Analysis
-
max time kernel
14s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
11-05-2024 14:10
Static task
static1
Behavioral task
behavioral1
Sample
0c464a448c036048b03d4de646b53d00_NeikiAnalytics.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
0c464a448c036048b03d4de646b53d00_NeikiAnalytics.exe
Resource
win10v2004-20240426-en
General
-
Target
0c464a448c036048b03d4de646b53d00_NeikiAnalytics.exe
-
Size
538KB
-
MD5
0c464a448c036048b03d4de646b53d00
-
SHA1
358886ab6ba1c19f6d9ae13322dc8b58316cccd1
-
SHA256
b2962071ed06de80c3a79d50ab11c95215db8f7b2ab5b432ca6842373ef26832
-
SHA512
ce633030b763e50835450986c48c1391eb25d1e46d286fb95f898aae49311862c1900a983bcaa34964f1fdbea528cc8662d7c588a850e1aa5ba8d0f2fa623fd6
-
SSDEEP
12288:wlb2+h1gL5pRTcAkS/3hzN8qE43fm78Vo:Wb2+w5jcAkSYqyEo
Malware Config
Signatures
-
Executes dropped EXE 5 IoCs
pid Process 1624 MSWDM.EXE 2124 MSWDM.EXE 2628 0C464A448C036048B03D4DE646B53D00_NEIKIANALYTICS.EXE 1204 Process not Found 2748 MSWDM.EXE -
Loads dropped DLL 2 IoCs
pid Process 2124 MSWDM.EXE 2528 Process not Found -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\WDM = "MSWDM.EXE" MSWDM.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunServices\WDM = "MSWDM.EXE" MSWDM.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\WDM = "MSWDM.EXE" 0c464a448c036048b03d4de646b53d00_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunServices\WDM = "MSWDM.EXE" 0c464a448c036048b03d4de646b53d00_NeikiAnalytics.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\WINDOWS\MSWDM.EXE 0c464a448c036048b03d4de646b53d00_NeikiAnalytics.exe File opened for modification C:\Windows\dev8F54.tmp 0c464a448c036048b03d4de646b53d00_NeikiAnalytics.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2124 MSWDM.EXE -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 2740 wrote to memory of 1624 2740 0c464a448c036048b03d4de646b53d00_NeikiAnalytics.exe 28 PID 2740 wrote to memory of 1624 2740 0c464a448c036048b03d4de646b53d00_NeikiAnalytics.exe 28 PID 2740 wrote to memory of 1624 2740 0c464a448c036048b03d4de646b53d00_NeikiAnalytics.exe 28 PID 2740 wrote to memory of 1624 2740 0c464a448c036048b03d4de646b53d00_NeikiAnalytics.exe 28 PID 2740 wrote to memory of 2124 2740 0c464a448c036048b03d4de646b53d00_NeikiAnalytics.exe 29 PID 2740 wrote to memory of 2124 2740 0c464a448c036048b03d4de646b53d00_NeikiAnalytics.exe 29 PID 2740 wrote to memory of 2124 2740 0c464a448c036048b03d4de646b53d00_NeikiAnalytics.exe 29 PID 2740 wrote to memory of 2124 2740 0c464a448c036048b03d4de646b53d00_NeikiAnalytics.exe 29 PID 2124 wrote to memory of 2628 2124 MSWDM.EXE 30 PID 2124 wrote to memory of 2628 2124 MSWDM.EXE 30 PID 2124 wrote to memory of 2628 2124 MSWDM.EXE 30 PID 2124 wrote to memory of 2628 2124 MSWDM.EXE 30 PID 2124 wrote to memory of 2748 2124 MSWDM.EXE 32 PID 2124 wrote to memory of 2748 2124 MSWDM.EXE 32 PID 2124 wrote to memory of 2748 2124 MSWDM.EXE 32 PID 2124 wrote to memory of 2748 2124 MSWDM.EXE 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\0c464a448c036048b03d4de646b53d00_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\0c464a448c036048b03d4de646b53d00_NeikiAnalytics.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2740 -
C:\WINDOWS\MSWDM.EXE"C:\WINDOWS\MSWDM.EXE"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:1624
-
-
C:\WINDOWS\MSWDM.EXE-r!C:\Windows\dev8F54.tmp!C:\Users\Admin\AppData\Local\Temp\0c464a448c036048b03d4de646b53d00_NeikiAnalytics.exe! !2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2124 -
C:\Users\Admin\AppData\Local\Temp\0C464A448C036048B03D4DE646B53D00_NEIKIANALYTICS.EXE
- Executes dropped EXE
PID:2628
-
-
C:\WINDOWS\MSWDM.EXE-e!C:\Windows\dev8F54.tmp!C:\Users\Admin\AppData\Local\Temp\0C464A448C036048B03D4DE646B53D00_NEIKIANALYTICS.EXE!3⤵
- Executes dropped EXE
PID:2748
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
80KB
MD513d7475c94c1be47526b243ed701cec1
SHA1a3f97029f873760eafa6f3b964ded133fe18740b
SHA256b4bbd0d29ce885ecc7b064be42d4d9786b9388ce400fabbe3ca24c3705f8c7ae
SHA512aa228848b35e42d96896d6cd57b2dce896d36fd87815e67d290cbc2cfaf64da7ecafbb28d2a6ff99ea953de675290c2211904ff4160f85c39ee3cbfdaddd113f
-
Filesize
458KB
MD5619f7135621b50fd1900ff24aade1524
SHA16c7ea8bbd435163ae3945cbef30ef6b9872a4591
SHA256344f076bb1211cb02eca9e5ed2c0ce59bcf74ccbc749ec611538fa14ecb9aad2
SHA5122c7293c084d09bc2e3ae2d066dd7b331c810d9e2eeca8b236a8e87fdeb18e877b948747d3491fcaff245816507685250bd35f984c67a43b29b0ae31ecb2bd628