Analysis
-
max time kernel
150s -
max time network
84s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
29-06-2024 23:59
Static task
static1
Behavioral task
behavioral1
Sample
0ffc8232298d167f8d69ab8301c1cc484c8a9a29bcd5ca4f0ff5fe19186ab5ce_NeikiAnalytics.exe
Resource
win7-20240508-en
General
-
Target
0ffc8232298d167f8d69ab8301c1cc484c8a9a29bcd5ca4f0ff5fe19186ab5ce_NeikiAnalytics.exe
-
Size
340KB
-
MD5
27e2a351373cef3be74f6812949bb150
-
SHA1
f51906959e491e1718a7ea0464a6f33d948ef183
-
SHA256
0ffc8232298d167f8d69ab8301c1cc484c8a9a29bcd5ca4f0ff5fe19186ab5ce
-
SHA512
ac39d7c64240f70f8deaad03191bdb841f749ddd624677fd562b867faa10adacd28b1469a7bdbbb57683fa421944f9adedb1156e22c22b06c56e66de54ac35ce
-
SSDEEP
6144:b/qE9d70WIH9wFHf+MQYVA5TDT44zuQOIFlUMazNWHT7+Q:uGIWiiHWnesT/483Ociy3
Malware Config
Extracted
urelas
1.234.83.146
133.242.129.155
218.54.31.226
218.54.31.165
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
0ffc8232298d167f8d69ab8301c1cc484c8a9a29bcd5ca4f0ff5fe19186ab5ce_NeikiAnalytics.exeiwkux.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation 0ffc8232298d167f8d69ab8301c1cc484c8a9a29bcd5ca4f0ff5fe19186ab5ce_NeikiAnalytics.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation iwkux.exe -
Executes dropped EXE 2 IoCs
Processes:
iwkux.exeseixl.exepid process 2668 iwkux.exe 3416 seixl.exe -
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\seixl.exe upx behavioral2/memory/3416-38-0x0000000000AC0000-0x0000000000B77000-memory.dmp upx behavioral2/memory/3416-41-0x0000000000AC0000-0x0000000000B77000-memory.dmp upx behavioral2/memory/3416-42-0x0000000000AC0000-0x0000000000B77000-memory.dmp upx behavioral2/memory/3416-43-0x0000000000AC0000-0x0000000000B77000-memory.dmp upx behavioral2/memory/3416-44-0x0000000000AC0000-0x0000000000B77000-memory.dmp upx behavioral2/memory/3416-45-0x0000000000AC0000-0x0000000000B77000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
seixl.exepid process 3416 seixl.exe 3416 seixl.exe 3416 seixl.exe 3416 seixl.exe 3416 seixl.exe 3416 seixl.exe 3416 seixl.exe 3416 seixl.exe 3416 seixl.exe 3416 seixl.exe 3416 seixl.exe 3416 seixl.exe 3416 seixl.exe 3416 seixl.exe 3416 seixl.exe 3416 seixl.exe 3416 seixl.exe 3416 seixl.exe 3416 seixl.exe 3416 seixl.exe 3416 seixl.exe 3416 seixl.exe 3416 seixl.exe 3416 seixl.exe 3416 seixl.exe 3416 seixl.exe 3416 seixl.exe 3416 seixl.exe 3416 seixl.exe 3416 seixl.exe 3416 seixl.exe 3416 seixl.exe 3416 seixl.exe 3416 seixl.exe 3416 seixl.exe 3416 seixl.exe 3416 seixl.exe 3416 seixl.exe 3416 seixl.exe 3416 seixl.exe 3416 seixl.exe 3416 seixl.exe 3416 seixl.exe 3416 seixl.exe 3416 seixl.exe 3416 seixl.exe 3416 seixl.exe 3416 seixl.exe 3416 seixl.exe 3416 seixl.exe 3416 seixl.exe 3416 seixl.exe 3416 seixl.exe 3416 seixl.exe 3416 seixl.exe 3416 seixl.exe 3416 seixl.exe 3416 seixl.exe 3416 seixl.exe 3416 seixl.exe 3416 seixl.exe 3416 seixl.exe 3416 seixl.exe 3416 seixl.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
0ffc8232298d167f8d69ab8301c1cc484c8a9a29bcd5ca4f0ff5fe19186ab5ce_NeikiAnalytics.exeiwkux.exedescription pid process target process PID 2760 wrote to memory of 2668 2760 0ffc8232298d167f8d69ab8301c1cc484c8a9a29bcd5ca4f0ff5fe19186ab5ce_NeikiAnalytics.exe iwkux.exe PID 2760 wrote to memory of 2668 2760 0ffc8232298d167f8d69ab8301c1cc484c8a9a29bcd5ca4f0ff5fe19186ab5ce_NeikiAnalytics.exe iwkux.exe PID 2760 wrote to memory of 2668 2760 0ffc8232298d167f8d69ab8301c1cc484c8a9a29bcd5ca4f0ff5fe19186ab5ce_NeikiAnalytics.exe iwkux.exe PID 2760 wrote to memory of 2628 2760 0ffc8232298d167f8d69ab8301c1cc484c8a9a29bcd5ca4f0ff5fe19186ab5ce_NeikiAnalytics.exe cmd.exe PID 2760 wrote to memory of 2628 2760 0ffc8232298d167f8d69ab8301c1cc484c8a9a29bcd5ca4f0ff5fe19186ab5ce_NeikiAnalytics.exe cmd.exe PID 2760 wrote to memory of 2628 2760 0ffc8232298d167f8d69ab8301c1cc484c8a9a29bcd5ca4f0ff5fe19186ab5ce_NeikiAnalytics.exe cmd.exe PID 2668 wrote to memory of 3416 2668 iwkux.exe seixl.exe PID 2668 wrote to memory of 3416 2668 iwkux.exe seixl.exe PID 2668 wrote to memory of 3416 2668 iwkux.exe seixl.