Analysis
-
max time kernel
17s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
09-05-2024 21:55
Static task
static1
Behavioral task
behavioral1
Sample
089a8047f26f1f4e6021c87644bce5c0_NeikiAnalytics.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
089a8047f26f1f4e6021c87644bce5c0_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
089a8047f26f1f4e6021c87644bce5c0_NeikiAnalytics.exe
-
Size
82KB
-
MD5
089a8047f26f1f4e6021c87644bce5c0
-
SHA1
eee6fccae386c3f2ec141d08ef25b9c5ab000225
-
SHA256
f2a71d9eea234362e0bfb4afe389932bc5c0645e914b4127212447d7b088a8f9
-
SHA512
3e9a7a96af7968a88e3918874c5a29599e75bcf0d5e408a223b637f65a0d12978b525cd472f62e1ce29a8a24bf5966384a66457d3e364ce8168151adfc22efad
-
SSDEEP
1536:Hlqls0GgUyj5JxdA4Oj3W2Fsdq4FaG+ss0Ao/VZl8WCfsEk:HQC/yj5JO3MnaG+joN5Cfs5
Malware Config
Signatures
-
Executes dropped EXE 4 IoCs
pid Process 384 MSWDM.EXE 2472 MSWDM.EXE 2620 089A8047F26F1F4E6021C87644BCE5C0_NEIKIANALYTICS.EXE 2684 MSWDM.EXE -
Loads dropped DLL 1 IoCs
pid Process 2472 MSWDM.EXE -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunServices\WDM = "MSWDM.EXE" 089a8047f26f1f4e6021c87644bce5c0_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\WDM = "MSWDM.EXE" MSWDM.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunServices\WDM = "MSWDM.EXE" MSWDM.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\WDM = "MSWDM.EXE" 089a8047f26f1f4e6021c87644bce5c0_NeikiAnalytics.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\WINDOWS\MSWDM.EXE 089a8047f26f1f4e6021c87644bce5c0_NeikiAnalytics.exe File opened for modification C:\Windows\devC31.tmp 089a8047f26f1f4e6021c87644bce5c0_NeikiAnalytics.exe File opened for modification C:\Windows\devC31.tmp MSWDM.EXE -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2472 MSWDM.EXE -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 2288 wrote to memory of 384 2288 089a8047f26f1f4e6021c87644bce5c0_NeikiAnalytics.exe 28 PID 2288 wrote to memory of 384 2288 089a8047f26f1f4e6021c87644bce5c0_NeikiAnalytics.exe 28 PID 2288 wrote to memory of 384 2288 089a8047f26f1f4e6021c87644bce5c0_NeikiAnalytics.exe 28 PID 2288 wrote to memory of 384 2288 089a8047f26f1f4e6021c87644bce5c0_NeikiAnalytics.exe 28 PID 2288 wrote to memory of 2472 2288 089a8047f26f1f4e6021c87644bce5c0_NeikiAnalytics.exe 29 PID 2288 wrote to memory of 2472 2288 089a8047f26f1f4e6021c87644bce5c0_NeikiAnalytics.exe 29 PID 2288 wrote to memory of 2472 2288 089a8047f26f1f4e6021c87644bce5c0_NeikiAnalytics.exe 29 PID 2288 wrote to memory of 2472 2288 089a8047f26f1f4e6021c87644bce5c0_NeikiAnalytics.exe 29 PID 2472 wrote to memory of 2620 2472 MSWDM.EXE 30 PID 2472 wrote to memory of 2620 2472 MSWDM.EXE 30 PID 2472 wrote to memory of 2620 2472 MSWDM.EXE 30 PID 2472 wrote to memory of 2620 2472 MSWDM.EXE 30 PID 2472 wrote to memory of 2684 2472 MSWDM.EXE 32 PID 2472 wrote to memory of 2684 2472 MSWDM.EXE 32 PID 2472 wrote to memory of 2684 2472 MSWDM.EXE 32 PID 2472 wrote to memory of 2684 2472 MSWDM.EXE 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\089a8047f26f1f4e6021c87644bce5c0_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\089a8047f26f1f4e6021c87644bce5c0_NeikiAnalytics.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2288 -
C:\WINDOWS\MSWDM.EXE"C:\WINDOWS\MSWDM.EXE"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:384
-
-
C:\WINDOWS\MSWDM.EXE-r!C:\Windows\devC31.tmp!C:\Users\Admin\AppData\Local\Temp\089a8047f26f1f4e6021c87644bce5c0_NeikiAnalytics.exe! !2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2472 -
C:\Users\Admin\AppData\Local\Temp\089A8047F26F1F4E6021C87644BCE5C0_NEIKIANALYTICS.EXE
- Executes dropped EXE
PID:2620
-
-
C:\WINDOWS\MSWDM.EXE-e!C:\Windows\devC31.tmp!C:\Users\Admin\AppData\Local\Temp\089A8047F26F1F4E6021C87644BCE5C0_NEIKIANALYTICS.EXE!3⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:2684
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
82KB
MD534e029fdac39295402bb4c40dee3994a
SHA1011aea72e409e8dfbd9e3b7d24e261695447bec6
SHA256dccf0cae2562e56f72bd7ca0d124499fbc866c3a28c52de52d57fab63f187aa2
SHA512077835eacc5e2971ec264edee848a52fa252dbf35b582da487a3c76f91e3b6d36b89f35debc34f9a369e59bc500e2ff83d5f71f82cd5e4fc561cca99a2be78a7
-
Filesize
47KB
MD50b68b857a7e40217c3dc0fbccd74c48c
SHA18eca09de54246a76db602e9bb2e7447ed8861bae
SHA2568891f8c76109255aff00be5f3ee7fe70a781371158d83f25ebf15d1a0fa7a22c
SHA512eed10fb03056f0760046505b06e378b697821ab37179e751168f1e2c9a92d0f0b318a8189618f9929a8f5b65c4f986dd3fcac5514ce398ee371ade5c8143f9dd
-
Filesize
35KB
MD56a7c4dc0fe5a8a33154566b5071b47c4
SHA1265a1bcc6b6a6be7a7ad35194fb4984d7bb7ef88
SHA256152944690bb39772fc594430205be704f7068c7a4bbcbe58074ebceab9911cf4
SHA5128340ed45634757d05c95031541e8f655aabc7c7f4eab2caaf623c8b34bd0b2b08bb2c30f5f34faaee176b18730607308d492b1be10e098837fb6a450f344cf3e