Analysis
-
max time kernel
12s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
23-05-2024 00:31
Behavioral task
behavioral1
Sample
629ca4c3d9a5af73e9f34364ae5c1160_NeikiAnalytics.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
629ca4c3d9a5af73e9f34364ae5c1160_NeikiAnalytics.exe
Resource
win10v2004-20240426-en
General
-
Target
629ca4c3d9a5af73e9f34364ae5c1160_NeikiAnalytics.exe
-
Size
497KB
-
MD5
629ca4c3d9a5af73e9f34364ae5c1160
-
SHA1
d192b73e5de3e729714c6dbd83dc3886b7da566c
-
SHA256
a55c477260bc81e147284d9c11a907e7162b25c3b6308d5fbd40f9ccc422de4a
-
SHA512
60ed0645c9aea236a7b2065a9a0cd194d8b39953578c28afc1791fd1a2bb586fae3e672636f115e51c63be9fdbe96b450d74f014d65748fb7fc3689b137b4856
-
SSDEEP
6144:J89MA6jz1gL5pRTMTTjMkId/BynSx7dEe6XwzRaktNP08NhKs39zo43fTtl1fay7:+w1gL5pRTcAkS/3hzN8qE43fm78V/
Malware Config
Signatures
-
Executes dropped EXE 4 IoCs
Processes:
MSWDM.EXEMSWDM.EXE629CA4C3D9A5AF73E9F34364AE5C1160_NEIKIANALYTICS.EXEMSWDM.EXEpid process 1176 MSWDM.EXE 1156 MSWDM.EXE 3428 629CA4C3D9A5AF73E9F34364AE5C1160_NEIKIANALYTICS.EXE 1884 MSWDM.EXE -
Processes:
resource yara_rule behavioral2/memory/2188-0-0x0000000000400000-0x0000000000418000-memory.dmp upx C:\Windows\MSWDM.EXE upx behavioral2/memory/1156-12-0x0000000000400000-0x0000000000418000-memory.dmp upx behavioral2/memory/1176-11-0x0000000000400000-0x0000000000418000-memory.dmp upx behavioral2/memory/2188-10-0x0000000000400000-0x0000000000418000-memory.dmp upx C:\Users\Admin\AppData\Local\Temp\629CA4C3D9A5AF73E9F34364AE5C1160_NEIKIANALYTICS.EXE upx behavioral2/memory/1884-21-0x0000000000400000-0x0000000000418000-memory.dmp upx behavioral2/memory/1156-24-0x0000000000400000-0x0000000000418000-memory.dmp upx behavioral2/memory/1176-25-0x0000000000400000-0x0000000000418000-memory.dmp upx -
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
629ca4c3d9a5af73e9f34364ae5c1160_NeikiAnalytics.exeMSWDM.EXEdescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\WDM = "MSWDM.EXE" 629ca4c3d9a5af73e9f34364ae5c1160_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunServices\WDM = "MSWDM.EXE" 629ca4c3d9a5af73e9f34364ae5c1160_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\WDM = "MSWDM.EXE" MSWDM.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunServices\WDM = "MSWDM.EXE" MSWDM.EXE -
Drops file in Windows directory 3 IoCs
Processes:
MSWDM.EXE629ca4c3d9a5af73e9f34364ae5c1160_NeikiAnalytics.exedescription ioc process File opened for modification C:\Windows\dev5285.tmp MSWDM.EXE File created C:\WINDOWS\MSWDM.EXE 629ca4c3d9a5af73e9f34364ae5c1160_NeikiAnalytics.exe File opened for modification C:\Windows\dev5285.tmp 629ca4c3d9a5af73e9f34364ae5c1160_NeikiAnalytics.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
MSWDM.EXEpid process 1156 MSWDM.EXE 1156 MSWDM.EXE -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