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\0ffc8232298d167f8d69ab8301c1cc484c8a9a29bcd5ca4f0ff5fe19186ab5ce_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\0ffc8232298d167f8d69ab8301c1cc484c8a9a29bcd5ca4f0ff5fe19186ab5ce_NeikiAnalytics.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\iwkux.exe"C:\Users\Admin\AppData\Local\Temp\iwkux.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\seixl.exe"C:\Users\Admin\AppData\Local\Temp\seixl.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\_uinsey.bat" "2⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\_uinsey.batFilesize
370B
MD50d4e24699073c6b879285ed4a6b19f26
SHA101c46c56d3abd48bcdc5dbcf079efd3f48da1ba1
SHA25653d7222adb221c7938e0edd103767d7c7d39a7746fae98ac174cc7b705c3c575
SHA51261727d0fb46611c6615be94252b69ea00772b290d796847e0c741fe93c755d714cce9058a63623efe2cfbc64107eafd4dc647c53575b57a20f6af5bcfa9a156b
-
C:\Users\Admin\AppData\Local\Temp\golfinfo.iniFilesize
512B
MD52d4676535b49a273bf937e82016cece4
SHA17b71f0e8905780430bb3f7a03b74b8e99db48685
SHA256f875c75a891037120f666e2a95a4367ff6ace2949d3f2b4e54fd7dcde90633c8
SHA51269770aa1ddf9435a25eef5b31fb439ac561f7d76d9bda1187d9711daf695e6759149bb3e09bfbb44ac94bf8ed2f695c9cf548be9866aada468321014d682195c
-
C:\Users\Admin\AppData\Local\Temp\iwkux.exeFilesize
340KB
MD5e9fb84c536f8fbfb7ca242df43fb9404
SHA1125818386438072eed19a969ae70f9b3ff510a12
SHA256993bd01a0d89373fcc6997681af4755720c1a68877dba6edd42b24552e7a2057
SHA5122c143cc6080e13678bfa2a9d6d557ea9a6ceffdd58fdcb1a8bca28edd253bea5f7ab4b93c0676db24bd66b03a122e0e64c5d346c060d3644b423014bbc567a4d
-
C:\Users\Admin\AppData\Local\Temp\seixl.exeFilesize
226KB
MD5e53aa4346c5d372ecfa1cff4f4e08bb8
SHA15438c43509c27b4a6dabe5168fd81c2ef5e9dd9e
SHA25655795a071b79f1c23ea3c42c7a700e6d5a7aaf6d6aa7ac4130460fa795fe7d45
SHA5120d2d8f9d621f5bc34f56771e622da338de07d1a4bc01ee986143f882c0f2e71a178ccaf689218d20dc4574ddc0e662f8983b5257f745475a0d74dc34ba24bfac
-
memory/2668-20-0x0000000000C10000-0x0000000000C98000-memory.dmpFilesize
544KB
-
memory/2668-22-0x0000000000DF0000-0x0000000000DF2000-memory.dmpFilesize
8KB
-
memory/2668-14-0x0000000000DF0000-0x0000000000DF2000-memory.dmpFilesize
8KB
-
memory/2668-13-0x0000000000C10000-0x0000000000C98000-memory.dmpFilesize
544KB
-
memory/2668-39-0x0000000000C10000-0x0000000000C98000-memory.dmpFilesize
544KB
-
memory/2760-0-0x00000000001D0000-0x0000000000258000-memory.dmpFilesize
544KB
-
memory/2760-1-0x0000000000BF0000-0x0000000000BF2000-memory.dmpFilesize
8KB
-
memory/2760-17-0x00000000001D0000-0x0000000000258000-memory.dmpFilesize
544KB
-
memory/3416-38-0x0000000000AC0000-0x0000000000B77000-memory.dmpFilesize
732KB
-
memory/3416-41-0x0000000000AC0000-0x0000000000B77000-memory.dmpFilesize
732KB
-
memory/3416-42-0x0000000000AC0000-0x0000000000B77000-memory.dmpFilesize
732KB
-
memory/3416-43-0x0000000000AC0000-0x0000000000B77000-memory.dmpFilesize
732KB
-
memory/3416-44-0x0000000000AC0000-0x0000000000B77000-memory.dmpFilesize
732KB
-
memory/3416-45-0x0000000000AC0000-0x0000000000B77000-memory.dmpFilesize
732KB