Analysis
-
max time kernel
23s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
23-05-2024 01:24
Static task
static1
Behavioral task
behavioral1
Sample
6ca9db9b9460fcc18e55e931edceb1b0_NeikiAnalytics.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
6ca9db9b9460fcc18e55e931edceb1b0_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
6ca9db9b9460fcc18e55e931edceb1b0_NeikiAnalytics.exe
-
Size
501KB
-
MD5
6ca9db9b9460fcc18e55e931edceb1b0
-
SHA1
689679e228f5e1456109400e8068e5a0711ca9fd
-
SHA256
88fdd3ce3859dd7040e2c068636913dec2b7b630b4ff88121f1da6dd29d8ca1e
-
SHA512
855bf823b6885957b3644d981315a972739748e4a57f8e9a16acb8ab5f63fb12f692ff083267d30e820b8d064ca8913190b25e265158bd337358e148867f3a62
-
SSDEEP
6144:wlj7cMnU+c78n5Qw0tneDA/sqhleIc0HftDrkYY1hj63hgDonsogCh6NEpAFs:wlbU+285bM3npxYfj63hgD1Zij
Malware Config
Signatures
-
Executes dropped EXE 4 IoCs
Processes:
MSWDM.EXEMSWDM.EXE6CA9DB9B9460FCC18E55E931EDCEB1B0_NEIKIANALYTICS.EXEMSWDM.EXEpid process 60 MSWDM.EXE 5040 MSWDM.EXE 3492 6CA9DB9B9460FCC18E55E931EDCEB1B0_NEIKIANALYTICS.EXE 4932 MSWDM.EXE -
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
MSWDM.EXE6ca9db9b9460fcc18e55e931edceb1b0_NeikiAnalytics.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\WDM = "MSWDM.EXE" MSWDM.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunServices\WDM = "MSWDM.EXE" MSWDM.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\WDM = "MSWDM.EXE" 6ca9db9b9460fcc18e55e931edceb1b0_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunServices\WDM = "MSWDM.EXE" 6ca9db9b9460fcc18e55e931edceb1b0_NeikiAnalytics.exe -
Drops file in Windows directory 3 IoCs
Processes:
6ca9db9b9460fcc18e55e931edceb1b0_NeikiAnalytics.exeMSWDM.EXEdescription ioc process File created C:\WINDOWS\MSWDM.EXE 6ca9db9b9460fcc18e55e931edceb1b0_NeikiAnalytics.exe File opened for modification C:\Windows\dev4798.tmp 6ca9db9b9460fcc18e55e931edceb1b0_NeikiAnalytics.exe File opened for modification C:\Windows\dev4798.tmp MSWDM.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
MSWDM.EXEpid process 5040 MSWDM.EXE 5040 MSWDM.EXE -
Suspicious use of SetWindowsHookEx 3 IoCs
Processes:
6CA9DB9B9460FCC18E55E931EDCEB1B0_NEIKIANALYTICS.EXEpid process 3492 6CA9DB9B9460FCC18E55E931EDCEB1B0_NEIKIANALYTICS.EXE 3492 6CA9DB9B9460FCC18E55E931EDCEB1B0_NEIKIANALYTICS.EXE 3492 6CA9DB9B9460FCC18E55E931EDCEB1B0_NEIKIANALYTICS.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