629ca4c3d9a5af73e9f34364ae5c1160_NeikiAnalytics.exeMSWDM.EXEdescription pid process target process PID 2188 wrote to memory of 1176 2188 629ca4c3d9a5af73e9f34364ae5c1160_NeikiAnalytics.exe MSWDM.EXE PID 2188 wrote to memory of 1176 2188 629ca4c3d9a5af73e9f34364ae5c1160_NeikiAnalytics.exe MSWDM.EXE PID 2188 wrote to memory of 1176 2188 629ca4c3d9a5af73e9f34364ae5c1160_NeikiAnalytics.exe MSWDM.EXE PID 2188 wrote to memory of 1156 2188 629ca4c3d9a5af73e9f34364ae5c1160_NeikiAnalytics.exe MSWDM.EXE PID 2188 wrote to memory of 1156 2188 629ca4c3d9a5af73e9f34364ae5c1160_NeikiAnalytics.exe MSWDM.EXE PID 2188 wrote to memory of 1156 2188 629ca4c3d9a5af73e9f34364ae5c1160_NeikiAnalytics.exe MSWDM.EXE PID 1156 wrote to memory of 3428 1156 MSWDM.EXE 629CA4C3D9A5AF73E9F34364AE5C1160_NEIKIANALYTICS.EXE PID 1156 wrote to memory of 3428 1156 MSWDM.EXE 629CA4C3D9A5AF73E9F34364AE5C1160_NEIKIANALYTICS.EXE PID 1156 wrote to memory of 1884 1156 MSWDM.EXE MSWDM.EXE PID 1156 wrote to memory of 1884 1156 MSWDM.EXE MSWDM.EXE PID 1156 wrote to memory of 1884 1156 MSWDM.EXE MSWDM.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\629ca4c3d9a5af73e9f34364ae5c1160_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\629ca4c3d9a5af73e9f34364ae5c1160_NeikiAnalytics.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2188 -
C:\WINDOWS\MSWDM.EXE"C:\WINDOWS\MSWDM.EXE"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:1176 -
C:\WINDOWS\MSWDM.EXE-r!C:\Windows\dev5285.tmp!C:\Users\Admin\AppData\Local\Temp\629ca4c3d9a5af73e9f34364ae5c1160_NeikiAnalytics.exe! !2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1156 -
C:\Users\Admin\AppData\Local\Temp\629CA4C3D9A5AF73E9F34364AE5C1160_NEIKIANALYTICS.EXE
- Executes dropped EXE
PID:3428 -
C:\WINDOWS\MSWDM.EXE-e!C:\Windows\dev5285.tmp!C:\Users\Admin\AppData\Local\Temp\629CA4C3D9A5AF73E9F34364AE5C1160_NEIKIANALYTICS.EXE!3⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:1884
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
497KB
MD5a8f8f588d0622b61d84ec6af4bddba84
SHA17ca886be31b872c85ade20ac09a5d2c2704fb83a
SHA256c70380ed5d696a33ff3a1a9f0090e8cae1616512a70392eb0091a9632c9d6fe4
SHA512eb4b05466b3cfd893401a67216d58d2b98224d4214abcea14a7dd62b27e4ab1351bbe3854b70e4b204a32389a0abd11ec43fe8c151ccb9bec7661c4358afb6c2
-
Filesize
39KB
MD5808db81803d4419434e881bb42d2c096
SHA144cbbac69c5dbfedb6f2853d12baeb2e750840fb
SHA25685472524ca67962db894afb21001c14722734178410d675d4f76fcccb2958253
SHA51200b44fe56d0f07dac49b8f1586a3e3f7be36b553e9cec6af2ea2ad0f07616d6e21d3c5f794b137d8b16cb2b18be388531db023b237c7fc75ea0d3d8db77495db
-
Filesize
458KB
MD5619f7135621b50fd1900ff24aade1524
SHA16c7ea8bbd435163ae3945cbef30ef6b9872a4591
SHA256344f076bb1211cb02eca9e5ed2c0ce59bcf74ccbc749ec611538fa14ecb9aad2
SHA5122c7293c084d09bc2e3ae2d066dd7b331c810d9e2eeca8b236a8e87fdeb18e877b948747d3491fcaff245816507685250bd35f984c67a43b29b0ae31ecb2bd628