Analysis

  • max time kernel
    22s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21-05-2024 20:51

General

  • Target

    0ce4697b70c169aee7ba6f58b5acf900_NeikiAnalytics.exe

  • Size

    115KB

  • MD5

    0ce4697b70c169aee7ba6f58b5acf900

  • SHA1

    8ec66112a006764812dcd0ad816962bf9a7c2ffa

  • SHA256

    dce9644852ece6a904eb55ea0cf36c87cbe2a9c085ffd7adde4dacef05ab9f09

  • SHA512

    e9a395738ff98731cc32075b9f3aa6f74dcbc387acb66a49c8e92abfd1e499911673cd91a5f3db131e4c602adde92e05ce5c7a8af2f947a50716e33746b66032

  • SSDEEP

    1536:Hlqls0GgUyj5JxdA4Oj3W2Fsdq4FiG+sdguxnSngBNpy5G0Aox9cJNWIfoEb:HQC/yj5JO3MniG+Hu5y5Lxxu6IfoC

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 4 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Drops file in Windows directory 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0ce4697b70c169aee7ba6f58b5acf900_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\0ce4697b70c169aee7ba6f58b5acf900_NeikiAnalytics.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    PID:2964
    • C:\WINDOWS\MSWDM.EXE
      "C:\WINDOWS\MSWDM.EXE"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      PID:3004
    • C:\WINDOWS\MSWDM.EXE
      -r!C:\Windows\dev4759.tmp!C:\Users\Admin\AppData\Local\Temp\0ce4697b70c169aee7ba6f58b5acf900_NeikiAnalytics.exe! !
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:3644
      • C:\Users\Admin\AppData\Local\Temp\0CE4697B70C169AEE7BA6F58B5ACF900_NEIKIANALYTICS.EXE
        3⤵
        • Executes dropped EXE
        PID:2944
      • C:\WINDOWS\MSWDM.EXE
        -e!C:\Windows\dev4759.tmp!C:\Users\Admin\AppData\Local\Temp\0CE4697B70C169AEE7BA6F58B5ACF900_NEIKIANALYTICS.EXE!
        3⤵
        • Executes dropped EXE
        • Drops file in Windows directory
        PID:2092

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\0CE4697B70C169AEE7BA6F58B5ACF900_NEIKIANALYTICS.EXE

    Filesize

    115KB

    MD5

    b273abc194ec4ead3bff2c43d0900891

    SHA1

    ec287f47da27efb708079b1d006fc9cd0db4ca46

    SHA256

    3bdc3fec418905163e9b35103cdd834b2d36330f3b2b5741b0ab3827eaf44add

    SHA512

    99d820495836386d39b1afed6f2a05572f7177db196cd429a60c264b0992b0203b9b904359778ea195d9fe08c4197c60e49cb6479ec9e17912f864fb9253ab61

  • C:\Windows\MSWDM.EXE

    Filesize

    80KB

    MD5

    a587704ff11199aa99e958a49d6bfd35

    SHA1

    ecd0936cf9adc9d2e6d379d68d34a340ca473da7

    SHA256

    d97cbb9d5212b8af14afa8a218d5553cf9c912d1f743e4deedcfbbe482a68abf

    SHA512

    ebf23a92898d8a4d2e2646a2b6a5aace8976d89651d154ca0f642baf0e750d24061314d953b6977b87cbce25a1a13c3a7b5b49a9eda54a677f20a9097fda9b67

  • C:\Windows\dev4759.tmp

    Filesize

    35KB

    MD5

    ea3b798870a5c6e159bb05f432b0438a

    SHA1

    17cdd851ea58dd00296bd44c031484ef05342ee0

    SHA256

    3e7a5f7a2c4d88b30de76681d2759119aaf479f5787b6466dc175a852e50a1c7

    SHA512

    fc3f5089d2a57e38d285e5a90f2be63431d40c2c443dec41b783aaf5c1a6f4ab9b6904cd5fece18d6dc15664f00d7d5d0ba27d226f7623fe02c2f76f57a17524

  • memory/2092-20-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/2964-0-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/2964-10-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/3004-11-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/3004-25-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/3644-12-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/3644-24-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB