Analysis
-
max time kernel
23s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
16/05/2024, 05:23
Static task
static1
Behavioral task
behavioral1
Sample
a3c6f304b800ed0cc49689708f8b4420_NeikiAnalytics.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
a3c6f304b800ed0cc49689708f8b4420_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
a3c6f304b800ed0cc49689708f8b4420_NeikiAnalytics.exe
-
Size
383KB
-
MD5
a3c6f304b800ed0cc49689708f8b4420
-
SHA1
d5c0ba3c3995d11c2a06d930c59a72f1aab0d1d0
-
SHA256
283adbe8015069cd337da232fa83a9c1835cb74b881bdaed879f57a102250a86
-
SHA512
466aaa27ccc9f82785f27d5a80414edd8bee1b054c8398201b405aef46f6f4dde1ea9f4d3489af2ffb319290d469b33507322319ebaff1fb56be0066d982f2dd
-
SSDEEP
6144:wlj7cMnb+UzU66bkWmchVySqkvAH3qo0wWJC6G/SMT4FWqCb:wlbb+8U66b5zhVymA/XSRhu
Malware Config
Signatures
-
Executes dropped EXE 4 IoCs
pid Process 2748 MSWDM.EXE 3576 MSWDM.EXE 2924 A3C6F304B800ED0CC49689708F8B4420_NEIKIANALYTICS.EXE 3992 MSWDM.EXE -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\WDM = "MSWDM.EXE" MSWDM.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunServices\WDM = "MSWDM.EXE" MSWDM.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\WDM = "MSWDM.EXE" a3c6f304b800ed0cc49689708f8b4420_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunServices\WDM = "MSWDM.EXE" a3c6f304b800ed0cc49689708f8b4420_NeikiAnalytics.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\WINDOWS\MSWDM.EXE a3c6f304b800ed0cc49689708f8b4420_NeikiAnalytics.exe File opened for modification C:\Windows\dev46AE.tmp a3c6f304b800ed0cc49689708f8b4420_NeikiAnalytics.exe File opened for modification C:\Windows\dev46AE.tmp MSWDM.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3576 MSWDM.EXE 3576 MSWDM.EXE -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 1624 wrote to memory of 2748 1624 a3c6f304b800ed0cc49689708f8b4420_NeikiAnalytics.exe 83 PID 1624 wrote to memory of 2748 1624 a3c6f304b800ed0cc49689708f8b4420_NeikiAnalytics.exe 83 PID 1624 wrote to memory of 2748 1624 a3c6f304b800ed0cc49689708f8b4420_NeikiAnalytics.exe 83 PID 1624 wrote to memory of 3576 1624 a3c6f304b800ed0cc49689708f8b4420_NeikiAnalytics.exe 84 PID 1624 wrote to memory of 3576 1624 a3c6f304b800ed0cc49689708f8b4420_NeikiAnalytics.exe 84 PID 1624 wrote to memory of 3576 1624 a3c6f304b800ed0cc49689708f8b4420_NeikiAnalytics.exe 84 PID 3576 wrote to memory of 2924 3576 MSWDM.EXE 85 PID 3576 wrote to memory of 2924 3576 MSWDM.EXE 85 PID 3576 wrote to memory of 3992 3576 MSWDM.EXE 86 PID 3576 wrote to memory of 3992 3576 MSWDM.EXE 86 PID 3576 wrote to memory of 3992 3576 MSWDM.EXE 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\a3c6f304b800ed0cc49689708f8b4420_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\a3c6f304b800ed0cc49689708f8b4420_NeikiAnalytics.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1624 -
C:\WINDOWS\MSWDM.EXE"C:\WINDOWS\MSWDM.EXE"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:2748
-
-
C:\WINDOWS\MSWDM.EXE-r!C:\Windows\dev46AE.tmp!C:\Users\Admin\AppData\Local\Temp\a3c6f304b800ed0cc49689708f8b4420_NeikiAnalytics.exe! !2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3576 -
C:\Users\Admin\AppData\Local\Temp\A3C6F304B800ED0CC49689708F8B4420_NEIKIANALYTICS.EXE
- Executes dropped EXE
PID:2924
-
-
C:\WINDOWS\MSWDM.EXE-e!C:\Windows\dev46AE.tmp!C:\Users\Admin\AppData\Local\Temp\A3C6F304B800ED0CC49689708F8B4420_NEIKIANALYTICS.EXE!3⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:3992
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
383KB
MD5694acafd1af12e73dfd86e4e8635a884
SHA16094ff7d6ae99287d01d2c11ad3f5c5783383397
SHA256790b2d79f308032341603b8f15a951c76d80b5fee96d7b126b7c34baa8ea8408
SHA51216fca15f6d483e7d76ee204721b0567cf00fb6893325b6b24567d08016ed3b1a36c9c1f97f14f360342af4677155a6946e9c3dbc1ccc8051dba5a8f08a7a988c
-
Filesize
47KB
MD5e232e754f601471d0aebcb1a45529cc9
SHA18371dd957e9d81df57ceacd6235e77a15e511659
SHA2562f9a865d6d559a837567f5234e5491cdbf0eefa186b9452e36414c5acd18085b
SHA512fb9898459d2814b446ba7edd03566d6c4ff411f75854cc5d18f0f5f186a3c45a2bebc78d8b4a886bb0b3a9b917182a0aeeb64b3112eb1ec7b52bef8ea2a9ddc5
-
Filesize
335KB
MD540ac62c087648ccc2c58dae066d34c98
SHA10e87efb6ddfe59e534ea9e829cad35be8563e5f7
SHA256482c4c1562490e164d5f17990253373691aa5eab55a81c7f890fe9583a9ea916
SHA5120c1ff13ff88409d54fee2ceb07fe65135ce2a9aa6f8da51ac0158abb2cfbb3a898ef26f476931986f1367622f21a7c0b0e742d0f4de8be6e215596b0d88c518f