Analysis
-
max time kernel
150s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
20/05/2024, 05:34
Static task
static1
Behavioral task
behavioral1
Sample
ba3720e66b0f23684dce33bc136c0ea0_NeikiAnalytics.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
ba3720e66b0f23684dce33bc136c0ea0_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
ba3720e66b0f23684dce33bc136c0ea0_NeikiAnalytics.exe
-
Size
816KB
-
MD5
ba3720e66b0f23684dce33bc136c0ea0
-
SHA1
0c5769fff9dde2a92eac9554b00f2516e7c6a27e
-
SHA256
d4008143602dbccc57a880f9e36f8892c688469c1acb6ad0fa4fd5520d82c9a3
-
SHA512
ad8490ebf2184e4e1941153ffdff00a9628115c8d88af5629039034dce8587c9d159e783e715c446579a27e98959190e4b1ed50067b4836c8e822ef1663a5360
-
SSDEEP
12288:4jauDReWTsry7dPV4+XPpcWrN+D4f6dztsRv7fZRdFcAHVuH:4DDHswBCdMv7R+TH
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2156 hwkaj.exe -
Loads dropped DLL 2 IoCs
pid Process 1696 ba3720e66b0f23684dce33bc136c0ea0_NeikiAnalytics.exe 1696 ba3720e66b0f23684dce33bc136c0ea0_NeikiAnalytics.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Run\Microsoft® Windows® Operating System = "C:\\ProgramData\\hwkaj.exe" hwkaj.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1696 wrote to memory of 2156 1696 ba3720e66b0f23684dce33bc136c0ea0_NeikiAnalytics.exe 28 PID 1696 wrote to memory of 2156 1696 ba3720e66b0f23684dce33bc136c0ea0_NeikiAnalytics.exe 28 PID 1696 wrote to memory of 2156 1696 ba3720e66b0f23684dce33bc136c0ea0_NeikiAnalytics.exe 28 PID 1696 wrote to memory of 2156 1696 ba3720e66b0f23684dce33bc136c0ea0_NeikiAnalytics.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\ba3720e66b0f23684dce33bc136c0ea0_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\ba3720e66b0f23684dce33bc136c0ea0_NeikiAnalytics.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1696 -
C:\ProgramData\hwkaj.exe"C:\ProgramData\hwkaj.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:2156
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
816KB
MD562e774c08f2444ca2f21acf62e72e9cc
SHA17803a5cd0c8069418882fe7bbbcb3e2afecd982b
SHA256636d6829d36a2371ae340af03b23f408a75343247b51412c10fd4aceabc7e5b6
SHA512ac8951d64defddf8779ba9b2c0b4b34edaf4bca8a8fe6de517ad9869b38b8559350f85b340569a395f486497e50fc14cd98a033db680aced05a0ac74383b20f7
-
Filesize
136KB
MD5cb4c442a26bb46671c638c794bf535af
SHA18a742d0b372f2ddd2d1fdf688c3c4ac7f9272abf
SHA256f8d2c17bdf34ccfb58070ac8b131a8d95055340101a329f9a7212ac5240d0c25
SHA512074a31e8da403c0a718f93cbca50574d8b658921193db0e6e20eacd232379286f14a3698cd443dc740d324ad19d74934ae001a7ad64b88897d8afefbc9a3d4e3
-
Filesize
679KB
MD53b1d92fd6a4978852949c226ff4f3fa0
SHA14c081fbd5ff73033b74fdae5d5b7121cc60d2509
SHA25621886875b069a3dc4b1bc3ebf88fd10aae6afa1b94e33603b5b4c440e303e55b
SHA5124280a4ff8b97757b43a935ad12352af9331b5aba50f119128fb294bd263051f1297c2845b8d954271a6542565a6cb96fd7bd980b45a8bb617aa5a2f3ae072ab8