Analysis
-
max time kernel
19s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
23-05-2024 01:56
Static task
static1
Behavioral task
behavioral1
Sample
728c0520e9525879c09caabd0dbe0c00_NeikiAnalytics.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
728c0520e9525879c09caabd0dbe0c00_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
728c0520e9525879c09caabd0dbe0c00_NeikiAnalytics.exe
-
Size
2.2MB
-
MD5
728c0520e9525879c09caabd0dbe0c00
-
SHA1
279903e6718f3659adac1f103028f615e2575e21
-
SHA256
81e1fc3019e7d37096977ea66e03dd675132b66c48c740294af3d6bba278d61b
-
SHA512
88f3ef7975eac94867486fc609890e8bd7c37939e331163f2b6c90cd78f0890bae44a7463ab2604613fd45947bd56ff1b2aa7649036a1cd4bbfb582237901fbc
-
SSDEEP
49152:Wb3+2CbRquA/m2yL5zbfFiV+XenmE3/z7:Wb3+7oq2Vjnm8
Malware Config
Signatures
-
Executes dropped EXE 4 IoCs
Processes:
MSWDM.EXEMSWDM.EXE728C0520E9525879C09CAABD0DBE0C00_NEIKIANALYTICS.EXEMSWDM.EXEpid process 2284 MSWDM.EXE 1612 MSWDM.EXE 2672 728C0520E9525879C09CAABD0DBE0C00_NEIKIANALYTICS.EXE 2688 MSWDM.EXE -
Loads dropped DLL 2 IoCs
Processes:
MSWDM.EXEpid process 2284 MSWDM.EXE 2668 -
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
728c0520e9525879c09caabd0dbe0c00_NeikiAnalytics.exeMSWDM.EXEdescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\WDM = "MSWDM.EXE" 728c0520e9525879c09caabd0dbe0c00_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunServices\WDM = "MSWDM.EXE" 728c0520e9525879c09caabd0dbe0c00_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\WDM = "MSWDM.EXE" MSWDM.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunServices\WDM = "MSWDM.EXE" MSWDM.EXE -
Drops file in Windows directory 2 IoCs
Processes:
728c0520e9525879c09caabd0dbe0c00_NeikiAnalytics.exedescription ioc process File created C:\WINDOWS\MSWDM.EXE 728c0520e9525879c09caabd0dbe0c00_NeikiAnalytics.exe File opened for modification C:\Windows\dev2424.tmp 728c0520e9525879c09caabd0dbe0c00_NeikiAnalytics.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
MSWDM.EXEpid process 2284 MSWDM.EXE -
Suspicious use of WriteProcessMemory 16 IoCs
Processes:
728c0520e9525879c09caabd0dbe0c00_NeikiAnalytics.exeMSWDM.EXEdescription pid process target process PID 620 wrote to memory of 1612 620 728c0520e9525879c09caabd0dbe0c00_NeikiAnalytics.exe MSWDM.EXE PID 620 wrote to memory of 1612 620 728c0520e9525879c09caabd0dbe0c00_NeikiAnalytics.exe MSWDM.EXE PID 620 wrote to memory of 1612 620 728c0520e9525879c09caabd0dbe0c00_NeikiAnalytics.exe MSWDM.EXE PID 620 wrote to memory of 1612 620 728c0520e9525879c09caabd0dbe0c00_NeikiAnalytics.exe MSWDM.EXE PID 620 wrote to memory of 2284 620 728c0520e9525879c09caabd0dbe0c00_NeikiAnalytics.exe MSWDM.EXE PID 620 wrote to memory of 2284 620 728c0520e9525879c09caabd0dbe0c00_NeikiAnalytics.exe MSWDM.EXE PID 620 wrote to memory of 2284 620 728c0520e9525879c09caabd0dbe0c00_NeikiAnalytics.exe MSWDM.EXE PID 620 wrote to memory of 2284 620 728c0520e9525879c09caabd0dbe0c00_NeikiAnalytics.exe MSWDM.EXE PID 2284 wrote to memory of 2672 2284 MSWDM.EXE 728C0520E9525879C09CAABD0DBE0C00_NEIKIANALYTICS.EXE PID 2284 wrote to memory of 2672 2284 MSWDM.EXE 728C0520E9525879C09CAABD0DBE0C00_NEIKIANALYTICS.EXE PID 2284 wrote to memory of 2672 2284 MSWDM.EXE 728C0520E9525879C09CAABD0DBE0C00_NEIKIANALYTICS.EXE PID 2284 wrote to memory of 2672 2284 MSWDM.EXE 728C0520E9525879C09CAABD0DBE0C00_NEIKIANALYTICS.EXE PID 2284 wrote to memory of 2688 2284 MSWDM.EXE MSWDM.EXE PID 2284 wrote to memory of 2688 2284 MSWDM.EXE MSWDM.EXE PID 2284 wrote to memory of 2688 2284 MSWDM.EXE MSWDM.EXE PID 2284 wrote to memory of 2688 2284 MSWDM.EXE MSWDM.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\728c0520e9525879c09caabd0dbe0c00_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\728c0520e9525879c09caabd0dbe0c00_NeikiAnalytics.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:620 -
C:\WINDOWS\MSWDM.EXE"C:\WINDOWS\MSWDM.EXE"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:1612 -
C:\WINDOWS\MSWDM.EXE-r!C:\Windows\dev2424.tmp!C:\Users\Admin\AppData\Local\Temp\728c0520e9525879c09caabd0dbe0c00_NeikiAnalytics.exe! !2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2284 -
C:\Users\Admin\AppData\Local\Temp\728C0520E9525879C09CAABD0DBE0C00_NEIKIANALYTICS.EXE
- Executes dropped EXE
PID:2672 -
C:\WINDOWS\MSWDM.EXE-e!C:\Windows\dev2424.tmp!C:\Users\Admin\AppData\Local\Temp\728C0520E9525879C09CAABD0DBE0C00_NEIKIANALYTICS.EXE!3⤵
- Executes dropped EXE
PID:2688
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
47KB
MD5b6ed302a7f427fcdaf187c6c3e94c910
SHA1274b1bf1a66d5ce2f0dda87e112760537f91765e
SHA2566620c0d624e5d6c08f754d597f69d69b743e618806054170f0df725f5be169ba
SHA512482b94f41c5c1a2a18cfbfb3053cc2b36b7364086178d5f12bfb5c3c27957021ae016ca699ec0ab3003ce2d5365d26ba9e2244001cfbf716f6590a402b7d77b7
-
Filesize
2.1MB
MD5b8d69fa2755c3ab1f12f8866a8e2a4f7
SHA18e3cdfb20e158c2906323ba0094a18c7dd2aaf2d
SHA2567e0976036431640ae1d9f1c0b52bcea5dd37ef86cd3f5304dc8a96459d9483cd
SHA5125acac46068b331216978500f67a7fa5257bc5b05133fab6d88280b670ae4885ef2d5d1f531169b66bf1952e082f56b1ad2bc3901479b740f96c53ea405adda18