Analysis
-
max time kernel
20s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
09/05/2024, 14:34
Static task
static1
Behavioral task
behavioral1
Sample
5f8221f792225c872ba891806a81db60_NeikiAnalytics.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
5f8221f792225c872ba891806a81db60_NeikiAnalytics.exe
Resource
win10v2004-20240426-en
General
-
Target
5f8221f792225c872ba891806a81db60_NeikiAnalytics.exe
-
Size
534KB
-
MD5
5f8221f792225c872ba891806a81db60
-
SHA1
eed66893bc936693edb721402bb16559b5035676
-
SHA256
1326d344bb4e19156afeead555e5d2ae10fbf03564e18341fda0eb2bcffe6b2b
-
SHA512
6105adda11998cda91a58b67de974e70472627b70064752ed9edb4986ee00c0dec09f82973a95c1305d1adf10bfbe315fa8ccebd0a95cacadee06ffd92eea161
-
SSDEEP
6144:wlj7cMnU+OEXu78n5Qw0tneDA/sqhleIc0HftDrkYY1hj63hgDonsogCh6NEpAFJ:wlbU+I85bM3npxYfj63hgD1Zi6
Malware Config
Signatures
-
Executes dropped EXE 4 IoCs
pid Process 1760 MSWDM.EXE 1844 MSWDM.EXE 2704 5F8221F792225C872BA891806A81DB60_NEIKIANALYTICS.EXE 2700 MSWDM.EXE -
Loads dropped DLL 1 IoCs
pid Process 1760 MSWDM.EXE -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\WDM = "MSWDM.EXE" 5f8221f792225c872ba891806a81db60_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunServices\WDM = "MSWDM.EXE" 5f8221f792225c872ba891806a81db60_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\WDM = "MSWDM.EXE" MSWDM.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunServices\WDM = "MSWDM.EXE" MSWDM.EXE -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\WINDOWS\MSWDM.EXE 5f8221f792225c872ba891806a81db60_NeikiAnalytics.exe File opened for modification C:\Windows\dev2C00.tmp 5f8221f792225c872ba891806a81db60_NeikiAnalytics.exe File opened for modification C:\Windows\dev2C00.tmp MSWDM.EXE -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1760 MSWDM.EXE -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2704 5F8221F792225C872BA891806A81DB60_NEIKIANALYTICS.EXE 2704 5F8221F792225C872BA891806A81DB60_NEIKIANALYTICS.EXE 2704 5F8221F792225C872BA891806A81DB60_NEIKIANALYTICS.EXE -
Suspicious use of WriteProcessMemory 19 IoCs
description pid Process procid_target PID 1736 wrote to memory of 1844 1736 5f8221f792225c872ba891806a81db60_NeikiAnalytics.exe 28 PID 1736 wrote to memory of 1844 1736 5f8221f792225c872ba891806a81db60_NeikiAnalytics.exe 28 PID 1736 wrote to memory of 1844 1736 5f8221f792225c872ba891806a81db60_NeikiAnalytics.exe 28 PID 1736 wrote to memory of 1844 1736 5f8221f792225c872ba891806a81db60_NeikiAnalytics.exe 28 PID 1736 wrote to memory of 1760 1736 5f8221f792225c872ba891806a81db60_NeikiAnalytics.exe 29 PID 1736 wrote to memory of 1760 1736 5f8221f792225c872ba891806a81db60_NeikiAnalytics.exe 29 PID 1736 wrote to memory of 1760 1736 5f8221f792225c872ba891806a81db60_NeikiAnalytics.exe 29 PID 1736 wrote to memory of 1760 1736 5f8221f792225c872ba891806a81db60_NeikiAnalytics.exe 29 PID 1760 wrote to memory of 2704 1760 MSWDM.EXE 30 PID 1760 wrote to memory of 2704 1760 MSWDM.EXE 30 PID 1760 wrote to memory of 2704 1760 MSWDM.EXE 30 PID 1760 wrote to memory of 2704 1760 MSWDM.EXE 30 PID 1760 wrote to memory of 2704 1760 MSWDM.EXE 30 PID 1760 wrote to memory of 2704 1760 MSWDM.EXE 30 PID 1760 wrote to memory of 2704 1760 MSWDM.EXE 30 PID 1760 wrote to memory of 2700 1760 MSWDM.EXE 31 PID 1760 wrote to memory of 2700 1760 MSWDM.EXE 31 PID 1760 wrote to memory of 2700 1760 MSWDM.EXE 31 PID 1760 wrote to memory of 2700 1760 MSWDM.EXE 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\5f8221f792225c872ba891806a81db60_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\5f8221f792225c872ba891806a81db60_NeikiAnalytics.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1736 -
C:\WINDOWS\MSWDM.EXE"C:\WINDOWS\MSWDM.EXE"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:1844
-
-
C:\WINDOWS\MSWDM.EXE-r!C:\Windows\dev2C00.tmp!C:\Users\Admin\AppData\Local\Temp\5f8221f792225c872ba891806a81db60_NeikiAnalytics.exe! !2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1760 -
C:\Users\Admin\AppData\Local\Temp\5F8221F792225C872BA891806A81DB60_NEIKIANALYTICS.EXE
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2704
-
-
C:\WINDOWS\MSWDM.EXE-e!C:\Windows\dev2C00.tmp!C:\Users\Admin\AppData\Local\Temp\5F8221F792225C872BA891806A81DB60_NEIKIANALYTICS.EXE!3⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:2700
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
534KB
MD586baf0490bcdc85cacc61ff2380f9016
SHA1a3b085fa169053ed67aeb5cf5641263c8043cf07
SHA256780725481126e037f916d78981dfc8485f5800a2bec68028fc4969f1301f237b
SHA5127bbb654faac6ece1f10b9f004644930b09715a07c012d838e865dbc907d83646b4070ad98851a6449c6ed1c31785bb7a6389497df481ea10b6a4b9cf94a30d5b
-
Filesize
80KB
MD53bad16e6b9791239f0136f664c22ace8
SHA1a92f82890a3ac797b3e5d51840be75376e751a0f
SHA2566b5e6c7bd133a0b2972be2796b0a52f0fa8713d9a9c27d25fdca7e9fcb8d1b17
SHA512ac2b8b671958cfbd4b4966bddbeb3375c6b29089c90364aeb3a3e4836878970e65fa74ca0b5f553a9164b33c630534722306ee4e7b6b36c432e517c503d23dfd
-
Filesize
453KB
MD596f7cb9f7481a279bd4bc0681a3b993e
SHA1deaedb5becc6c0bd263d7cf81e0909b912a1afd4
SHA256d2893c55259772b554cb887d3e2e1f9c67f5cd5abac2ab9f4720dec507cdd290
SHA512694d2da36df04db25cc5972f7cc180b77e1cb0c3b5be8b69fe7e2d4e59555efb8aa7e50b1475ad5196ca638dabde2c796ae6faeb4a31f38166838cd1cc028149