Analysis
-
max time kernel
19s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
15/05/2024, 16:33
Static task
static1
Behavioral task
behavioral1
Sample
015c78261a5aff35697a9b41e0b12310_NeikiAnalytics.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
015c78261a5aff35697a9b41e0b12310_NeikiAnalytics.exe
Resource
win10v2004-20240426-en
General
-
Target
015c78261a5aff35697a9b41e0b12310_NeikiAnalytics.exe
-
Size
538KB
-
MD5
015c78261a5aff35697a9b41e0b12310
-
SHA1
7a4514a1ecefd1e115238a53954c33c391c52c38
-
SHA256
104bcbbeabd142192b893dd6da69fcc9f1b0f06072cebf42ec7a016856229cb5
-
SHA512
6195ed73f9e4c40538d369d6b6d4dbef58c5538a37a2528a647c882e25d6e65c6dd43cbab26bfb3de947cde30149a919b7448f85aaa23b15e7ad19cf79b2960a
-
SSDEEP
12288:wlbN+h1gL5pRTcAkS/3hzN8qE43fm78Vt:WbN+w5jcAkSYqyEt
Malware Config
Signatures
-
Executes dropped EXE 5 IoCs
pid Process 1956 MSWDM.EXE 2184 MSWDM.EXE 2540 015C78261A5AFF35697A9B41E0B12310_NEIKIANALYTICS.EXE 1216 Process not Found 2652 MSWDM.EXE -
Loads dropped DLL 2 IoCs
pid Process 2184 MSWDM.EXE 2612 Process not Found -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\WDM = "MSWDM.EXE" 015c78261a5aff35697a9b41e0b12310_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunServices\WDM = "MSWDM.EXE" 015c78261a5aff35697a9b41e0b12310_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\WDM = "MSWDM.EXE" MSWDM.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunServices\WDM = "MSWDM.EXE" MSWDM.EXE -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\WINDOWS\MSWDM.EXE 015c78261a5aff35697a9b41e0b12310_NeikiAnalytics.exe File opened for modification C:\Windows\dev195A.tmp 015c78261a5aff35697a9b41e0b12310_NeikiAnalytics.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2184 MSWDM.EXE -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 3028 wrote to memory of 1956 3028 015c78261a5aff35697a9b41e0b12310_NeikiAnalytics.exe 28 PID 3028 wrote to memory of 1956 3028 015c78261a5aff35697a9b41e0b12310_NeikiAnalytics.exe 28 PID 3028 wrote to memory of 1956 3028 015c78261a5aff35697a9b41e0b12310_NeikiAnalytics.exe 28 PID 3028 wrote to memory of 1956 3028 015c78261a5aff35697a9b41e0b12310_NeikiAnalytics.exe 28 PID 3028 wrote to memory of 2184 3028 015c78261a5aff35697a9b41e0b12310_NeikiAnalytics.exe 29 PID 3028 wrote to memory of 2184 3028 015c78261a5aff35697a9b41e0b12310_NeikiAnalytics.exe 29 PID 3028 wrote to memory of 2184 3028 015c78261a5aff35697a9b41e0b12310_NeikiAnalytics.exe 29 PID 3028 wrote to memory of 2184 3028 015c78261a5aff35697a9b41e0b12310_NeikiAnalytics.exe 29 PID 2184 wrote to memory of 2540 2184 MSWDM.EXE 30 PID 2184 wrote to memory of 2540 2184 MSWDM.EXE 30 PID 2184 wrote to memory of 2540 2184 MSWDM.EXE 30 PID 2184 wrote to memory of 2540 2184 MSWDM.EXE 30 PID 2184 wrote to memory of 2652 2184 MSWDM.EXE 32 PID 2184 wrote to memory of 2652 2184 MSWDM.EXE 32 PID 2184 wrote to memory of 2652 2184 MSWDM.EXE 32 PID 2184 wrote to memory of 2652 2184 MSWDM.EXE 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\015c78261a5aff35697a9b41e0b12310_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\015c78261a5aff35697a9b41e0b12310_NeikiAnalytics.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:3028 -
C:\WINDOWS\MSWDM.EXE"C:\WINDOWS\MSWDM.EXE"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:1956
-
-
C:\WINDOWS\MSWDM.EXE-r!C:\Windows\dev195A.tmp!C:\Users\Admin\AppData\Local\Temp\015c78261a5aff35697a9b41e0b12310_NeikiAnalytics.exe! !2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2184 -
C:\Users\Admin\AppData\Local\Temp\015C78261A5AFF35697A9B41E0B12310_NEIKIANALYTICS.EXE
- Executes dropped EXE
PID:2540
-
-
C:\WINDOWS\MSWDM.EXE-e!C:\Windows\dev195A.tmp!C:\Users\Admin\AppData\Local\Temp\015C78261A5AFF35697A9B41E0B12310_NEIKIANALYTICS.EXE!3⤵
- Executes dropped EXE
PID:2652
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
80KB
MD5c7b53fa4695b7a6d9be255d82065dba6
SHA1bcc4c62ed9ddfcb35540101bdbef308e57c27810
SHA256f67f5ecd4f2bef24ed1ac171eeec3daaae3c33ac0f4e34266e7e98b75b63be30
SHA51275827dd0728112c6f5e550c59e0968e6e40f7fc7c3ca896308a56500d863adb3690c87c649728ed2cae9537309dd78e75aa682acd790a7455df3e0384309c273
-
Filesize
458KB
MD5619f7135621b50fd1900ff24aade1524
SHA16c7ea8bbd435163ae3945cbef30ef6b9872a4591
SHA256344f076bb1211cb02eca9e5ed2c0ce59bcf74ccbc749ec611538fa14ecb9aad2
SHA5122c7293c084d09bc2e3ae2d066dd7b331c810d9e2eeca8b236a8e87fdeb18e877b948747d3491fcaff245816507685250bd35f984c67a43b29b0ae31ecb2bd628