Analysis
-
max time kernel
19s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
23-05-2024 00:55
Static task
static1
Behavioral task
behavioral1
Sample
66a54f22be55c972f8efbf4fa6938770_NeikiAnalytics.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
66a54f22be55c972f8efbf4fa6938770_NeikiAnalytics.exe
Resource
win10v2004-20240426-en
General
-
Target
66a54f22be55c972f8efbf4fa6938770_NeikiAnalytics.exe
-
Size
139KB
-
MD5
66a54f22be55c972f8efbf4fa6938770
-
SHA1
1d3811d1c6de14ee140e6e7b25838430ad5a3ea0
-
SHA256
979533b9dd57eb22d4ba378b515d51d966ed9c914ac7a759adb24eb597933f68
-
SHA512
5c98ef765e25c84df6d1a876dfee7d2400b6c5779e71d8541b3c02f7ed71fb0f038209e46d9beb466b462ff1bca3829717e1d074990b042380bd699a49db6aa7
-
SSDEEP
3072:HQC/yj5JO3MnzG+Hu54Fx4xE8GLK4ddJMY86iCmEYFRxs3:wlj7cMnq+OEXVKCJMZU3
Malware Config
Signatures
-
Executes dropped EXE 4 IoCs
Processes:
MSWDM.EXEMSWDM.EXE66A54F22BE55C972F8EFBF4FA6938770_NEIKIANALYTICS.EXEMSWDM.EXEpid process 516 MSWDM.EXE 1220 MSWDM.EXE 992 66A54F22BE55C972F8EFBF4FA6938770_NEIKIANALYTICS.EXE 4372 MSWDM.EXE -
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
66a54f22be55c972f8efbf4fa6938770_NeikiAnalytics.exeMSWDM.EXEdescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\WDM = "MSWDM.EXE" 66a54f22be55c972f8efbf4fa6938770_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunServices\WDM = "MSWDM.EXE" 66a54f22be55c972f8efbf4fa6938770_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\WDM = "MSWDM.EXE" MSWDM.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunServices\WDM = "MSWDM.EXE" MSWDM.EXE -
Drops file in Windows directory 3 IoCs
Processes:
66a54f22be55c972f8efbf4fa6938770_NeikiAnalytics.exeMSWDM.EXEdescription ioc process File created C:\WINDOWS\MSWDM.EXE 66a54f22be55c972f8efbf4fa6938770_NeikiAnalytics.exe File opened for modification C:\Windows\dev4EDB.tmp 66a54f22be55c972f8efbf4fa6938770_NeikiAnalytics.exe File opened for modification C:\Windows\dev4EDB.tmp MSWDM.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
MSWDM.EXEpid process 1220 MSWDM.EXE 1220 MSWDM.EXE -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
66a54f22be55c972f8efbf4fa6938770_NeikiAnalytics.exeMSWDM.EXEdescription pid process target process PID 4296 wrote to memory of 516 4296 66a54f22be55c972f8efbf4fa6938770_NeikiAnalytics.exe MSWDM.EXE PID 4296 wrote to memory of 516 4296 66a54f22be55c972f8efbf4fa6938770_NeikiAnalytics.exe MSWDM.EXE PID 4296 wrote to memory of 516 4296 66a54f22be55c972f8efbf4fa6938770_NeikiAnalytics.exe MSWDM.EXE PID 4296 wrote to memory of 1220 4296 66a54f22be55c972f8efbf4fa6938770_NeikiAnalytics.exe MSWDM.EXE PID 4296 wrote to memory of 1220 4296 66a54f22be55c972f8efbf4fa6938770_NeikiAnalytics.exe MSWDM.EXE PID 4296 wrote to memory of 1220 4296 66a54f22be55c972f8efbf4fa6938770_NeikiAnalytics.exe MSWDM.EXE PID 1220 wrote to memory of 992 1220 MSWDM.EXE 66A54F22BE55C972F8EFBF4FA6938770_NEIKIANALYTICS.EXE PID 1220 wrote to memory of 992 1220 MSWDM.EXE 66A54F22BE55C972F8EFBF4FA6938770_NEIKIANALYTICS.EXE PID 1220 wrote to memory of 4372 1220 MSWDM.EXE MSWDM.EXE PID 1220 wrote to memory of 4372 1220 MSWDM.EXE MSWDM.EXE PID 1220 wrote to memory of 4372 1220 MSWDM.EXE MSWDM.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\66a54f22be55c972f8efbf4fa6938770_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\66a54f22be55c972f8efbf4fa6938770_NeikiAnalytics.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:4296 -
C:\WINDOWS\MSWDM.EXE"C:\WINDOWS\MSWDM.EXE"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:516 -
C:\WINDOWS\MSWDM.EXE-r!C:\Windows\dev4EDB.tmp!C:\Users\Admin\AppData\Local\Temp\66a54f22be55c972f8efbf4fa6938770_NeikiAnalytics.exe! !2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1220 -
C:\Users\Admin\AppData\Local\Temp\66A54F22BE55C972F8EFBF4FA6938770_NEIKIANALYTICS.EXE
- Executes dropped EXE
PID:992 -
C:\WINDOWS\MSWDM.EXE-e!C:\Windows\dev4EDB.tmp!C:\Users\Admin\AppData\Local\Temp\66A54F22BE55C972F8EFBF4FA6938770_NEIKIANALYTICS.EXE!3⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:4372
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
139KB
MD54edc44d60955131f90792b0b6c8e3c00
SHA1d626ba2e93cf75909b1cd5cf08eee30f6bde9397
SHA2568fe06f34689337c55a9e809b45d039a5db6b504fb3e2959a1d897eefd2641192
SHA512d08dfb307b0492ed55b1a11d7f154165b294721b52e4d29341406931a7d5cc4d355e97f85c7500afaaca077bd0155e01759a2fc40d4c4b5175cd06a9a91d6370
-
Filesize
80KB
MD568e2b3feafd08549d8065f0d7bdf7428
SHA133f40e4b8d55ab73d5697f9a89b96451fd684ec9
SHA2560034a4b9e1272561a35b942a07d3cf5b6203f2a43b526f7a3f0bb9597b70cb56
SHA5127c6687f89338b237687c02927df93068e66d684a29ed7726f12fa083f31b9359e63771566e8279d4242e5357e9036d2bd8ecffb839ad6d09270d995e4665935f
-
Filesize
59KB
MD5902bb8a161b8ef0610fcfede4ec190e5
SHA131277bd740a0ecd64b42cd39cb2a117478b90028
SHA2562564a4298eb56d3c5b41c8b4105f97df19b46613461b7b143dc053d5490074df
SHA512627c48607e8fb7f6abd23e69a20e699c673aafa007cbb3460f894db71ac48ecb9a96c03f0b73b765b0eb482a54ec0d5b0965ff3682b631d6c53ec3edd487cdaf