Analysis
-
max time kernel
149s -
max time network
122s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
01/07/2024, 13:01
Static task
static1
Behavioral task
behavioral1
Sample
542884dc487dacf92669b02071fdd7fd8b9dd2912e81490175703bb1c3061e22_NeikiAnalytics.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
542884dc487dacf92669b02071fdd7fd8b9dd2912e81490175703bb1c3061e22_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
542884dc487dacf92669b02071fdd7fd8b9dd2912e81490175703bb1c3061e22_NeikiAnalytics.exe
-
Size
64KB
-
MD5
faaeca6e344b06341c546489a00d27f0
-
SHA1
5bf23bbe43206e7c60aa2e4a68e56dbee283555d
-
SHA256
542884dc487dacf92669b02071fdd7fd8b9dd2912e81490175703bb1c3061e22
-
SHA512
2d257c013bd8f5bfa80acf503bd67f0d8209e405f68d933ab740da54d76dcc314ac5a4df48e24f140ed384bd8f1823afec65b7a9c0aabfd8c83c24e74b4a3075
-
SSDEEP
1536:bQTIubHy5wQjNZgHLl7qJc2fiMIRZprDa8ibxBvH:u4wINaLlqy2MtDMBv
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation 542884dc487dacf92669b02071fdd7fd8b9dd2912e81490175703bb1c3061e22_NeikiAnalytics.exe -
Executes dropped EXE 1 IoCs
pid Process 4264 jusched.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\427c813a\jusched.exe 542884dc487dacf92669b02071fdd7fd8b9dd2912e81490175703bb1c3061e22_NeikiAnalytics.exe File created C:\Program Files (x86)\427c813a\427c813a 542884dc487dacf92669b02071fdd7fd8b9dd2912e81490175703bb1c3061e22_NeikiAnalytics.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4264 jusched.exe 4264 jusched.exe 4264 jusched.exe 4264 jusched.exe 4264 jusched.exe 4264 jusched.exe 4264 jusched.exe 4264 jusched.exe 4264 jusched.exe 4264 jusched.exe 4264 jusched.exe 4264 jusched.exe 4264 jusched.exe 4264 jusched.exe 4264 jusched.exe 4264 jusched.exe 4264 jusched.exe 4264 jusched.exe 4264 jusched.exe 4264 jusched.exe 4264 jusched.exe 4264 jusched.exe 4264 jusched.exe 4264 jusched.exe 4264 jusched.exe 4264 jusched.exe 4264 jusched.exe 4264 jusched.exe 4264 jusched.exe 4264 jusched.exe 4264 jusched.exe 4264 jusched.exe 4264 jusched.exe 4264 jusched.exe 4264 jusched.exe 4264 jusched.exe 4264 jusched.exe 4264 jusched.exe 4264 jusched.exe 4264 jusched.exe 4264 jusched.exe 4264 jusched.exe 4264 jusched.exe 4264 jusched.exe 4264 jusched.exe 4264 jusched.exe 4264 jusched.exe 4264 jusched.exe 4264 jusched.exe 4264 jusched.exe 4264 jusched.exe 4264 jusched.exe 4264 jusched.exe 4264 jusched.exe 4264 jusched.exe 4264 jusched.exe 4264 jusched.exe 4264 jusched.exe 4264 jusched.exe 4264 jusched.exe 4264 jusched.exe 4264 jusched.exe 4264 jusched.exe 4264 jusched.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 644 wrote to memory of 4264 644 542884dc487dacf92669b02071fdd7fd8b9dd2912e81490175703bb1c3061e22_NeikiAnalytics.exe 81 PID 644 wrote to memory of 4264 644 542884dc487dacf92669b02071fdd7fd8b9dd2912e81490175703bb1c3061e22_NeikiAnalytics.exe 81 PID 644 wrote to memory of 4264 644 542884dc487dacf92669b02071fdd7fd8b9dd2912e81490175703bb1c3061e22_NeikiAnalytics.exe 81
Processes
-
C:\Users\Admin\AppData\Local\Temp\542884dc487dacf92669b02071fdd7fd8b9dd2912e81490175703bb1c3061e22_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\542884dc487dacf92669b02071fdd7fd8b9dd2912e81490175703bb1c3061e22_NeikiAnalytics.exe"1⤵
- Checks computer location settings
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:644 -
C:\Program Files (x86)\427c813a\jusched.exe"C:\Program Files (x86)\427c813a\jusched.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:4264
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
13B
MD5f253efe302d32ab264a76e0ce65be769
SHA1768685ca582abd0af2fbb57ca37752aa98c9372b
SHA25649dca65f362fee401292ed7ada96f96295eab1e589c52e4e66bf4aedda715fdd
SHA5121990d20b462406bbadb22ba43f1ed9d0db6b250881d4ac89ad8cf6e43ca92b2fd31c3a15be1e6e149e42fdb46e58122c15bc7869a82c9490656c80df69fa77c4
-
Filesize
64KB
MD5bdc496842ade4efc069bf73d5bead886
SHA1720909aa85c637cbd4207ee35db97d921b2aefb3
SHA2565bae0d7aacb5636197be5952df6f30f89707e3ac66057fd0f8a0cefc41acda78
SHA51260db45af60e2ff9c301f0c2c212e42864788c8e9fbda9181aeaaefbf5b10043501831d29f0b6a2be9a108277470fe618d53080da650789eff0043501c0a44cb0