Analysis
-
max time kernel
19s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
16/05/2024, 05:23
Static task
static1
Behavioral task
behavioral1
Sample
a3c6f304b800ed0cc49689708f8b4420_NeikiAnalytics.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
a3c6f304b800ed0cc49689708f8b4420_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
a3c6f304b800ed0cc49689708f8b4420_NeikiAnalytics.exe
-
Size
383KB
-
MD5
a3c6f304b800ed0cc49689708f8b4420
-
SHA1
d5c0ba3c3995d11c2a06d930c59a72f1aab0d1d0
-
SHA256
283adbe8015069cd337da232fa83a9c1835cb74b881bdaed879f57a102250a86
-
SHA512
466aaa27ccc9f82785f27d5a80414edd8bee1b054c8398201b405aef46f6f4dde1ea9f4d3489af2ffb319290d469b33507322319ebaff1fb56be0066d982f2dd
-
SSDEEP
6144:wlj7cMnb+UzU66bkWmchVySqkvAH3qo0wWJC6G/SMT4FWqCb:wlbb+8U66b5zhVymA/XSRhu
Malware Config
Signatures
-
Executes dropped EXE 4 IoCs
pid Process 2308 MSWDM.EXE 2084 MSWDM.EXE 2648 A3C6F304B800ED0CC49689708F8B4420_NEIKIANALYTICS.EXE 2732 MSWDM.EXE -
Loads dropped DLL 1 IoCs
pid Process 2084 MSWDM.EXE -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\WDM = "MSWDM.EXE" a3c6f304b800ed0cc49689708f8b4420_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunServices\WDM = "MSWDM.EXE" a3c6f304b800ed0cc49689708f8b4420_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\WDM = "MSWDM.EXE" MSWDM.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunServices\WDM = "MSWDM.EXE" MSWDM.EXE -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\WINDOWS\MSWDM.EXE a3c6f304b800ed0cc49689708f8b4420_NeikiAnalytics.exe File opened for modification C:\Windows\dev15C2.tmp a3c6f304b800ed0cc49689708f8b4420_NeikiAnalytics.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2084 MSWDM.EXE -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 2108 wrote to memory of 2308 2108 a3c6f304b800ed0cc49689708f8b4420_NeikiAnalytics.exe 29 PID 2108 wrote to memory of 2308 2108 a3c6f304b800ed0cc49689708f8b4420_NeikiAnalytics.exe 29 PID 2108 wrote to memory of 2308 2108 a3c6f304b800ed0cc49689708f8b4420_NeikiAnalytics.exe 29 PID 2108 wrote to memory of 2308 2108 a3c6f304b800ed0cc49689708f8b4420_NeikiAnalytics.exe 29 PID 2108 wrote to memory of 2084 2108 a3c6f304b800ed0cc49689708f8b4420_NeikiAnalytics.exe 30 PID 2108 wrote to memory of 2084 2108 a3c6f304b800ed0cc49689708f8b4420_NeikiAnalytics.exe 30 PID 2108 wrote to memory of 2084 2108 a3c6f304b800ed0cc49689708f8b4420_NeikiAnalytics.exe 30 PID 2108 wrote to memory of 2084 2108 a3c6f304b800ed0cc49689708f8b4420_NeikiAnalytics.exe 30 PID 2084 wrote to memory of 2648 2084 MSWDM.EXE 31 PID 2084 wrote to memory of 2648 2084 MSWDM.EXE 31 PID 2084 wrote to memory of 2648 2084 MSWDM.EXE 31 PID 2084 wrote to memory of 2648 2084 MSWDM.EXE 31 PID 2084 wrote to memory of 2732 2084 MSWDM.EXE 32 PID 2084 wrote to memory of 2732 2084 MSWDM.EXE 32 PID 2084 wrote to memory of 2732 2084 MSWDM.EXE 32 PID 2084 wrote to memory of 2732 2084 MSWDM.EXE 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\a3c6f304b800ed0cc49689708f8b4420_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\a3c6f304b800ed0cc49689708f8b4420_NeikiAnalytics.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2108 -
C:\WINDOWS\MSWDM.EXE"C:\WINDOWS\MSWDM.EXE"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:2308
-
-
C:\WINDOWS\MSWDM.EXE-r!C:\Windows\dev15C2.tmp!C:\Users\Admin\AppData\Local\Temp\a3c6f304b800ed0cc49689708f8b4420_NeikiAnalytics.exe! !2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2084 -
C:\Users\Admin\AppData\Local\Temp\A3C6F304B800ED0CC49689708F8B4420_NEIKIANALYTICS.EXE
- Executes dropped EXE
PID:2648
-
-
C:\WINDOWS\MSWDM.EXE-e!C:\Windows\dev15C2.tmp!C:\Users\Admin\AppData\Local\Temp\A3C6F304B800ED0CC49689708F8B4420_NEIKIANALYTICS.EXE!3⤵
- Executes dropped EXE
PID:2732
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
47KB
MD5e232e754f601471d0aebcb1a45529cc9
SHA18371dd957e9d81df57ceacd6235e77a15e511659
SHA2562f9a865d6d559a837567f5234e5491cdbf0eefa186b9452e36414c5acd18085b
SHA512fb9898459d2814b446ba7edd03566d6c4ff411f75854cc5d18f0f5f186a3c45a2bebc78d8b4a886bb0b3a9b917182a0aeeb64b3112eb1ec7b52bef8ea2a9ddc5
-
Filesize
335KB
MD540ac62c087648ccc2c58dae066d34c98
SHA10e87efb6ddfe59e534ea9e829cad35be8563e5f7
SHA256482c4c1562490e164d5f17990253373691aa5eab55a81c7f890fe9583a9ea916
SHA5120c1ff13ff88409d54fee2ceb07fe65135ce2a9aa6f8da51ac0158abb2cfbb3a898ef26f476931986f1367622f21a7c0b0e742d0f4de8be6e215596b0d88c518f