Analysis
-
max time kernel
26s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
16/05/2024, 09:32
Static task
static1
Behavioral task
behavioral1
Sample
d5489e3013939afb7c4570c909ca23c0_NeikiAnalytics.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
d5489e3013939afb7c4570c909ca23c0_NeikiAnalytics.exe
Resource
win10v2004-20240426-en
General
-
Target
d5489e3013939afb7c4570c909ca23c0_NeikiAnalytics.exe
-
Size
83KB
-
MD5
d5489e3013939afb7c4570c909ca23c0
-
SHA1
1c66a2f069faf583bd04059613b00b88f1bbe554
-
SHA256
6c7e95d20191da61dc8d7f81693a4b1d321b1de05a6559aa50e5397758f9bace
-
SHA512
da68e97977479e62b6fd6288eceeee845be7b5a0f999ee5ca26189993c08c0f4d44be614701d9a8f57ff64fab10e1546592238b870280306f3cc0f786eb29b3b
-
SSDEEP
1536:Hlqls0GgUyj5JxdA4Oj3W2Fsdq4FaG+sSgi9lOkXYLBD7FPxR:HQC/yj5JO3MnaG+1gPkXYLBDlxR
Malware Config
Signatures
-
Executes dropped EXE 4 IoCs
pid Process 2412 MSWDM.EXE 2056 MSWDM.EXE 5008 D5489E3013939AFB7C4570C909CA23C0_NEIKIANALYTICS.EXE 2128 MSWDM.EXE -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunServices\WDM = "MSWDM.EXE" MSWDM.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\WDM = "MSWDM.EXE" d5489e3013939afb7c4570c909ca23c0_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunServices\WDM = "MSWDM.EXE" d5489e3013939afb7c4570c909ca23c0_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\WDM = "MSWDM.EXE" MSWDM.EXE -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\WINDOWS\MSWDM.EXE d5489e3013939afb7c4570c909ca23c0_NeikiAnalytics.exe File opened for modification C:\Windows\dev3345.tmp d5489e3013939afb7c4570c909ca23c0_NeikiAnalytics.exe File opened for modification C:\Windows\dev3345.tmp MSWDM.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2056 MSWDM.EXE 2056 MSWDM.EXE -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 916 wrote to memory of 2412 916 d5489e3013939afb7c4570c909ca23c0_NeikiAnalytics.exe 83 PID 916 wrote to memory of 2412 916 d5489e3013939afb7c4570c909ca23c0_NeikiAnalytics.exe 83 PID 916 wrote to memory of 2412 916 d5489e3013939afb7c4570c909ca23c0_NeikiAnalytics.exe 83 PID 916 wrote to memory of 2056 916 d5489e3013939afb7c4570c909ca23c0_NeikiAnalytics.exe 84 PID 916 wrote to memory of 2056 916 d5489e3013939afb7c4570c909ca23c0_NeikiAnalytics.exe 84 PID 916 wrote to memory of 2056 916 d5489e3013939afb7c4570c909ca23c0_NeikiAnalytics.exe 84 PID 2056 wrote to memory of 5008 2056 MSWDM.EXE 85 PID 2056 wrote to memory of 5008 2056 MSWDM.EXE 85 PID 2056 wrote to memory of 2128 2056 MSWDM.EXE 86 PID 2056 wrote to memory of 2128 2056 MSWDM.EXE 86 PID 2056 wrote to memory of 2128 2056 MSWDM.EXE 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\d5489e3013939afb7c4570c909ca23c0_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\d5489e3013939afb7c4570c909ca23c0_NeikiAnalytics.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:916 -
C:\WINDOWS\MSWDM.EXE"C:\WINDOWS\MSWDM.EXE"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:2412
-
-
C:\WINDOWS\MSWDM.EXE-r!C:\Windows\dev3345.tmp!C:\Users\Admin\AppData\Local\Temp\d5489e3013939afb7c4570c909ca23c0_NeikiAnalytics.exe! !2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2056 -
C:\Users\Admin\AppData\Local\Temp\D5489E3013939AFB7C4570C909CA23C0_NEIKIANALYTICS.EXE
- Executes dropped EXE
PID:5008
-
-
C:\WINDOWS\MSWDM.EXE-e!C:\Windows\dev3345.tmp!C:\Users\Admin\AppData\Local\Temp\D5489E3013939AFB7C4570C909CA23C0_NEIKIANALYTICS.EXE!3⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:2128
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
83KB
MD586e4a0888414e61308febcb42948babd
SHA1f33028ef1f0269f8496a9151c104e2cd2fd5b735
SHA256682076663421c846d688e3eddee8b87bee6671683bd839d798fd463f59486e3d
SHA51211f86f974d4b4d3b1fabaddede643f0ac38cc96df582b9ce4248458abc4b1b2dc15bfed7a4ce9c015afafe529906409e1472189925b5e0e02e657b8c4dea9d81
-
Filesize
47KB
MD50b68b857a7e40217c3dc0fbccd74c48c
SHA18eca09de54246a76db602e9bb2e7447ed8861bae
SHA2568891f8c76109255aff00be5f3ee7fe70a781371158d83f25ebf15d1a0fa7a22c
SHA512eed10fb03056f0760046505b06e378b697821ab37179e751168f1e2c9a92d0f0b318a8189618f9929a8f5b65c4f986dd3fcac5514ce398ee371ade5c8143f9dd
-
Filesize
35KB
MD519e25386a9c5cb66495e0d4be8869822
SHA1a44d071ee432576f7d10917ac33fe84000c67c65
SHA256d56174b1ba2af749549e8140f8e5bec2a1cb5a62f8e7163a0a400852f1d6b926
SHA5122120f0a140329e3f586d4d0e81b83afb6fc4a0728baa4de7421496f4e1a5ec982edfc1e24d72a17df7108eb95e59840b7a3dc3abca9b92a95fd6869cddf5b30b