Analysis
-
max time kernel
18s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
17/05/2024, 04:59
Static task
static1
Behavioral task
behavioral1
Sample
ade31c23c289a0775937c77300b55df0_NeikiAnalytics.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
ade31c23c289a0775937c77300b55df0_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
ade31c23c289a0775937c77300b55df0_NeikiAnalytics.exe
-
Size
121KB
-
MD5
ade31c23c289a0775937c77300b55df0
-
SHA1
928afec069b0d3000e6d03dac231fd59a9939909
-
SHA256
ec0e6d7ead55542c37eab0fb6047ed6e620ada368f22aa0cab49e4739d8d292c
-
SHA512
b480f369d9190bbb53a6b2c589f681fff99f0909f8014b366c317804d15137314fc540595e1ac0feffeee2c4238b0fdaa100bb38a856474590dea62a5eafaebd
-
SSDEEP
3072:HQC/yj5JO3MnjG+Hu54Fx4xE8plZQKbgZi1St7xB:wlj7cMn6+OEXAwKbgZz
Malware Config
Signatures
-
Executes dropped EXE 4 IoCs
pid Process 2012 MSWDM.EXE 2060 MSWDM.EXE 2664 ADE31C23C289A0775937C77300B55DF0_NEIKIANALYTICS.EXE 2744 MSWDM.EXE -
Loads dropped DLL 1 IoCs
pid Process 2060 MSWDM.EXE -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\WDM = "MSWDM.EXE" ade31c23c289a0775937c77300b55df0_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunServices\WDM = "MSWDM.EXE" ade31c23c289a0775937c77300b55df0_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\WDM = "MSWDM.EXE" MSWDM.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunServices\WDM = "MSWDM.EXE" MSWDM.EXE -
Drops file in Windows directory 3 IoCs
description ioc Process File opened for modification C:\Windows\dev1AB2.tmp ade31c23c289a0775937c77300b55df0_NeikiAnalytics.exe File opened for modification C:\Windows\dev1AB2.tmp MSWDM.EXE File created C:\WINDOWS\MSWDM.EXE ade31c23c289a0775937c77300b55df0_NeikiAnalytics.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2060 MSWDM.EXE -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 1640 wrote to memory of 2012 1640 ade31c23c289a0775937c77300b55df0_NeikiAnalytics.exe 28 PID 1640 wrote to memory of 2012 1640 ade31c23c289a0775937c77300b55df0_NeikiAnalytics.exe 28 PID 1640 wrote to memory of 2012 1640 ade31c23c289a0775937c77300b55df0_NeikiAnalytics.exe 28 PID 1640 wrote to memory of 2012 1640 ade31c23c289a0775937c77300b55df0_NeikiAnalytics.exe 28 PID 1640 wrote to memory of 2060 1640 ade31c23c289a0775937c77300b55df0_NeikiAnalytics.exe 29 PID 1640 wrote to memory of 2060 1640 ade31c23c289a0775937c77300b55df0_NeikiAnalytics.exe 29 PID 1640 wrote to memory of 2060 1640 ade31c23c289a0775937c77300b55df0_NeikiAnalytics.exe 29 PID 1640 wrote to memory of 2060 1640 ade31c23c289a0775937c77300b55df0_NeikiAnalytics.exe 29 PID 2060 wrote to memory of 2664 2060 MSWDM.EXE 30 PID 2060 wrote to memory of 2664 2060 MSWDM.EXE 30 PID 2060 wrote to memory of 2664 2060 MSWDM.EXE 30 PID 2060 wrote to memory of 2664 2060 MSWDM.EXE 30 PID 2060 wrote to memory of 2744 2060 MSWDM.EXE 31 PID 2060 wrote to memory of 2744 2060 MSWDM.EXE 31 PID 2060 wrote to memory of 2744 2060 MSWDM.EXE 31 PID 2060 wrote to memory of 2744 2060 MSWDM.EXE 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\ade31c23c289a0775937c77300b55df0_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\ade31c23c289a0775937c77300b55df0_NeikiAnalytics.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1640 -
C:\WINDOWS\MSWDM.EXE"C:\WINDOWS\MSWDM.EXE"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:2012
-
-
C:\WINDOWS\MSWDM.EXE-r!C:\Windows\dev1AB2.tmp!C:\Users\Admin\AppData\Local\Temp\ade31c23c289a0775937c77300b55df0_NeikiAnalytics.exe! !2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2060 -
C:\Users\Admin\AppData\Local\Temp\ADE31C23C289A0775937C77300B55DF0_NEIKIANALYTICS.EXE
- Executes dropped EXE
PID:2664
-
-
C:\WINDOWS\MSWDM.EXE-e!C:\Windows\dev1AB2.tmp!C:\Users\Admin\AppData\Local\Temp\ADE31C23C289A0775937C77300B55DF0_NEIKIANALYTICS.EXE!3⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:2744
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
121KB
MD53b545fa464cab222c9dd9fb7d6ab2571
SHA1b9e27ff26bc3042489e1f7ed92d973f7628515c4
SHA256b6480243323a42a0dd064e694c46d9a52d2b5c0955c53c22b4ae29d2f16136e4
SHA512c8a2edc1f72829d36f7bb716301f24b33d8f3deffe590d00adf77417c8e38b01b4c7f685a7542287752e15042dd3f5813d4b723cfa8a241b4b6720dd4f560ee5
-
Filesize
80KB
MD5f486960b968d8862d724b5eba57c2594
SHA10d33b81e1d4f577b2dee9574a4c54c5f152de9c9
SHA256cf78efba62b9989ac8ade2117c6105ffa92cc071ecee27ee57517a9b34ce1c03
SHA512236a28b8347de6c8650aa47b5a7069696b0da8c784c51cb75e22eaf884e606a7b27340747b146c981cd20fb2f08f11735302f1a8576dd628bfcbfa7b5dee82d5
-
Filesize
41KB
MD5977e405c109268909fd24a94cc23d4f0
SHA1af5d032c2b6caa2164cf298e95b09060665c4188
SHA256cd24c61fe7dc3896c6c928c92a2adc58fab0a3ff61ef7ddcac1ba794182ab12f
SHA51212b4b59c1a8e65e72aa07ee4b6b6cd9fdedead01d5ce8e30f16ca26b5d733655e23a71c1d273a950a5b1a6cce810b696612de4a1148ac5f468ddf05d4549eed5