Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
22-05-2024 22:45
Behavioral task
behavioral1
Sample
4f8a3c149143c29ea9f91495e41b2070_NeikiAnalytics.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
4f8a3c149143c29ea9f91495e41b2070_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
4f8a3c149143c29ea9f91495e41b2070_NeikiAnalytics.exe
-
Size
134KB
-
MD5
4f8a3c149143c29ea9f91495e41b2070
-
SHA1
6699b7e08031f8324da6d67d8ec1f8ff367ffff1
-
SHA256
ac2a3a030d9c7162dd939c8d78b16c4daee02d3025b92a9b3a327d734db390a1
-
SHA512
13723ffdd1fffc818e4fb68582455511e22460441352d389101df2342b644f108af67b470da2e09cad8839394e5f59e27e9b84c9dc077813d2b9767d6fb89257
-
SSDEEP
1536:rF0AJELopHG9aa+9qX3apJzAKWYr0v7ioy6paK2AZqMIK7aGZh38Q7:riAyLN9aa+9U2rW1ip6pr2At7NZuQ7
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
WwanSvc.exepid process 2100 WwanSvc.exe -
Loads dropped DLL 1 IoCs
Processes:
4f8a3c149143c29ea9f91495e41b2070_NeikiAnalytics.exepid process 2552 4f8a3c149143c29ea9f91495e41b2070_NeikiAnalytics.exe -
Processes:
resource yara_rule behavioral1/memory/2552-0-0x0000000000E30000-0x0000000000E58000-memory.dmp upx \ProgramData\Update\WwanSvc.exe upx behavioral1/memory/2100-6-0x0000000000D60000-0x0000000000D88000-memory.dmp upx behavioral1/memory/2552-7-0x0000000000E30000-0x0000000000E58000-memory.dmp upx behavioral1/memory/2100-9-0x0000000000D60000-0x0000000000D88000-memory.dmp upx behavioral1/memory/2552-10-0x0000000000E30000-0x0000000000E58000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
4f8a3c149143c29ea9f91495e41b2070_NeikiAnalytics.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Window Update = "\"C:\\ProgramData\\Update\\WwanSvc.exe\" /run" 4f8a3c149143c29ea9f91495e41b2070_NeikiAnalytics.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
4f8a3c149143c29ea9f91495e41b2070_NeikiAnalytics.exedescription pid process target process PID 2552 wrote to memory of 2100 2552 4f8a3c149143c29ea9f91495e41b2070_NeikiAnalytics.exe WwanSvc.exe PID 2552 wrote to memory of 2100 2552 4f8a3c149143c29ea9f91495e41b2070_NeikiAnalytics.exe WwanSvc.exe PID 2552 wrote to memory of 2100 2552 4f8a3c149143c29ea9f91495e41b2070_NeikiAnalytics.exe WwanSvc.exe PID 2552 wrote to memory of 2100 2552 4f8a3c149143c29ea9f91495e41b2070_NeikiAnalytics.exe WwanSvc.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\4f8a3c149143c29ea9f91495e41b2070_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\4f8a3c149143c29ea9f91495e41b2070_NeikiAnalytics.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2552 -
C:\ProgramData\Update\WwanSvc.exe"C:\ProgramData\Update\WwanSvc.exe" /run2⤵
- Executes dropped EXE
PID:2100
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
134KB
MD569afd0e2c86a66c0f0a17e6ec8a9dc1c
SHA161843737a2b0d78a7b3881b3964c1b3ef0eae256
SHA2565b0f8af2b1f814abc64a4d7333548359548240ce0976adb081cc17c387be8d2a
SHA5125f14e0c05b4a349aeec6524ce5dc6cc9b5f192d68b5470eff2c366eaab4c5fdf7689ab98f18e536d1af3f592677beb41dc729c00ab5f788edcf27cc16e18bee6