Analysis
-
max time kernel
20s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
23-05-2024 00:31
Behavioral task
behavioral1
Sample
629ca4c3d9a5af73e9f34364ae5c1160_NeikiAnalytics.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
629ca4c3d9a5af73e9f34364ae5c1160_NeikiAnalytics.exe
Resource
win10v2004-20240426-en
General
-
Target
629ca4c3d9a5af73e9f34364ae5c1160_NeikiAnalytics.exe
-
Size
497KB
-
MD5
629ca4c3d9a5af73e9f34364ae5c1160
-
SHA1
d192b73e5de3e729714c6dbd83dc3886b7da566c
-
SHA256
a55c477260bc81e147284d9c11a907e7162b25c3b6308d5fbd40f9ccc422de4a
-
SHA512
60ed0645c9aea236a7b2065a9a0cd194d8b39953578c28afc1791fd1a2bb586fae3e672636f115e51c63be9fdbe96b450d74f014d65748fb7fc3689b137b4856
-
SSDEEP
6144:J89MA6jz1gL5pRTMTTjMkId/BynSx7dEe6XwzRaktNP08NhKs39zo43fTtl1fay7:+w1gL5pRTcAkS/3hzN8qE43fm78V/
Malware Config
Signatures
-
Executes dropped EXE 4 IoCs
Processes:
MSWDM.EXEMSWDM.EXE629CA4C3D9A5AF73E9F34364AE5C1160_NEIKIANALYTICS.EXEMSWDM.EXEpid process 2400 MSWDM.EXE 1056 MSWDM.EXE 2708 629CA4C3D9A5AF73E9F34364AE5C1160_NEIKIANALYTICS.EXE 2664 MSWDM.EXE -
Loads dropped DLL 2 IoCs
Processes:
MSWDM.EXEpid process 1056 MSWDM.EXE 2748 -
Processes:
resource yara_rule behavioral1/memory/2208-0-0x0000000000400000-0x0000000000418000-memory.dmp upx C:\Windows\MSWDM.EXE upx behavioral1/memory/2400-15-0x0000000000400000-0x0000000000418000-memory.dmp upx behavioral1/memory/2208-12-0x0000000000400000-0x0000000000418000-memory.dmp upx behavioral1/memory/2664-29-0x0000000000400000-0x0000000000418000-memory.dmp upx C:\Users\Admin\AppData\Local\Temp\629CA4C3D9A5AF73E9F34364AE5C1160_NEIKIANALYTICS.EXE upx behavioral1/memory/1056-32-0x0000000000400000-0x0000000000418000-memory.dmp upx behavioral1/memory/2400-33-0x0000000000400000-0x0000000000418000-memory.dmp upx -
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
629ca4c3d9a5af73e9f34364ae5c1160_NeikiAnalytics.exeMSWDM.EXEdescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\WDM = "MSWDM.EXE" 629ca4c3d9a5af73e9f34364ae5c1160_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunServices\WDM = "MSWDM.EXE" 629ca4c3d9a5af73e9f34364ae5c1160_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\WDM = "MSWDM.EXE" MSWDM.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunServices\WDM = "MSWDM.EXE" MSWDM.EXE -
Drops file in Windows directory 3 IoCs
Processes:
629ca4c3d9a5af73e9f34364ae5c1160_NeikiAnalytics.exeMSWDM.EXEdescription ioc process File created C:\WINDOWS\MSWDM.EXE 629ca4c3d9a5af73e9f34364ae5c1160_NeikiAnalytics.exe File opened for modification C:\Windows\dev2684.tmp 629ca4c3d9a5af73e9f34364ae5c1160_NeikiAnalytics.exe File opened for modification C:\Windows\dev2684.tmp MSWDM.EXE -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
MSWDM.EXEpid process 1056 MSWDM.EXE -
Suspicious use of WriteProcessMemory 16 IoCs
Processes:
