Analysis

  • max time kernel
    22s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    23-05-2024 00:55

General

  • Target

    66a54f22be55c972f8efbf4fa6938770_NeikiAnalytics.exe

  • Size

    139KB

  • MD5

    66a54f22be55c972f8efbf4fa6938770

  • SHA1

    1d3811d1c6de14ee140e6e7b25838430ad5a3ea0

  • SHA256

    979533b9dd57eb22d4ba378b515d51d966ed9c914ac7a759adb24eb597933f68

  • SHA512

    5c98ef765e25c84df6d1a876dfee7d2400b6c5779e71d8541b3c02f7ed71fb0f038209e46d9beb466b462ff1bca3829717e1d074990b042380bd699a49db6aa7

  • SSDEEP

    3072:HQC/yj5JO3MnzG+Hu54Fx4xE8GLK4ddJMY86iCmEYFRxs3:wlj7cMnq+OEXVKCJMZU3

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 1 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Drops file in Windows directory 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\66a54f22be55c972f8efbf4fa6938770_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\66a54f22be55c972f8efbf4fa6938770_NeikiAnalytics.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    PID:2220
    • C:\WINDOWS\MSWDM.EXE
      "C:\WINDOWS\MSWDM.EXE"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      PID:2036
    • C:\WINDOWS\MSWDM.EXE
      -r!C:\Windows\devD69.tmp!C:\Users\Admin\AppData\Local\Temp\66a54f22be55c972f8efbf4fa6938770_NeikiAnalytics.exe! !
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:2408
      • C:\Users\Admin\AppData\Local\Temp\66A54F22BE55C972F8EFBF4FA6938770_NEIKIANALYTICS.EXE
        3⤵
        • Executes dropped EXE
        PID:2612
      • C:\WINDOWS\MSWDM.EXE
        -e!C:\Windows\devD69.tmp!C:\Users\Admin\AppData\Local\Temp\66A54F22BE55C972F8EFBF4FA6938770_NEIKIANALYTICS.EXE!
        3⤵
        • Executes dropped EXE
        • Drops file in Windows directory
        PID:2724

Network

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Privilege Escalation

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Defense Evasion

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\66A54F22BE55C972F8EFBF4FA6938770_NEIKIANALYTICS.EXE
    Filesize

    139KB

    MD5

    4edc44d60955131f90792b0b6c8e3c00

    SHA1

    d626ba2e93cf75909b1cd5cf08eee30f6bde9397

    SHA256

    8fe06f34689337c55a9e809b45d039a5db6b504fb3e2959a1d897eefd2641192

    SHA512

    d08dfb307b0492ed55b1a11d7f154165b294721b52e4d29341406931a7d5cc4d355e97f85c7500afaaca077bd0155e01759a2fc40d4c4b5175cd06a9a91d6370

  • C:\Users\Admin\AppData\Local\Temp\66a54f22be55c972f8efbf4fa6938770_NeikiAnalytics.exe
    Filesize

    59KB

    MD5

    902bb8a161b8ef0610fcfede4ec190e5

    SHA1

    31277bd740a0ecd64b42cd39cb2a117478b90028

    SHA256

    2564a4298eb56d3c5b41c8b4105f97df19b46613461b7b143dc053d5490074df

    SHA512

    627c48607e8fb7f6abd23e69a20e699c673aafa007cbb3460f894db71ac48ecb9a96c03f0b73b765b0eb482a54ec0d5b0965ff3682b631d6c53ec3edd487cdaf

  • C:\Windows\MSWDM.EXE
    Filesize

    80KB

    MD5

    68e2b3feafd08549d8065f0d7bdf7428

    SHA1

    33f40e4b8d55ab73d5697f9a89b96451fd684ec9

    SHA256

    0034a4b9e1272561a35b942a07d3cf5b6203f2a43b526f7a3f0bb9597b70cb56

    SHA512

    7c6687f89338b237687c02927df93068e66d684a29ed7726f12fa083f31b9359e63771566e8279d4242e5357e9036d2bd8ecffb839ad6d09270d995e4665935f

  • memory/2036-34-0x0000000000400000-0x000000000041B000-memory.dmp
    Filesize

    108KB

  • memory/2220-0-0x0000000000400000-0x000000000041B000-memory.dmp
    Filesize

    108KB

  • memory/2220-11-0x00000000003E0000-0x00000000003FB000-memory.dmp
    Filesize

    108KB

  • memory/2220-15-0x0000000000400000-0x000000000041B000-memory.dmp
    Filesize

    108KB

  • memory/2220-14-0x00000000003E0000-0x00000000003FB000-memory.dmp
    Filesize

    108KB

  • memory/2220-13-0x00000000003E0000-0x00000000003FB000-memory.dmp
    Filesize

    108KB

  • memory/2408-33-0x0000000000400000-0x000000000041B000-memory.dmp
    Filesize

    108KB

  • memory/2408-24-0x0000000000250000-0x000000000026B000-memory.dmp
    Filesize

    108KB

  • memory/2724-30-0x0000000000400000-0x000000000041B000-memory.dmp
    Filesize

    108KB