6a85c8ad5414a4543ee7e6812187f6fb04ff766e16504bb12e77fc1580acc254d4d7079b4e4a1dbdb92294e26729436c1014c29ad25744d0a9a82
-
SSDEEP
768:AnoSEjp9Plchfr6TUqnbcuyD7UYK41lll/J0ppppCwwwcooodwwwt111qX:AoSEZWTUUqnouy8YX/vooodwwwt111i
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation 7097c7aa9e6413067f4c8f7158776bf656e58c6dbf23296d2ab6e08ed9fd7a1c_NeikiAnalytics.exe -
Executes dropped EXE 1 IoCs
pid Process 4392 zcihost.exe -
resource yara_rule behavioral2/memory/4564-0-0x0000000000400000-0x000000000040E000-memory.dmp upx behavioral2/files/0x00080000000232a4-3.dat upx behavioral2/memory/4564-5-0x0000000000400000-0x000000000040E000-memory.dmp upx behavioral2/memory/4392-6-0x0000000000400000-0x000000000040E000-memory.dmp upx behavioral2/memory/4392-12-0x0000000000400000-0x000000000040E000-memory.dmp upx behavioral2/memory/4392-15-0x0000000000400000-0x000000000040E000-memory.dmp upx behavioral2/memory/4392-18-0x0000000000400000-0x000000000040E000-memory.dmp upx -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\Debug\zcihost.exe 7097c7aa9e6413067f4c8f7158776bf656e58c6dbf23296d2ab6e08ed9fd7a1c_NeikiAnalytics.exe File opened for modification C:\Windows\Debug\zcihost.exe 7097c7aa9e6413067f4c8f7158776bf656e58c6dbf23296d2ab6e08ed9fd7a1c_NeikiAnalytics.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 zcihost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz zcihost.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 4564 7097c7aa9e6413067f4c8f7158776bf656e58c6dbf23296d2ab6e08ed9fd7a1c_NeikiAnalytics.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4564 wrote to memory of 3228 4564 7097c7aa9e6413067f4c8f7158776bf656e58c6dbf23296d2ab6e08ed9fd7a1c_NeikiAnalytics.exe 82 PID 4564 wrote to memory of 3228 4564 7097c7aa9e6413067f4c8f7158776bf656e58c6dbf23296d2ab6e08ed9fd7a1c_NeikiAnalytics.exe 82 PID 4564 wrote to memory of 3228 4564 7097c7aa9e6413067f4c8f7158776bf656e58c6dbf23296d2ab6e08ed9fd7a1c_NeikiAnalytics.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\7097c7aa9e6413067f4c8f7158776bf656e58c6dbf23296d2ab6e08ed9fd7a1c_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\7097c7aa9e6413067f4c8f7158776bf656e58c6dbf23296d2ab6e08ed9fd7a1c_NeikiAnalytics.exe"1⤵
- Checks computer location settings
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4564 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\7097C7~1.EXE > nul2⤵PID:3228
-
-
C:\Windows\Debug\zcihost.exeC:\Windows\Debug\zcihost.exe1⤵
- Executes dropped EXE
- Checks processor information in registry
PID:4392
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
33KB
MD5e786b4a7429c40e8162c3e96f72685b9
SHA1aabd21788efb242216ae95a168e390fcf959797a
SHA256fc2136bf1a4600fb21288f7a15d130e54020b087ce481fd4d2a14cc5509b6495
SHA512b17518e1201573464ac32a6c133b0a6891e2de339e6f3e9f24825efc1be085d14c5213df2430a5eb127f2cf2212d7568a206f352d72800a5a978c262ba3d1b70