Analysis
-
max time kernel
17s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
14/05/2024, 20:29
Static task
static1
Behavioral task
behavioral1
Sample
20004d912731944039abb3b59924c1c0_NeikiAnalytics.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
20004d912731944039abb3b59924c1c0_NeikiAnalytics.exe
Resource
win10v2004-20240426-en
General
-
Target
20004d912731944039abb3b59924c1c0_NeikiAnalytics.exe
-
Size
383KB
-
MD5
20004d912731944039abb3b59924c1c0
-
SHA1
2021b1331474eb0493edbc278da4bdc95841b08c
-
SHA256
595ffcae3434cde9adf835c66b14e92d5c11b53095bcca7cc5aebc799727afea
-
SHA512
9c6afb74dc9d5a2991933e7694381640a579b1753da6179cfae3178db333576c14b5a47814ba06e2248ae51c80a8d86d7c44ccdd7e513e1c62162c8c2570bf58
-
SSDEEP
6144:wlj7cMno+UzU66bkWmchVySqkvAH3qo0wWJC6G/SMT4FWqCD:wlbo+8U66b5zhVymA/XSRh+
Malware Config
Signatures
-
Executes dropped EXE 4 IoCs
pid Process 2232 MSWDM.EXE 2504 MSWDM.EXE 2672 20004D912731944039ABB3B59924C1C0_NEIKIANALYTICS.EXE 2560 MSWDM.EXE -
Loads dropped DLL 1 IoCs
pid Process 2504 MSWDM.EXE -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunServices\WDM = "MSWDM.EXE" MSWDM.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\WDM = "MSWDM.EXE" 20004d912731944039abb3b59924c1c0_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunServices\WDM = "MSWDM.EXE" 20004d912731944039abb3b59924c1c0_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\WDM = "MSWDM.EXE" MSWDM.EXE -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\WINDOWS\MSWDM.EXE 20004d912731944039abb3b59924c1c0_NeikiAnalytics.exe File opened for modification C:\Windows\dev6B5.tmp 20004d912731944039abb3b59924c1c0_NeikiAnalytics.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2504 MSWDM.EXE -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 2868 wrote to memory of 2232 2868 20004d912731944039abb3b59924c1c0_NeikiAnalytics.exe 28 PID 2868 wrote to memory of 2232 2868 20004d912731944039abb3b59924c1c0_NeikiAnalytics.exe 28 PID 2868 wrote to memory of 2232 2868 20004d912731944039abb3b59924c1c0_NeikiAnalytics.exe 28 PID 2868 wrote to memory of 2232 2868 20004d912731944039abb3b59924c1c0_NeikiAnalytics.exe 28 PID 2868 wrote to memory of 2504 2868 20004d912731944039abb3b59924c1c0_NeikiAnalytics.exe 29 PID 2868 wrote to memory of 2504 2868 20004d912731944039abb3b59924c1c0_NeikiAnalytics.exe 29 PID 2868 wrote to memory of 2504 2868 20004d912731944039abb3b59924c1c0_NeikiAnalytics.exe 29 PID 2868 wrote to memory of 2504 2868 20004d912731944039abb3b59924c1c0_NeikiAnalytics.exe 29 PID 2504 wrote to memory of 2672 2504 MSWDM.EXE 30 PID 2504 wrote to memory of 2672 2504 MSWDM.EXE 30 PID 2504 wrote to memory of 2672 2504 MSWDM.EXE 30 PID 2504 wrote to memory of 2672 2504 MSWDM.EXE 30 PID 2504 wrote to memory of 2560 2504 MSWDM.EXE 31 PID 2504 wrote to memory of 2560 2504 MSWDM.EXE 31 PID 2504 wrote to memory of 2560 2504 MSWDM.EXE 31 PID 2504 wrote to memory of 2560 2504 MSWDM.EXE 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\20004d912731944039abb3b59924c1c0_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\20004d912731944039abb3b59924c1c0_NeikiAnalytics.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2868 -
C:\WINDOWS\MSWDM.EXE"C:\WINDOWS\MSWDM.EXE"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:2232
-
-
C:\WINDOWS\MSWDM.EXE-r!C:\Windows\dev6B5.tmp!C:\Users\Admin\AppData\Local\Temp\20004d912731944039abb3b59924c1c0_NeikiAnalytics.exe! !2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2504 -
C:\Users\Admin\AppData\Local\Temp\20004D912731944039ABB3B59924C1C0_NEIKIANALYTICS.EXE
- Executes dropped EXE
PID:2672
-
-
C:\WINDOWS\MSWDM.EXE-e!C:\Windows\dev6B5.tmp!C:\Users\Admin\AppData\Local\Temp\20004D912731944039ABB3B59924C1C0_NEIKIANALYTICS.EXE!3⤵
- Executes dropped EXE
PID:2560
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
47KB
MD555574ce5c8b1f90e95ee5452f6fac426
SHA1f4e6c7c498421da62b6931d15269e2015a332674
SHA2563f6ac2262c3afa4d51362ff7dcaa584d5f225eccaa5a352a09ff43b767458133
SHA51243db564fa3a751cf1dfc95770623365638f6771eb09c3efa7e478c5610db8809700783391e7944ecc660ad288b4e4f18047a07995b6e322bc957ea510c055b62
-
Filesize
335KB
MD540ac62c087648ccc2c58dae066d34c98
SHA10e87efb6ddfe59e534ea9e829cad35be8563e5f7
SHA256482c4c1562490e164d5f17990253373691aa5eab55a81c7f890fe9583a9ea916
SHA5120c1ff13ff88409d54fee2ceb07fe65135ce2a9aa6f8da51ac0158abb2cfbb3a898ef26f476931986f1367622f21a7c0b0e742d0f4de8be6e215596b0d88c518f