Analysis

  • max time kernel
    22s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    17-05-2024 03:50

General

  • Target

    9e89ff2aa39f7488a3b060c7c8570d10_NeikiAnalytics.exe

  • Size

    212KB

  • MD5

    9e89ff2aa39f7488a3b060c7c8570d10

  • SHA1

    e80d3c8688b7a0db16f938831b42f1b51f60be40

  • SHA256

    227eafc1379561f2bbabacf94a0861f749e6274d78ddb92f52aaf6eea3da512f

  • SHA512

    8718c49ca46b20cd446c4f2da38d709fa2ac79721275cd6052ddfffd07948902e263ae6ed9a70004911a612298f2ce6754ec0f28e7157fbf1a6314bce5148fd9

  • SSDEEP

    3072:uTCDYDg+vr87rnj3WCW2EW51HKKn4AYrBkfkT5xHzR:IooZIFH5n8aQt9

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 1 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Drops file in Windows directory 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9e89ff2aa39f7488a3b060c7c8570d10_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\9e89ff2aa39f7488a3b060c7c8570d10_NeikiAnalytics.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    PID:1700
    • C:\WINDOWS\MSWDM.EXE
      "C:\WINDOWS\MSWDM.EXE"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      PID:2804
    • C:\WINDOWS\MSWDM.EXE
      -r!C:\Windows\dev1BDA.tmp!C:\Users\Admin\AppData\Local\Temp\9e89ff2aa39f7488a3b060c7c8570d10_NeikiAnalytics.exe! !
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:2216
      • C:\Users\Admin\AppData\Local\Temp\9E89FF2AA39F7488A3B060C7C8570D10_NEIKIANALYTICS.EXE
        3⤵
        • Executes dropped EXE
        PID:2092
      • C:\WINDOWS\MSWDM.EXE
        -e!C:\Windows\dev1BDA.tmp!C:\Users\Admin\AppData\Local\Temp\9E89FF2AA39F7488A3B060C7C8570D10_NEIKIANALYTICS.EXE!
        3⤵
        • Executes dropped EXE
        • Drops file in Windows directory
        PID:2756

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\9E89FF2AA39F7488A3B060C7C8570D10_NEIKIANALYTICS.EXE

    Filesize

    212KB

    MD5

    4238f0ecb791bd8e2481506d6c30f240

    SHA1

    a04a666604dd9ce0c249699f36cc189f02e9624f

    SHA256

    ee3f423b572bc1a8000c0e1340ca952bfe6f938704c16b28ff5106ff8186759f

    SHA512

    581ebd3dce47b630eabda25cdc590d40c4e7227aad48a04dcc71a9d72e3fa71523a9a65e6731d0beb4817984dc001314ce362be754b2d4b2ded1334c37752dd2

  • C:\Windows\MSWDM.EXE

    Filesize

    176KB

    MD5

    8a351d3a4fdac918dccdbcb21c60b59c

    SHA1

    bdf5b7d41c4d62fbb23f71e9d7f7a4b9d7c4815a

    SHA256

    7c5d7b0369ef97f79d2a0492f2fc9f1e784f3f3317bd375c03bf0bf071673c95

    SHA512

    761a6aa05f6cf9892b839069eb298a5d3eec0e2e9dc0b287f05c38c984c388b7ce1e4adf9f371afabf342b3b38ba8814492eab3da2421597589f88ff338f2d2a

  • C:\Windows\dev1BDA.tmp

    Filesize

    36KB

    MD5

    9f498971cbe636662f3d210747d619e1

    SHA1

    44b8e2732fa1e2f204fc70eaa1cb406616250085

    SHA256

    8adf6748981c3e7b62f5dbca992be6675574fffbce7673743f2d7fe787d56a41

    SHA512

    b73083c2f7b028d2946cb8f7b4fe2289fedaa4175364a2aac37db0aeff4602aede772ccc9eba7e6dcfcb7276e52604ca45d8021952201b5834485b48bca3dc93

  • memory/1700-8-0x00000000002E0000-0x000000000030C000-memory.dmp

    Filesize

    176KB

  • memory/1700-14-0x0000000000400000-0x000000000042C000-memory.dmp

    Filesize

    176KB

  • memory/1700-9-0x00000000002E0000-0x000000000030C000-memory.dmp

    Filesize

    176KB

  • memory/1700-0-0x0000000000400000-0x000000000042C000-memory.dmp

    Filesize

    176KB

  • memory/2216-30-0x0000000000400000-0x000000000042C000-memory.dmp

    Filesize

    176KB

  • memory/2216-27-0x0000000000280000-0x00000000002AC000-memory.dmp

    Filesize

    176KB

  • memory/2756-29-0x0000000000400000-0x000000000042C000-memory.dmp

    Filesize

    176KB

  • memory/2756-32-0x0000000000400000-0x000000000042C000-memory.dmp

    Filesize

    176KB

  • memory/2804-16-0x0000000000400000-0x000000000042C000-memory.dmp

    Filesize

    176KB

  • memory/2804-31-0x0000000000400000-0x000000000042C000-memory.dmp

    Filesize

    176KB