Analysis

  • max time kernel
    23s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    16/05/2024, 05:23

General

  • Target

    a3c6f304b800ed0cc49689708f8b4420_NeikiAnalytics.exe

  • Size

    383KB

  • MD5

    a3c6f304b800ed0cc49689708f8b4420

  • SHA1

    d5c0ba3c3995d11c2a06d930c59a72f1aab0d1d0

  • SHA256

    283adbe8015069cd337da232fa83a9c1835cb74b881bdaed879f57a102250a86

  • SHA512

    466aaa27ccc9f82785f27d5a80414edd8bee1b054c8398201b405aef46f6f4dde1ea9f4d3489af2ffb319290d469b33507322319ebaff1fb56be0066d982f2dd

  • SSDEEP

    6144:wlj7cMnb+UzU66bkWmchVySqkvAH3qo0wWJC6G/SMT4FWqCb:wlbb+8U66b5zhVymA/XSRhu

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 4 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Drops file in Windows directory 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a3c6f304b800ed0cc49689708f8b4420_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\a3c6f304b800ed0cc49689708f8b4420_NeikiAnalytics.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    PID:1624
    • C:\WINDOWS\MSWDM.EXE
      "C:\WINDOWS\MSWDM.EXE"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      PID:2748
    • C:\WINDOWS\MSWDM.EXE
      -r!C:\Windows\dev46AE.tmp!C:\Users\Admin\AppData\Local\Temp\a3c6f304b800ed0cc49689708f8b4420_NeikiAnalytics.exe! !
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:3576
      • C:\Users\Admin\AppData\Local\Temp\A3C6F304B800ED0CC49689708F8B4420_NEIKIANALYTICS.EXE
        3⤵
        • Executes dropped EXE
        PID:2924
      • C:\WINDOWS\MSWDM.EXE
        -e!C:\Windows\dev46AE.tmp!C:\Users\Admin\AppData\Local\Temp\A3C6F304B800ED0CC49689708F8B4420_NEIKIANALYTICS.EXE!
        3⤵
        • Executes dropped EXE
        • Drops file in Windows directory
        PID:3992

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\A3C6F304B800ED0CC49689708F8B4420_NEIKIANALYTICS.EXE

          Filesize

          383KB

          MD5

          694acafd1af12e73dfd86e4e8635a884

          SHA1

          6094ff7d6ae99287d01d2c11ad3f5c5783383397

          SHA256

          790b2d79f308032341603b8f15a951c76d80b5fee96d7b126b7c34baa8ea8408

          SHA512

          16fca15f6d483e7d76ee204721b0567cf00fb6893325b6b24567d08016ed3b1a36c9c1f97f14f360342af4677155a6946e9c3dbc1ccc8051dba5a8f08a7a988c

        • C:\Windows\MSWDM.EXE

          Filesize

          47KB

          MD5

          e232e754f601471d0aebcb1a45529cc9

          SHA1

          8371dd957e9d81df57ceacd6235e77a15e511659

          SHA256

          2f9a865d6d559a837567f5234e5491cdbf0eefa186b9452e36414c5acd18085b

          SHA512

          fb9898459d2814b446ba7edd03566d6c4ff411f75854cc5d18f0f5f186a3c45a2bebc78d8b4a886bb0b3a9b917182a0aeeb64b3112eb1ec7b52bef8ea2a9ddc5

        • C:\Windows\dev46AE.tmp

          Filesize

          335KB

          MD5

          40ac62c087648ccc2c58dae066d34c98

          SHA1

          0e87efb6ddfe59e534ea9e829cad35be8563e5f7

          SHA256

          482c4c1562490e164d5f17990253373691aa5eab55a81c7f890fe9583a9ea916

          SHA512

          0c1ff13ff88409d54fee2ceb07fe65135ce2a9aa6f8da51ac0158abb2cfbb3a898ef26f476931986f1367622f21a7c0b0e742d0f4de8be6e215596b0d88c518f

        • memory/1624-0-0x0000000000400000-0x000000000041B000-memory.dmp

          Filesize

          108KB

        • memory/1624-10-0x0000000000400000-0x000000000041B000-memory.dmp

          Filesize

          108KB

        • memory/2748-9-0x0000000000400000-0x000000000041B000-memory.dmp

          Filesize

          108KB

        • memory/2748-25-0x0000000000540000-0x0000000000546000-memory.dmp

          Filesize

          24KB

        • memory/2748-24-0x0000000000400000-0x000000000041B000-memory.dmp

          Filesize

          108KB

        • memory/3576-23-0x0000000000400000-0x000000000041B000-memory.dmp

          Filesize

          108KB

        • memory/3992-20-0x0000000000400000-0x000000000041B000-memory.dmp

          Filesize

          108KB