629ca4c3d9a5af73e9f34364ae5c1160_NeikiAnalytics.exeMSWDM.EXEdescription pid process target process PID 2208 wrote to memory of 2400 2208 629ca4c3d9a5af73e9f34364ae5c1160_NeikiAnalytics.exe MSWDM.EXE PID 2208 wrote to memory of 2400 2208 629ca4c3d9a5af73e9f34364ae5c1160_NeikiAnalytics.exe MSWDM.EXE PID 2208 wrote to memory of 2400 2208 629ca4c3d9a5af73e9f34364ae5c1160_NeikiAnalytics.exe MSWDM.EXE PID 2208 wrote to memory of 2400 2208 629ca4c3d9a5af73e9f34364ae5c1160_NeikiAnalytics.exe MSWDM.EXE PID 2208 wrote to memory of 1056 2208 629ca4c3d9a5af73e9f34364ae5c1160_NeikiAnalytics.exe MSWDM.EXE PID 2208 wrote to memory of 1056 2208 629ca4c3d9a5af73e9f34364ae5c1160_NeikiAnalytics.exe MSWDM.EXE PID 2208 wrote to memory of 1056 2208 629ca4c3d9a5af73e9f34364ae5c1160_NeikiAnalytics.exe MSWDM.EXE PID 2208 wrote to memory of 1056 2208 629ca4c3d9a5af73e9f34364ae5c1160_NeikiAnalytics.exe MSWDM.EXE PID 1056 wrote to memory of 2708 1056 MSWDM.EXE 629CA4C3D9A5AF73E9F34364AE5C1160_NEIKIANALYTICS.EXE PID 1056 wrote to memory of 2708 1056 MSWDM.EXE 629CA4C3D9A5AF73E9F34364AE5C1160_NEIKIANALYTICS.EXE PID 1056 wrote to memory of 2708 1056 MSWDM.EXE 629CA4C3D9A5AF73E9F34364AE5C1160_NEIKIANALYTICS.EXE PID 1056 wrote to memory of 2708 1056 MSWDM.EXE 629CA4C3D9A5AF73E9F34364AE5C1160_NEIKIANALYTICS.EXE PID 1056 wrote to memory of 2664 1056 MSWDM.EXE MSWDM.EXE PID 1056 wrote to memory of 2664 1056 MSWDM.EXE MSWDM.EXE PID 1056 wrote to memory of 2664 1056 MSWDM.EXE MSWDM.EXE PID 1056 wrote to memory of 2664 1056 MSWDM.EXE MSWDM.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\629ca4c3d9a5af73e9f34364ae5c1160_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\629ca4c3d9a5af73e9f34364ae5c1160_NeikiAnalytics.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2208 -
C:\WINDOWS\MSWDM.EXE"C:\WINDOWS\MSWDM.EXE"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:2400 -
C:\WINDOWS\MSWDM.EXE-r!C:\Windows\dev2684.tmp!C:\Users\Admin\AppData\Local\Temp\629ca4c3d9a5af73e9f34364ae5c1160_NeikiAnalytics.exe! !2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1056 -
C:\Users\Admin\AppData\Local\Temp\629CA4C3D9A5AF73E9F34364AE5C1160_NEIKIANALYTICS.EXE
- Executes dropped EXE
PID:2708 -
C:\WINDOWS\MSWDM.EXE-e!C:\Windows\dev2684.tmp!C:\Users\Admin\AppData\Local\Temp\629CA4C3D9A5AF73E9F34364AE5C1160_NEIKIANALYTICS.EXE!3⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:2664
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
497KB
MD57232e0c4f4522dbe468c7b5e0edd8888
SHA170f528200e56618613dbc927c95919db7adfbf8a
SHA2564ebc89df2781fc9da76fd64c161cfe1f63e2bc80425cf6090c8cb81bfaba74e3
SHA5126118cdde0482731a4d4021c815d35f5a5043b5f48e2188cf0a22a75d793a9380b73c9611c3857f672b3759017cee6d564ef19ab173763db996b0b0d8ea7f77a6
-
Filesize
39KB
MD5808db81803d4419434e881bb42d2c096
SHA144cbbac69c5dbfedb6f2853d12baeb2e750840fb
SHA25685472524ca67962db894afb21001c14722734178410d675d4f76fcccb2958253
SHA51200b44fe56d0f07dac49b8f1586a3e3f7be36b553e9cec6af2ea2ad0f07616d6e21d3c5f794b137d8b16cb2b18be388531db023b237c7fc75ea0d3d8db77495db
-
Filesize
458KB
MD5619f7135621b50fd1900ff24aade1524
SHA16c7ea8bbd435163ae3945cbef30ef6b9872a4591
SHA256344f076bb1211cb02eca9e5ed2c0ce59bcf74ccbc749ec611538fa14ecb9aad2
SHA5122c7293c084d09bc2e3ae2d066dd7b331c810d9e2eeca8b236a8e87fdeb18e877b948747d3491fcaff245816507685250bd35f984c67a43b29b0ae31ecb2bd628