Analysis

  • max time kernel
    14s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240215-en
  • resource tags

    arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system
  • submitted
    15/05/2024, 15:46

General

  • Target

    d91e21ed3e09a78fdff9e435dc884310_NeikiAnalytics.exe

  • Size

    81KB

  • MD5

    d91e21ed3e09a78fdff9e435dc884310

  • SHA1

    7e8e57e41c285ce32f42ebc888e430ae98fb796c

  • SHA256

    baeaa2b13e7a0cfcda56f53fb323d2af2285c391cc6ed644202d8a682438f645

  • SHA512

    1fb6961350d82bb7958104267590840749af2e5eb06cf5f388ffb3503e550b28740d8dffa4b97f772e2b0df900b70c7237d7eb98303567013b3d3610c3160f53

  • SSDEEP

    1536:Hlqls0GgUyj5JxdA4Oj3W2Fsdq4FwgG+seOBJlZsuHc+fBE0:HQC/yj5JO3MnwgG+HOBDau8+fBN

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Drops file in Windows directory 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d91e21ed3e09a78fdff9e435dc884310_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\d91e21ed3e09a78fdff9e435dc884310_NeikiAnalytics.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    PID:2356
    • C:\WINDOWS\MSWDM.EXE
      "C:\WINDOWS\MSWDM.EXE"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      PID:2740
    • C:\WINDOWS\MSWDM.EXE
      -r!C:\Windows\dev16EA.tmp!C:\Users\Admin\AppData\Local\Temp\d91e21ed3e09a78fdff9e435dc884310_NeikiAnalytics.exe! !
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:1456
      • C:\Users\Admin\AppData\Local\Temp\D91E21ED3E09A78FDFF9E435DC884310_NEIKIANALYTICS.EXE
        3⤵
        • Executes dropped EXE
        PID:2588
      • C:\WINDOWS\MSWDM.EXE
        -e!C:\Windows\dev16EA.tmp!C:\Users\Admin\AppData\Local\Temp\D91E21ED3E09A78FDFF9E435DC884310_NEIKIANALYTICS.EXE!
        3⤵
        • Executes dropped EXE
        • Drops file in Windows directory
        PID:3068

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\D91E21ED3E09A78FDFF9E435DC884310_NEIKIANALYTICS.EXE

    Filesize

    81KB

    MD5

    d10046e5c28993d722c2b5d2f1f8a0be

    SHA1

    2170e751cbf7ceeb46fb29c5de80696928616016

    SHA256

    7778906555706f96e7eaf236796f579baa0ef4fda57b45e2ac43444cd8f55413

    SHA512

    3c01c06f94c49c286ea364f004c8c2d79ae4c160faefe07ff61dae08bf439037d82abc53e29752606f6354e71a2c9f91248a1756c6ae8557fdad9e689c2de825

  • C:\Users\Admin\AppData\Local\Temp\d91e21ed3e09a78fdff9e435dc884310_NeikiAnalytics.exe

    Filesize

    34KB

    MD5

    f521965bf3c3f38dc3df43f0df339e95

    SHA1

    5ab377d59cb07f5d21fbe20418a4e0c9991ed570

    SHA256

    893c8af4fb2456a681b4c8106735323073cbcc7494353a8f0d4b087a4469d2f0

    SHA512

    c02c0593bc17c163a64d179877a47ed7896b1df719caa957c4586d00a42ce3cfbe46355a21a855290e5b5eb0b8566a70a9a35edf7e7ae6deec77f56501cdbdc2

  • C:\Windows\MSWDM.EXE

    Filesize

    47KB

    MD5

    17b789e1d1c2ac8883a68e3fdf6e06b1

    SHA1

    f04386e2facad18e7412954d63079ea4a794457b

    SHA256

    a1bc39e4bbc1a47b5678b2eefe3611bc61dfcb2b93025f8352123cce55a3bd69

    SHA512

    01cb25a97e31da8947669536251215c1df9b8001d774269b17b68244a5516a452e8e540d0c6ea13d58d5fe8833fa7be7007a75d51659bbdb41dc7f3c90141f81

  • memory/1456-24-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/1456-35-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/2356-0-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/2356-12-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/2740-25-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/2740-36-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/3068-32-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB