Analysis

  • max time kernel
    28s
  • max time network
    136s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09-05-2024 14:34

General

  • Target

    5f8221f792225c872ba891806a81db60_NeikiAnalytics.exe

  • Size

    534KB

  • MD5

    5f8221f792225c872ba891806a81db60

  • SHA1

    eed66893bc936693edb721402bb16559b5035676

  • SHA256

    1326d344bb4e19156afeead555e5d2ae10fbf03564e18341fda0eb2bcffe6b2b

  • SHA512

    6105adda11998cda91a58b67de974e70472627b70064752ed9edb4986ee00c0dec09f82973a95c1305d1adf10bfbe315fa8ccebd0a95cacadee06ffd92eea161

  • SSDEEP

    6144:wlj7cMnU+OEXu78n5Qw0tneDA/sqhleIc0HftDrkYY1hj63hgDonsogCh6NEpAFJ:wlbU+I85bM3npxYfj63hgD1Zi6

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 4 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Drops file in Windows directory 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5f8221f792225c872ba891806a81db60_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\5f8221f792225c872ba891806a81db60_NeikiAnalytics.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    PID:2080
    • C:\WINDOWS\MSWDM.EXE
      "C:\WINDOWS\MSWDM.EXE"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      PID:428
    • C:\WINDOWS\MSWDM.EXE
      -r!C:\Windows\dev327A.tmp!C:\Users\Admin\AppData\Local\Temp\5f8221f792225c872ba891806a81db60_NeikiAnalytics.exe! !
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:4876
      • C:\Users\Admin\AppData\Local\Temp\5F8221F792225C872BA891806A81DB60_NEIKIANALYTICS.EXE
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        PID:732
      • C:\WINDOWS\MSWDM.EXE
        -e!C:\Windows\dev327A.tmp!C:\Users\Admin\AppData\Local\Temp\5F8221F792225C872BA891806A81DB60_NEIKIANALYTICS.EXE!
        3⤵
        • Executes dropped EXE
        • Drops file in Windows directory
        PID:1312

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\5F8221F792225C872BA891806A81DB60_NEIKIANALYTICS.EXE

    Filesize

    534KB

    MD5

    86baf0490bcdc85cacc61ff2380f9016

    SHA1

    a3b085fa169053ed67aeb5cf5641263c8043cf07

    SHA256

    780725481126e037f916d78981dfc8485f5800a2bec68028fc4969f1301f237b

    SHA512

    7bbb654faac6ece1f10b9f004644930b09715a07c012d838e865dbc907d83646b4070ad98851a6449c6ed1c31785bb7a6389497df481ea10b6a4b9cf94a30d5b

  • C:\Windows\MSWDM.EXE

    Filesize

    80KB

    MD5

    3bad16e6b9791239f0136f664c22ace8

    SHA1

    a92f82890a3ac797b3e5d51840be75376e751a0f

    SHA256

    6b5e6c7bd133a0b2972be2796b0a52f0fa8713d9a9c27d25fdca7e9fcb8d1b17

    SHA512

    ac2b8b671958cfbd4b4966bddbeb3375c6b29089c90364aeb3a3e4836878970e65fa74ca0b5f553a9164b33c630534722306ee4e7b6b36c432e517c503d23dfd

  • C:\Windows\dev327A.tmp

    Filesize

    453KB

    MD5

    96f7cb9f7481a279bd4bc0681a3b993e

    SHA1

    deaedb5becc6c0bd263d7cf81e0909b912a1afd4

    SHA256

    d2893c55259772b554cb887d3e2e1f9c67f5cd5abac2ab9f4720dec507cdd290

    SHA512

    694d2da36df04db25cc5972f7cc180b77e1cb0c3b5be8b69fe7e2d4e59555efb8aa7e50b1475ad5196ca638dabde2c796ae6faeb4a31f38166838cd1cc028149

  • memory/428-11-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/428-26-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/1312-19-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/1312-22-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/2080-1-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/2080-7-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/4876-10-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/4876-25-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB