Analysis

  • max time kernel
    22s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240215-en
  • resource tags

    arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system
  • submitted
    10-05-2024 22:37

General

  • Target

    1db15568e1f69134c8c401d0c0853bc0_NeikiAnalytics.exe

  • Size

    62KB

  • MD5

    1db15568e1f69134c8c401d0c0853bc0

  • SHA1

    f67dc3f350c88721472324eb8feec8fe979c9500

  • SHA256

    2755631bac7725815675db31202768d1131e03af5ccfa32a1d0ac181ec7aed66

  • SHA512

    b7e8d16cc08e26c2d2ac72fcc3019a064e7afa5062129dd8f9d4ecc690cbcd713506c960e6915b0a9ae4e86dedc158f7772cdeafc9d2fd3a70c33030ebe393f8

  • SSDEEP

    1536:Hlqls0GgUyj5JxdA4Oj3W2Fsdq4FSG+sjl:HQC/yj5JO3MnSG++l

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Drops file in Windows directory 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1db15568e1f69134c8c401d0c0853bc0_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\1db15568e1f69134c8c401d0c0853bc0_NeikiAnalytics.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    PID:2316
    • C:\WINDOWS\MSWDM.EXE
      "C:\WINDOWS\MSWDM.EXE"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      PID:2212
    • C:\WINDOWS\MSWDM.EXE
      -r!C:\Windows\devFBA.tmp!C:\Users\Admin\AppData\Local\Temp\1db15568e1f69134c8c401d0c0853bc0_NeikiAnalytics.exe! !
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:1744
      • C:\Users\Admin\AppData\Local\Temp\1DB15568E1F69134C8C401D0C0853BC0_NEIKIANALYTICS.EXE
        3⤵
        • Executes dropped EXE
        PID:2572
      • C:\WINDOWS\MSWDM.EXE
        -e!C:\Windows\devFBA.tmp!C:\Users\Admin\AppData\Local\Temp\1DB15568E1F69134C8C401D0C0853BC0_NEIKIANALYTICS.EXE!
        3⤵
        • Executes dropped EXE
        PID:2724

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\MSWDM.EXE

    Filesize

    47KB

    MD5

    29c9387f23c164ed635ee6b4b2b243fb

    SHA1

    cf8c961cbedb5aa3e0a9ec9263b7aa62e2939130

    SHA256

    05e9a775c3e39e0ed8fc0d61f3e1da1f40aec50d945aa22b477bf13e1ab9b698

    SHA512

    f39ecc49d8aece2881280996c40393f813fd8929dea46e28bbfb18cb5eb8f6bfa271f2dd71ddeb5cc34d6a4ba94efcb761c0071d6fb2bc40dc0b729cdde65522

  • C:\Windows\devFBA.tmp

    Filesize

    14KB

    MD5

    7ea51103417f95f299379d9ebaa95fb3

    SHA1

    e27b5534d5736c0a0197b8096cb272901902028f

    SHA256

    4e5f92d8b5041668cdfc6eb7e045835ee6c6c82db987f06d336f068715be7c18

    SHA512

    131aadc639abc9c13303c42f98655b28919fba57c13d50ef4f3011f6fd80e28f81162cfb029286c07e1d0ea9831824da6db3eb68cf3162518f2b0fec643d31b1

  • memory/1744-25-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/1744-33-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/2212-14-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/2212-34-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/2316-0-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/2316-13-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/2572-27-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2724-30-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB