Analysis

  • max time kernel
    19s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240220-en
  • resource tags

    arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system
  • submitted
    12/05/2024, 15:10

General

  • Target

    22db5a15c863cdfe5f42ab97c3da1a20_NeikiAnalytics.exe

  • Size

    505KB

  • MD5

    22db5a15c863cdfe5f42ab97c3da1a20

  • SHA1

    68e0332a6dac0eeca44accc0ef51919487097166

  • SHA256

    7a09c0f967c48d12407e369c5e4d235eb4ef5c4c69ade05b6198e8a62489a4ca

  • SHA512

    e873980d127a9e7b42086c7b8e37789c1e651245da4d397d042a527a4b05b1238814a7ab751a27476b33a57aa3c7500ba0c71f5d78182d5bd431ed426a00a8db

  • SSDEEP

    12288:wlbL+b1gL5pRTcAkS/3hzN8qE43fm78VR:WbL+G5jcAkSYqyER

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Drops file in Windows directory 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\22db5a15c863cdfe5f42ab97c3da1a20_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\22db5a15c863cdfe5f42ab97c3da1a20_NeikiAnalytics.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    PID:1684
    • C:\WINDOWS\MSWDM.EXE
      "C:\WINDOWS\MSWDM.EXE"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      PID:1904
    • C:\WINDOWS\MSWDM.EXE
      -r!C:\Windows\devA7C.tmp!C:\Users\Admin\AppData\Local\Temp\22db5a15c863cdfe5f42ab97c3da1a20_NeikiAnalytics.exe! !
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:2480
      • C:\Users\Admin\AppData\Local\Temp\22DB5A15C863CDFE5F42AB97C3DA1A20_NEIKIANALYTICS.EXE
        3⤵
        • Executes dropped EXE
        PID:2112
      • C:\WINDOWS\MSWDM.EXE
        -e!C:\Windows\devA7C.tmp!C:\Users\Admin\AppData\Local\Temp\22DB5A15C863CDFE5F42AB97C3DA1A20_NEIKIANALYTICS.EXE!
        3⤵
        • Executes dropped EXE
        PID:2680

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\MSWDM.EXE

    Filesize

    47KB

    MD5

    29c9387f23c164ed635ee6b4b2b243fb

    SHA1

    cf8c961cbedb5aa3e0a9ec9263b7aa62e2939130

    SHA256

    05e9a775c3e39e0ed8fc0d61f3e1da1f40aec50d945aa22b477bf13e1ab9b698

    SHA512

    f39ecc49d8aece2881280996c40393f813fd8929dea46e28bbfb18cb5eb8f6bfa271f2dd71ddeb5cc34d6a4ba94efcb761c0071d6fb2bc40dc0b729cdde65522

  • \Users\Admin\AppData\Local\Temp\22db5a15c863cdfe5f42ab97c3da1a20_NeikiAnalytics.exe

    Filesize

    458KB

    MD5

    619f7135621b50fd1900ff24aade1524

    SHA1

    6c7ea8bbd435163ae3945cbef30ef6b9872a4591

    SHA256

    344f076bb1211cb02eca9e5ed2c0ce59bcf74ccbc749ec611538fa14ecb9aad2

    SHA512

    2c7293c084d09bc2e3ae2d066dd7b331c810d9e2eeca8b236a8e87fdeb18e877b948747d3491fcaff245816507685250bd35f984c67a43b29b0ae31ecb2bd628

  • memory/1684-0-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/1684-12-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/1904-16-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/1904-30-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/2480-14-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/2480-29-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/2680-26-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB