Analysis
-
max time kernel
29s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
15/05/2024, 16:33
Static task
static1
Behavioral task
behavioral1
Sample
015c78261a5aff35697a9b41e0b12310_NeikiAnalytics.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
015c78261a5aff35697a9b41e0b12310_NeikiAnalytics.exe
Resource
win10v2004-20240426-en
General
-
Target
015c78261a5aff35697a9b41e0b12310_NeikiAnalytics.exe
-
Size
538KB
-
MD5
015c78261a5aff35697a9b41e0b12310
-
SHA1
7a4514a1ecefd1e115238a53954c33c391c52c38
-
SHA256
104bcbbeabd142192b893dd6da69fcc9f1b0f06072cebf42ec7a016856229cb5
-
SHA512
6195ed73f9e4c40538d369d6b6d4dbef58c5538a37a2528a647c882e25d6e65c6dd43cbab26bfb3de947cde30149a919b7448f85aaa23b15e7ad19cf79b2960a
-
SSDEEP
12288:wlbN+h1gL5pRTcAkS/3hzN8qE43fm78Vt:WbN+w5jcAkSYqyEt
Malware Config
Signatures
-
Executes dropped EXE 4 IoCs
pid Process 1236 MSWDM.EXE 3468 MSWDM.EXE 3684 015C78261A5AFF35697A9B41E0B12310_NEIKIANALYTICS.EXE 4084 MSWDM.EXE -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\WDM = "MSWDM.EXE" 015c78261a5aff35697a9b41e0b12310_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunServices\WDM = "MSWDM.EXE" 015c78261a5aff35697a9b41e0b12310_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\WDM = "MSWDM.EXE" MSWDM.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunServices\WDM = "MSWDM.EXE" MSWDM.EXE -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\WINDOWS\MSWDM.EXE 015c78261a5aff35697a9b41e0b12310_NeikiAnalytics.exe File opened for modification C:\Windows\dev2FF9.tmp 015c78261a5aff35697a9b41e0b12310_NeikiAnalytics.exe File opened for modification C:\Windows\dev2FF9.tmp MSWDM.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3468 MSWDM.EXE 3468 MSWDM.EXE -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 6100 wrote to memory of 1236 6100 015c78261a5aff35697a9b41e0b12310_NeikiAnalytics.exe 82 PID 6100 wrote to memory of 1236 6100 015c78261a5aff35697a9b41e0b12310_NeikiAnalytics.exe 82 PID 6100 wrote to memory of 1236 6100 015c78261a5aff35697a9b41e0b12310_NeikiAnalytics.exe 82 PID 6100 wrote to memory of 3468 6100 015c78261a5aff35697a9b41e0b12310_NeikiAnalytics.exe 83 PID 6100 wrote to memory of 3468 6100 015c78261a5aff35697a9b41e0b12310_NeikiAnalytics.exe 83 PID 6100 wrote to memory of 3468 6100 015c78261a5aff35697a9b41e0b12310_NeikiAnalytics.exe 83 PID 3468 wrote to memory of 3684 3468 MSWDM.EXE 84 PID 3468 wrote to memory of 3684 3468 MSWDM.EXE 84 PID 3468 wrote to memory of 4084 3468 MSWDM.EXE 86 PID 3468 wrote to memory of 4084 3468 MSWDM.EXE 86 PID 3468 wrote to memory of 4084 3468 MSWDM.EXE 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\015c78261a5aff35697a9b41e0b12310_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\015c78261a5aff35697a9b41e0b12310_NeikiAnalytics.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:6100 -
C:\WINDOWS\MSWDM.EXE"C:\WINDOWS\MSWDM.EXE"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:1236
-
-
C:\WINDOWS\MSWDM.EXE-r!C:\Windows\dev2FF9.tmp!C:\Users\Admin\AppData\Local\Temp\015c78261a5aff35697a9b41e0b12310_NeikiAnalytics.exe! !2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3468 -
C:\Users\Admin\AppData\Local\Temp\015C78261A5AFF35697A9B41E0B12310_NEIKIANALYTICS.EXE
- Executes dropped EXE
PID:3684
-
-
C:\WINDOWS\MSWDM.EXE-e!C:\Windows\dev2FF9.tmp!C:\Users\Admin\AppData\Local\Temp\015C78261A5AFF35697A9B41E0B12310_NEIKIANALYTICS.EXE!3⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:4084
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
538KB
MD5554e83db9377564dc0b2d9bb886425b1
SHA12e01b622d2c1a258b2a926f1a25332940260351a
SHA256fbac7bc0ca983e460aab7b317dc39053bf9d108b2a06ba09fd2c2b3116240568
SHA512974d27b093d80cdc28953b8fa5b624eba3fb9b6d179f4adb700c9303f12bd5406da4611993b2ff9333f37e0676c0a7ee1b2835599be22572e6376a6d279a9c1d
-
Filesize
80KB
MD5c7b53fa4695b7a6d9be255d82065dba6
SHA1bcc4c62ed9ddfcb35540101bdbef308e57c27810
SHA256f67f5ecd4f2bef24ed1ac171eeec3daaae3c33ac0f4e34266e7e98b75b63be30
SHA51275827dd0728112c6f5e550c59e0968e6e40f7fc7c3ca896308a56500d863adb3690c87c649728ed2cae9537309dd78e75aa682acd790a7455df3e0384309c273
-
Filesize
458KB
MD5619f7135621b50fd1900ff24aade1524
SHA16c7ea8bbd435163ae3945cbef30ef6b9872a4591
SHA256344f076bb1211cb02eca9e5ed2c0ce59bcf74ccbc749ec611538fa14ecb9aad2
SHA5122c7293c084d09bc2e3ae2d066dd7b331c810d9e2eeca8b236a8e87fdeb18e877b948747d3491fcaff245816507685250bd35f984c67a43b29b0ae31ecb2bd628