Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240611-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27/06/2024, 21:19

General

  • Target

    1ef5d62c1b1b5b77a23a66760b82d43bec94eeb7a5fedbab123ebae3c80a82e7_NeikiAnalytics.exe

  • Size

    264KB

  • MD5

    d76e1a714d553180d4bef9c655f78a10

  • SHA1

    2651683706de2a7041168ae6c8f3a510d65d8e2f

  • SHA256

    1ef5d62c1b1b5b77a23a66760b82d43bec94eeb7a5fedbab123ebae3c80a82e7

  • SHA512

    d66c2ca9940718f92454b06d67de0f5e8202ffea58dd1b37ae9d563bf51005d4c8c0b3c4050d1116391b9445efacf1d9d17ea6e718993abd1c015ded539bc8d0

  • SSDEEP

    3072:O0tBKJd9r/9ydS69WV09ThL7SfhEDfF8zhAT7Sgfi:O0BKpBlu7SgK

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 52 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1ef5d62c1b1b5b77a23a66760b82d43bec94eeb7a5fedbab123ebae3c80a82e7_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\1ef5d62c1b1b5b77a23a66760b82d43bec94eeb7a5fedbab123ebae3c80a82e7_NeikiAnalytics.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4212
    • C:\Users\Admin\baoge.exe
      "C:\Users\Admin\baoge.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:4484

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\baoge.exe

    Filesize

    264KB

    MD5

    c8148bc74a516e1208d5f2720a6c7407

    SHA1

    ba82f3f61b751061ba074b22bda0f26b78e23726

    SHA256

    2865193087899ffcdf82fb38bf172751d8a1cb59205d1800c41e989b1fdfa8ad

    SHA512

    2cf6c6539ac4d4ce4939f47a51db727239d4a9fc94c16a5012c3e7f65e151dcc0d03fb334dc3c182f33a3be420a76122894ac94e327ac20f00e0425b734483c2

  • memory/4212-0-0x0000000000400000-0x0000000000444000-memory.dmp

    Filesize

    272KB

  • memory/4212-37-0x0000000000400000-0x0000000000444000-memory.dmp

    Filesize

    272KB

  • memory/4484-36-0x0000000000400000-0x0000000000444000-memory.dmp

    Filesize

    272KB

  • memory/4484-38-0x0000000000400000-0x0000000000444000-memory.dmp

    Filesize

    272KB