Analysis
-
max time kernel
55s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
10/05/2024, 05:40
Static task
static1
Behavioral task
behavioral1
Sample
818cbbab1b82d127f922374b7c3c5240_NeikiAnalytics.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
818cbbab1b82d127f922374b7c3c5240_NeikiAnalytics.exe
Resource
win10v2004-20240226-en
General
-
Target
818cbbab1b82d127f922374b7c3c5240_NeikiAnalytics.exe
-
Size
115KB
-
MD5
818cbbab1b82d127f922374b7c3c5240
-
SHA1
321b0305809e8209e3792e61e9860b11ac2cbb0d
-
SHA256
71fa94505d5d2b6e4ab01c9d0d0884f183266363c3239779167e08e0062a3ffb
-
SHA512
90b6efbe71e636c1c17246c8419123b796ad76512165517c94c0d31f79abde1c657cc84eedd11d9b88ed5eccb83dbdf010822e5a08b41e4f71dd9566daf7f3da
-
SSDEEP
3072:HQC/yj5JO3Mn1bG+Hu54Fx4xE81bPRfw3b:wlj7cMn1i+OEXUPcb
Malware Config
Signatures
-
Executes dropped EXE 4 IoCs
pid Process 4068 MSWDM.EXE 1556 MSWDM.EXE 1744 818CBBAB1B82D127F922374B7C3C5240_NEIKIANALYTICS.EXE 3820 MSWDM.EXE -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\WDM = "MSWDM.EXE" 818cbbab1b82d127f922374b7c3c5240_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunServices\WDM = "MSWDM.EXE" 818cbbab1b82d127f922374b7c3c5240_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\WDM = "MSWDM.EXE" MSWDM.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunServices\WDM = "MSWDM.EXE" MSWDM.EXE -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\WINDOWS\MSWDM.EXE 818cbbab1b82d127f922374b7c3c5240_NeikiAnalytics.exe File opened for modification C:\Windows\devEB1.tmp 818cbbab1b82d127f922374b7c3c5240_NeikiAnalytics.exe File opened for modification C:\Windows\devEB1.tmp MSWDM.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1556 MSWDM.EXE 1556 MSWDM.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4108 wrote to memory of 4068 4108 818cbbab1b82d127f922374b7c3c5240_NeikiAnalytics.exe 90 PID 4108 wrote to memory of 4068 4108 818cbbab1b82d127f922374b7c3c5240_NeikiAnalytics.exe 90 PID 4108 wrote to memory of 4068 4108 818cbbab1b82d127f922374b7c3c5240_NeikiAnalytics.exe 90 PID 4108 wrote to memory of 1556 4108 818cbbab1b82d127f922374b7c3c5240_NeikiAnalytics.exe 91 PID 4108 wrote to memory of 1556 4108 818cbbab1b82d127f922374b7c3c5240_NeikiAnalytics.exe 91 PID 4108 wrote to memory of 1556 4108 818cbbab1b82d127f922374b7c3c5240_NeikiAnalytics.exe 91 PID 1556 wrote to memory of 1744 1556 MSWDM.EXE 92 PID 1556 wrote to memory of 1744 1556 MSWDM.EXE 92 PID 1556 wrote to memory of 1744 1556 MSWDM.EXE 92 PID 1556 wrote to memory of 3820 1556 MSWDM.EXE 94 PID 1556 wrote to memory of 3820 1556 MSWDM.EXE 94 PID 1556 wrote to memory of 3820 1556 MSWDM.EXE 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\818cbbab1b82d127f922374b7c3c5240_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\818cbbab1b82d127f922374b7c3c5240_NeikiAnalytics.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:4108 -
C:\WINDOWS\MSWDM.EXE"C:\WINDOWS\MSWDM.EXE"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:4068
-
-
C:\WINDOWS\MSWDM.EXE-r!C:\Windows\devEB1.tmp!C:\Users\Admin\AppData\Local\Temp\818cbbab1b82d127f922374b7c3c5240_NeikiAnalytics.exe! !2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1556 -
C:\Users\Admin\AppData\Local\Temp\818CBBAB1B82D127F922374B7C3C5240_NEIKIANALYTICS.EXE
- Executes dropped EXE
PID:1744
-
-
C:\WINDOWS\MSWDM.EXE-e!C:\Windows\devEB1.tmp!C:\Users\Admin\AppData\Local\Temp\818CBBAB1B82D127F922374B7C3C5240_NEIKIANALYTICS.EXE!3⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:3820
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=1408 --field-trial-handle=2276,i,5697607538120380977,9987005253899555344,262144 --variations-seed-version /prefetch:81⤵PID:5016
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
115KB
MD54d537c02e64f683aa8442825e8861a5f
SHA1bb2af5c0c6382edfa9aac9e46b0903f07407e272
SHA2560da9a40b8f15f8dcb72370256fd46b76234a8369e37411d64269559587e96124
SHA512b591e0dc5875861ff0cd2bb97a52946579d7e4257ef97e749fa8dbacdc20b98a3e046e66722b8db20dcf4c6da203e71383789a1744329a45abed6e93ad242781
-
Filesize
80KB
MD55d32a712107d0861eb6d7de8a1601d3b
SHA1b6a31070a0612c4e9f5875a320081595730f8340
SHA25693200957a90435ac511ba224d780702e6958f7f3dd7f9ce2d3b575eb03c17c35
SHA512dfdc98031f519efc5b59611422f0dcaf8db7a25d2bae1e550b066d097cc303201d10c9a38bcc2df8e28397ad07e744968da3b5c3178f24ce144e6c8b96455f77
-
Filesize
35KB
MD52c66df25d30b2ea67ab2fd18f3058fd8
SHA1ae92d355903d25afb6113c3bae6a40305e5857f9
SHA2564f7262d45f0b95840d41511d3658281080a3a66e2d59541b5e52acf887b9b6bb
SHA5125275be29af642a6220fc9930c3daccb0e74c8989d4d2ac573fae8465d96e501532d19130786d673f75f171ab7a2b55984673d5ccba37972ff5c3c9e3dfadac79