6ca9db9b9460fcc18e55e931edceb1b0_NeikiAnalytics.exeMSWDM.EXEdescription pid process target process PID 4656 wrote to memory of 60 4656 6ca9db9b9460fcc18e55e931edceb1b0_NeikiAnalytics.exe MSWDM.EXE PID 4656 wrote to memory of 60 4656 6ca9db9b9460fcc18e55e931edceb1b0_NeikiAnalytics.exe MSWDM.EXE PID 4656 wrote to memory of 60 4656 6ca9db9b9460fcc18e55e931edceb1b0_NeikiAnalytics.exe MSWDM.EXE PID 4656 wrote to memory of 5040 4656 6ca9db9b9460fcc18e55e931edceb1b0_NeikiAnalytics.exe MSWDM.EXE PID 4656 wrote to memory of 5040 4656 6ca9db9b9460fcc18e55e931edceb1b0_NeikiAnalytics.exe MSWDM.EXE PID 4656 wrote to memory of 5040 4656 6ca9db9b9460fcc18e55e931edceb1b0_NeikiAnalytics.exe MSWDM.EXE PID 5040 wrote to memory of 3492 5040 MSWDM.EXE 6CA9DB9B9460FCC18E55E931EDCEB1B0_NEIKIANALYTICS.EXE PID 5040 wrote to memory of 3492 5040 MSWDM.EXE 6CA9DB9B9460FCC18E55E931EDCEB1B0_NEIKIANALYTICS.EXE PID 5040 wrote to memory of 3492 5040 MSWDM.EXE 6CA9DB9B9460FCC18E55E931EDCEB1B0_NEIKIANALYTICS.EXE PID 5040 wrote to memory of 4932 5040 MSWDM.EXE MSWDM.EXE PID 5040 wrote to memory of 4932 5040 MSWDM.EXE MSWDM.EXE PID 5040 wrote to memory of 4932 5040 MSWDM.EXE MSWDM.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\6ca9db9b9460fcc18e55e931edceb1b0_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\6ca9db9b9460fcc18e55e931edceb1b0_NeikiAnalytics.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:4656 -
C:\WINDOWS\MSWDM.EXE"C:\WINDOWS\MSWDM.EXE"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:60 -
C:\WINDOWS\MSWDM.EXE-r!C:\Windows\dev4798.tmp!C:\Users\Admin\AppData\Local\Temp\6ca9db9b9460fcc18e55e931edceb1b0_NeikiAnalytics.exe! !2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:5040 -
C:\Users\Admin\AppData\Local\Temp\6CA9DB9B9460FCC18E55E931EDCEB1B0_NEIKIANALYTICS.EXE
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3492 -
C:\WINDOWS\MSWDM.EXE-e!C:\Windows\dev4798.tmp!C:\Users\Admin\AppData\Local\Temp\6CA9DB9B9460FCC18E55E931EDCEB1B0_NEIKIANALYTICS.EXE!3⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:4932
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
501KB
MD5e0dc15322e918743cf259d0f00de8493
SHA15037d7ae209976d3a47666a7e8a9e4b90fb40fca
SHA256b202b941e117ac7d2a97509ff7e22b8e65d23c31dd4020c016cfeb723e52b68b
SHA512b44978b68485e5157a6de01a5ffa2fa826c2397c8fd317335bd569bd43f2edf16ae4d636c82272c81e0e7663fa4c18ac8230b952c6b590b0bca1555121591a3c
-
Filesize
47KB
MD52af966e7672f1e9c626245551247fb3a
SHA1e951cfe9ab27dad1f3df6e8189d0cf9b6dbbf66c
SHA2566b493904f292ff29033f7c6570485a7bef4d83eb9a71b2e64b9fc3308017a6c8
SHA512dfa2ae6cf2ff64bb9e3f884c02d348a9e615e94e6cbd05ce8bc98ec98d22dead2b6007e7da9e1d9e2317d53366c58611100146a68ff44526e93ea71d2561c98e
-
Filesize
453KB
MD596f7cb9f7481a279bd4bc0681a3b993e
SHA1deaedb5becc6c0bd263d7cf81e0909b912a1afd4
SHA256d2893c55259772b554cb887d3e2e1f9c67f5cd5abac2ab9f4720dec507cdd290
SHA512694d2da36df04db25cc5972f7cc180b77e1cb0c3b5be8b69fe7e2d4e59555efb8aa7e50b1475ad5196ca638dabde2c796ae6faeb4a31f38166838cd1cc028149