Analysis
-
max time kernel
25s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
23-05-2024 01:56
Static task
static1
Behavioral task
behavioral1
Sample
728c0520e9525879c09caabd0dbe0c00_NeikiAnalytics.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
728c0520e9525879c09caabd0dbe0c00_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
728c0520e9525879c09caabd0dbe0c00_NeikiAnalytics.exe
-
Size
2.2MB
-
MD5
728c0520e9525879c09caabd0dbe0c00
-
SHA1
279903e6718f3659adac1f103028f615e2575e21
-
SHA256
81e1fc3019e7d37096977ea66e03dd675132b66c48c740294af3d6bba278d61b
-
SHA512
88f3ef7975eac94867486fc609890e8bd7c37939e331163f2b6c90cd78f0890bae44a7463ab2604613fd45947bd56ff1b2aa7649036a1cd4bbfb582237901fbc
-
SSDEEP
49152:Wb3+2CbRquA/m2yL5zbfFiV+XenmE3/z7:Wb3+7oq2Vjnm8
Malware Config
Signatures
-
Executes dropped EXE 4 IoCs
Processes:
MSWDM.EXEMSWDM.EXE728C0520E9525879C09CAABD0DBE0C00_NEIKIANALYTICS.EXEMSWDM.EXEpid process 2924 MSWDM.EXE 3912 MSWDM.EXE 752 728C0520E9525879C09CAABD0DBE0C00_NEIKIANALYTICS.EXE 3804 MSWDM.EXE -
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
MSWDM.EXE728c0520e9525879c09caabd0dbe0c00_NeikiAnalytics.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\WDM = "MSWDM.EXE" MSWDM.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunServices\WDM = "MSWDM.EXE" MSWDM.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\WDM = "MSWDM.EXE" 728c0520e9525879c09caabd0dbe0c00_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunServices\WDM = "MSWDM.EXE" 728c0520e9525879c09caabd0dbe0c00_NeikiAnalytics.exe -
Drops file in Windows directory 3 IoCs
Processes:
728c0520e9525879c09caabd0dbe0c00_NeikiAnalytics.exeMSWDM.EXEdescription ioc process File created C:\WINDOWS\MSWDM.EXE 728c0520e9525879c09caabd0dbe0c00_NeikiAnalytics.exe File opened for modification C:\Windows\dev40C2.tmp 728c0520e9525879c09caabd0dbe0c00_NeikiAnalytics.exe File opened for modification C:\Windows\dev40C2.tmp MSWDM.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
MSWDM.EXEpid process 3912 MSWDM.EXE 3912 MSWDM.EXE -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
728c0520e9525879c09caabd0dbe0c00_NeikiAnalytics.exeMSWDM.EXEdescription pid process target process PID 3572 wrote to memory of 2924 3572 728c0520e9525879c09caabd0dbe0c00_NeikiAnalytics.exe MSWDM.EXE PID 3572 wrote to memory of 2924 3572 728c0520e9525879c09caabd0dbe0c00_NeikiAnalytics.exe MSWDM.EXE PID 3572 wrote to memory of 2924 3572 728c0520e9525879c09caabd0dbe0c00_NeikiAnalytics.exe MSWDM.EXE PID 3572 wrote to memory of 3912 3572 728c0520e9525879c09caabd0dbe0c00_NeikiAnalytics.exe MSWDM.EXE PID 3572 wrote to memory of 3912 3572 728c0520e9525879c09caabd0dbe0c00_NeikiAnalytics.exe MSWDM.EXE PID 3572 wrote to memory of 3912 3572 728c0520e9525879c09caabd0dbe0c00_NeikiAnalytics.exe MSWDM.EXE PID 3912 wrote to memory of 752 3912 MSWDM.EXE 728C0520E9525879C09CAABD0DBE0C00_NEIKIANALYTICS.EXE PID 3912 wrote to memory of 752 3912 MSWDM.EXE 728C0520E9525879C09CAABD0DBE0C00_NEIKIANALYTICS.EXE PID 3912 wrote to memory of 3804 3912 MSWDM.EXE MSWDM.EXE PID 3912 wrote to memory of 3804 3912 MSWDM.EXE MSWDM.EXE PID 3912 wrote to memory of 3804 3912 MSWDM.EXE MSWDM.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\728c0520e9525879c09caabd0dbe0c00_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\728c0520e9525879c09caabd0dbe0c00_NeikiAnalytics.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:3572 -
C:\WINDOWS\MSWDM.EXE"C:\WINDOWS\MSWDM.EXE"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:2924 -
C:\WINDOWS\MSWDM.EXE-r!C:\Windows\dev40C2.tmp!C:\Users\Admin\AppData\Local\Temp\728c0520e9525879c09caabd0dbe0c00_NeikiAnalytics.exe! !2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3912 -
C:\Users\Admin\AppData\Local\Temp\728C0520E9525879C09CAABD0DBE0C00_NEIKIANALYTICS.EXE
- Executes dropped EXE
PID:752 -
C:\WINDOWS\MSWDM.EXE-e!C:\Windows\dev40C2.tmp!C:\Users\Admin\AppData\Local\Temp\728C0520E9525879C09CAABD0DBE0C00_NEIKIANALYTICS.EXE!3⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:3804
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.2MB
MD56c20c07b48011b0e775e84052fa61d85
SHA1ac01bb7b1b574df5b698cfcf42d497f77717b398
SHA256efabab26bcaaac7e3f460338802b8f7b6739cb8880827e570522767f883bf6cc
SHA512decde33f23ab2c7c79cb5b8382edd20eb6d1cbdac16a7ad307c4d16be45529900addeb58853257f69efe62cd9791e77d5c5c346868e8ac2bb20a910388aaf820
-
Filesize
47KB
MD5b6ed302a7f427fcdaf187c6c3e94c910
SHA1274b1bf1a66d5ce2f0dda87e112760537f91765e
SHA2566620c0d624e5d6c08f754d597f69d69b743e618806054170f0df725f5be169ba
SHA512482b94f41c5c1a2a18cfbfb3053cc2b36b7364086178d5f12bfb5c3c27957021ae016ca699ec0ab3003ce2d5365d26ba9e2244001cfbf716f6590a402b7d77b7
-
Filesize
2.1MB
MD5b8d69fa2755c3ab1f12f8866a8e2a4f7
SHA18e3cdfb20e158c2906323ba0094a18c7dd2aaf2d
SHA2567e0976036431640ae1d9f1c0b52bcea5dd37ef86cd3f5304dc8a96459d9483cd
SHA5125acac46068b331216978500f67a7fa5257bc5b05133fab6d88280b670ae4885ef2d5d1f531169b66bf1952e082f56b1ad2bc3901479b740f96c53ea405adda18