Analysis
-
max time kernel
23s -
max time network
98s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
09/05/2024, 18:14
Static task
static1
Behavioral task
behavioral1
Sample
bae71e59150bb23d2a996f9911e7ebb0_NeikiAnalytics.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
bae71e59150bb23d2a996f9911e7ebb0_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
bae71e59150bb23d2a996f9911e7ebb0_NeikiAnalytics.exe
-
Size
115KB
-
MD5
bae71e59150bb23d2a996f9911e7ebb0
-
SHA1
d209c3d8a5419e8ad944726d12f06ddd6d181896
-
SHA256
e2b52234a77e2f39c45ee7deb47499d31b3b4da9ff5e2c4da09174cfcfc97fb8
-
SHA512
ae2a5d5c0b85a464a276ca564087d41ab826d066999f007efae92d0515122382a1051c4808785112898e846364db90abae97cea1377ff080cd6b369e42f3d9e6
-
SSDEEP
3072:HQC/yj5JO3MnEG+Hu54Fx4xE8N5Lxxu6IfoJ:wlj7cMnl+OEX+I6J
Malware Config
Signatures
-
Executes dropped EXE 4 IoCs
pid Process 4728 MSWDM.EXE 3016 MSWDM.EXE 2136 BAE71E59150BB23D2A996F9911E7EBB0_NEIKIANALYTICS.EXE 3576 MSWDM.EXE -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\WDM = "MSWDM.EXE" bae71e59150bb23d2a996f9911e7ebb0_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunServices\WDM = "MSWDM.EXE" bae71e59150bb23d2a996f9911e7ebb0_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\WDM = "MSWDM.EXE" MSWDM.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunServices\WDM = "MSWDM.EXE" MSWDM.EXE -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\WINDOWS\MSWDM.EXE bae71e59150bb23d2a996f9911e7ebb0_NeikiAnalytics.exe File opened for modification C:\Windows\dev4C0D.tmp bae71e59150bb23d2a996f9911e7ebb0_NeikiAnalytics.exe File opened for modification C:\Windows\dev4C0D.tmp MSWDM.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3016 MSWDM.EXE 3016 MSWDM.EXE -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 4480 wrote to memory of 4728 4480 bae71e59150bb23d2a996f9911e7ebb0_NeikiAnalytics.exe 82 PID 4480 wrote to memory of 4728 4480 bae71e59150bb23d2a996f9911e7ebb0_NeikiAnalytics.exe 82 PID 4480 wrote to memory of 4728 4480 bae71e59150bb23d2a996f9911e7ebb0_NeikiAnalytics.exe 82 PID 4480 wrote to memory of 3016 4480 bae71e59150bb23d2a996f9911e7ebb0_NeikiAnalytics.exe 83 PID 4480 wrote to memory of 3016 4480 bae71e59150bb23d2a996f9911e7ebb0_NeikiAnalytics.exe 83 PID 4480 wrote to memory of 3016 4480 bae71e59150bb23d2a996f9911e7ebb0_NeikiAnalytics.exe 83 PID 3016 wrote to memory of 2136 3016 MSWDM.EXE 84 PID 3016 wrote to memory of 2136 3016 MSWDM.EXE 84 PID 3016 wrote to memory of 3576 3016 MSWDM.EXE 86 PID 3016 wrote to memory of 3576 3016 MSWDM.EXE 86 PID 3016 wrote to memory of 3576 3016 MSWDM.EXE 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\bae71e59150bb23d2a996f9911e7ebb0_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\bae71e59150bb23d2a996f9911e7ebb0_NeikiAnalytics.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:4480 -
C:\WINDOWS\MSWDM.EXE"C:\WINDOWS\MSWDM.EXE"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:4728
-
-
C:\WINDOWS\MSWDM.EXE-r!C:\Windows\dev4C0D.tmp!C:\Users\Admin\AppData\Local\Temp\bae71e59150bb23d2a996f9911e7ebb0_NeikiAnalytics.exe! !2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3016 -
C:\Users\Admin\AppData\Local\Temp\BAE71E59150BB23D2A996F9911E7EBB0_NEIKIANALYTICS.EXE
- Executes dropped EXE
PID:2136
-
-
C:\WINDOWS\MSWDM.EXE-e!C:\Windows\dev4C0D.tmp!C:\Users\Admin\AppData\Local\Temp\BAE71E59150BB23D2A996F9911E7EBB0_NEIKIANALYTICS.EXE!3⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:3576
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
115KB
MD5e8293a24797b8613a96a3d6260b0e363
SHA17409eb5d640ae274762f7e1d550f696dfef82777
SHA256ae7df5c67d69bc0fdfbeb4495c60d91578aeff81a8aec211351058682a2934e8
SHA51264fdc7682093d37bc3321f9d94c026f0cc086585cbb2b127431bda6c07cb1fade14c4e52961717032279c174bda816b532b94bbb3b3e32eb37dde6888d94699c
-
Filesize
80KB
MD584f71022ebc5a46c478395d37f05130e
SHA1fd0750764a52487fcf79730e1437a41c100c8ea1
SHA25684ac817481587ff062220c5b8fc23501d3192e3dec6c265e0dc7f9f78a7396e5
SHA5128c5818749619daa759b6cec7226609ae5fe3d2d8bd50c82b919a2eca400156c21a9e4c4b9cc10b1da8117aeb73cdb96538ae47644ff636cf98c6c7e5dcd351c3
-
Filesize
35KB
MD5ea3b798870a5c6e159bb05f432b0438a
SHA117cdd851ea58dd00296bd44c031484ef05342ee0
SHA2563e7a5f7a2c4d88b30de76681d2759119aaf479f5787b6466dc175a852e50a1c7
SHA512fc3f5089d2a57e38d285e5a90f2be63431d40c2c443dec41b783aaf5c1a6f4ab9b6904cd5fece18d6dc15664f00d7d5d0ba27d226f7623fe02c2f76f57a17524