Analysis
-
max time kernel
19s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
21-05-2024 20:51
Static task
static1
Behavioral task
behavioral1
Sample
0ce4697b70c169aee7ba6f58b5acf900_NeikiAnalytics.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
0ce4697b70c169aee7ba6f58b5acf900_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
0ce4697b70c169aee7ba6f58b5acf900_NeikiAnalytics.exe
-
Size
115KB
-
MD5
0ce4697b70c169aee7ba6f58b5acf900
-
SHA1
8ec66112a006764812dcd0ad816962bf9a7c2ffa
-
SHA256
dce9644852ece6a904eb55ea0cf36c87cbe2a9c085ffd7adde4dacef05ab9f09
-
SHA512
e9a395738ff98731cc32075b9f3aa6f74dcbc387acb66a49c8e92abfd1e499911673cd91a5f3db131e4c602adde92e05ce5c7a8af2f947a50716e33746b66032
-
SSDEEP
1536:Hlqls0GgUyj5JxdA4Oj3W2Fsdq4FiG+sdguxnSngBNpy5G0Aox9cJNWIfoEb:HQC/yj5JO3MniG+Hu5y5Lxxu6IfoC
Malware Config
Signatures
-
Executes dropped EXE 5 IoCs
Processes:
MSWDM.EXEMSWDM.EXE0CE4697B70C169AEE7BA6F58B5ACF900_NEIKIANALYTICS.EXEMSWDM.EXEpid process 2032 MSWDM.EXE 2384 MSWDM.EXE 1216 0CE4697B70C169AEE7BA6F58B5ACF900_NEIKIANALYTICS.EXE 1204 2676 MSWDM.EXE -
Loads dropped DLL 3 IoCs
Processes:
MSWDM.EXEpid process 2032 MSWDM.EXE 2652 1204 -
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
0ce4697b70c169aee7ba6f58b5acf900_NeikiAnalytics.exeMSWDM.EXEdescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\WDM = "MSWDM.EXE" 0ce4697b70c169aee7ba6f58b5acf900_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunServices\WDM = "MSWDM.EXE" 0ce4697b70c169aee7ba6f58b5acf900_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\WDM = "MSWDM.EXE" MSWDM.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunServices\WDM = "MSWDM.EXE" MSWDM.EXE -
Drops file in Windows directory 2 IoCs
Processes:
0ce4697b70c169aee7ba6f58b5acf900_NeikiAnalytics.exedescription ioc process File created C:\WINDOWS\MSWDM.EXE 0ce4697b70c169aee7ba6f58b5acf900_NeikiAnalytics.exe File opened for modification C:\Windows\devC02.tmp 0ce4697b70c169aee7ba6f58b5acf900_NeikiAnalytics.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
MSWDM.EXEpid process 2032 MSWDM.EXE -
Suspicious use of WriteProcessMemory 16 IoCs
Processes:
0ce4697b70c169aee7ba6f58b5acf900_NeikiAnalytics.exeMSWDM.EXEdescription pid process target process PID 1720 wrote to memory of 2384 1720 0ce4697b70c169aee7ba6f58b5acf900_NeikiAnalytics.exe MSWDM.EXE PID 1720 wrote to memory of 2384 1720 0ce4697b70c169aee7ba6f58b5acf900_NeikiAnalytics.exe MSWDM.EXE PID 1720 wrote to memory of 2384 1720 0ce4697b70c169aee7ba6f58b5acf900_NeikiAnalytics.exe MSWDM.EXE PID 1720 wrote to memory of 2384 1720 0ce4697b70c169aee7ba6f58b5acf900_NeikiAnalytics.exe MSWDM.EXE PID 1720 wrote to memory of 2032 1720 0ce4697b70c169aee7ba6f58b5acf900_NeikiAnalytics.exe MSWDM.EXE PID 1720 wrote to memory of 2032 1720 0ce4697b70c169aee7ba6f58b5acf900_NeikiAnalytics.exe MSWDM.EXE PID 1720 wrote to memory of 2032 1720 0ce4697b70c169aee7ba6f58b5acf900_NeikiAnalytics.exe MSWDM.EXE PID 1720 wrote to memory of 2032 1720 0ce4697b70c169aee7ba6f58b5acf900_NeikiAnalytics.exe MSWDM.EXE PID 2032 wrote to memory of 1216 2032 MSWDM.EXE 0CE4697B70C169AEE7BA6F58B5ACF900_NEIKIANALYTICS.EXE PID 2032 wrote to memory of 1216 2032 MSWDM.EXE 0CE4697B70C169AEE7BA6F58B5ACF900_NEIKIANALYTICS.EXE PID 2032 wrote to memory of 1216 2032 MSWDM.EXE 0CE4697B70C169AEE7BA6F58B5ACF900_NEIKIANALYTICS.EXE PID 2032 wrote to memory of 1216 2032 MSWDM.EXE 0CE4697B70C169AEE7BA6F58B5ACF900_NEIKIANALYTICS.EXE PID 2032 wrote to memory of 2676 2032 MSWDM.EXE MSWDM.EXE PID 2032 wrote to memory of 2676 2032 MSWDM.EXE MSWDM.EXE PID 2032 wrote to memory of 2676 2032 MSWDM.EXE MSWDM.EXE PID 2032 wrote to memory of 2676 2032 MSWDM.EXE MSWDM.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\0ce4697b70c169aee7ba6f58b5acf900_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\0ce4697b70c169aee7ba6f58b5acf900_NeikiAnalytics.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1720 -
C:\WINDOWS\MSWDM.EXE"C:\WINDOWS\MSWDM.EXE"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:2384 -
C:\WINDOWS\MSWDM.EXE-r!C:\Windows\devC02.tmp!C:\Users\Admin\AppData\Local\Temp\0ce4697b70c169aee7ba6f58b5acf900_NeikiAnalytics.exe! !2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2032 -
C:\Users\Admin\AppData\Local\Temp\0CE4697B70C169AEE7BA6F58B5ACF900_NEIKIANALYTICS.EXE
- Executes dropped EXE
PID:1216 -
C:\WINDOWS\MSWDM.EXE-e!C:\Windows\devC02.tmp!C:\Users\Admin\AppData\Local\Temp\0CE4697B70C169AEE7BA6F58B5ACF900_NEIKIANALYTICS.EXE!3⤵
- Executes dropped EXE
PID:2676
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
80KB
MD5a587704ff11199aa99e958a49d6bfd35
SHA1ecd0936cf9adc9d2e6d379d68d34a340ca473da7
SHA256d97cbb9d5212b8af14afa8a218d5553cf9c912d1f743e4deedcfbbe482a68abf
SHA512ebf23a92898d8a4d2e2646a2b6a5aace8976d89651d154ca0f642baf0e750d24061314d953b6977b87cbce25a1a13c3a7b5b49a9eda54a677f20a9097fda9b67
-
Filesize
35KB
MD5ea3b798870a5c6e159bb05f432b0438a
SHA117cdd851ea58dd00296bd44c031484ef05342ee0
SHA2563e7a5f7a2c4d88b30de76681d2759119aaf479f5787b6466dc175a852e50a1c7
SHA512fc3f5089d2a57e38d285e5a90f2be63431d40c2c443dec41b783aaf5c1a6f4ab9b6904cd5fece18d6dc15664f00d7d5d0ba27d226f7623fe02c2f76f57a17524