Analysis
-
max time kernel
136s -
max time network
137s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
29-06-2024 05:15
Behavioral task
behavioral1
Sample
69bece8ab134c9fcfb20071627cebe1d359a484782d5d0a4db6b9b25ac11a897_NeikiAnalytics.exe
Resource
win7-20240611-en
General
-
Target
69bece8ab134c9fcfb20071627cebe1d359a484782d5d0a4db6b9b25ac11a897_NeikiAnalytics.exe
-
Size
142KB
-
MD5
472d138a83586cfad7ce44eb8434a4a0
-
SHA1
fcd7cd5e9252efd6a6a7ceda81750cfa43ea0e50
-
SHA256
69bece8ab134c9fcfb20071627cebe1d359a484782d5d0a4db6b9b25ac11a897
-
SHA512
e9af7870b37f572b6e5d2752d275de3a2f3600b4654da653de9d071f1e1fe0966d228b62716ef3d31a59091962051d9a4613e6fbb0a7941707ac14efa97ccf24
-
SSDEEP
1536:XBmcOGZnuETb8yqYd6f/68OJBfWKy2CZ0K06RcVxUs0vUQg0Zm2okVpwP0O:XZOSuECf8ZCKK06QC5ZZdokVp20O
Malware Config
Extracted
urelas
112.175.88.208
112.175.88.207
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
69bece8ab134c9fcfb20071627cebe1d359a484782d5d0a4db6b9b25ac11a897_NeikiAnalytics.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-3665033694-1447845302-680750983-1000\Control Panel\International\Geo\Nation 69bece8ab134c9fcfb20071627cebe1d359a484782d5d0a4db6b9b25ac11a897_NeikiAnalytics.exe -
Executes dropped EXE 1 IoCs
Processes:
dofhir.exepid process 1780 dofhir.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
69bece8ab134c9fcfb20071627cebe1d359a484782d5d0a4db6b9b25ac11a897_NeikiAnalytics.exedescription pid process target process PID 3864 wrote to memory of 1780 3864 69bece8ab134c9fcfb20071627cebe1d359a484782d5d0a4db6b9b25ac11a897_NeikiAnalytics.exe dofhir.exe PID 3864 wrote to memory of 1780 3864 69bece8ab134c9fcfb20071627cebe1d359a484782d5d0a4db6b9b25ac11a897_NeikiAnalytics.exe dofhir.exe PID 3864 wrote to memory of 1780 3864 69bece8ab134c9fcfb20071627cebe1d359a484782d5d0a4db6b9b25ac11a897_NeikiAnalytics.exe dofhir.exe PID 3864 wrote to memory of 756 3864 69bece8ab134c9fcfb20071627cebe1d359a484782d5d0a4db6b9b25ac11a897_NeikiAnalytics.exe cmd.exe PID 3864 wrote to memory of 756 3864 69bece8ab134c9fcfb20071627cebe1d359a484782d5d0a4db6b9b25ac11a897_NeikiAnalytics.exe cmd.exe PID 3864 wrote to memory of 756 3864 69bece8ab134c9fcfb20071627cebe1d359a484782d5d0a4db6b9b25ac11a897_NeikiAnalytics.exe cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\69bece8ab134c9fcfb20071627cebe1d359a484782d5d0a4db6b9b25ac11a897_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\69bece8ab134c9fcfb20071627cebe1d359a484782d5d0a4db6b9b25ac11a897_NeikiAnalytics.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3864 -
C:\Users\Admin\AppData\Local\Temp\dofhir.exe"C:\Users\Admin\AppData\Local\Temp\dofhir.exe"2⤵
- Executes dropped EXE
PID:1780
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\sanfdr.bat" "2⤵PID:756
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4280,i,6522675234395427298,2952738987384583032,262144 --variations-seed-version --mojo-platform-channel-handle=4428 /prefetch:81⤵PID:1368
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
142KB
MD5dacc4d7206d8f376dece9d21e7ce1888
SHA1834bb12609426afad9566ae4c8c31a639b1e65a1
SHA256156d7d4e93a581462fe4f359e53d96350db8b92bae9c92ea57abc535e70fcd06
SHA512c5f6af4d8464df707f09175ea9da425203d7e673a5cde10efa8d8824c09fdf01ea73d9cc6358d2ac4766b0cab3e0168406461cdc7d575f36f9b73938e15b463f
-
Filesize
512B
MD51bda36d555a6a668c71a805d0fef7b43
SHA163ef5ec40ea61e0803c5f988c5f5b1fe5834eeab
SHA25691fc9a1836c535aa1bfa3288c635d24a44b76f9837702d0540fa8c1b97551a4c
SHA5125b01bfe55ff24db66250d5555b29fae4c24d988827b47301fc319dafcabd33ab2944789395c35a002919ebcf042da989d8cfa95349c3f7344d58b20b31b23ed4
-
Filesize
368B
MD5f6542d604dc9250502d27af8e729dfba
SHA16ff4040ed9c0a836be1eac34631f5832f95c5f68
SHA2569d2498afbe9840ebc3bba2d8f63ea377b38edaf017f60ca6f3de9effdbd859b8
SHA5120967b898b5ad342bbfa857a6373c9f77dfada9951df3dce84689adc2d8c6deed9b8fe704e78d9a7724fab5411c9027594ae58038b8d9a0de9540293cf8fc9ab5