Analysis
-
max time kernel
22s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
23-05-2024 03:47
Static task
static1
Behavioral task
behavioral1
Sample
e15a26cb6c5196cf6859a5a401279f70_NeikiAnalytics.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
e15a26cb6c5196cf6859a5a401279f70_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
e15a26cb6c5196cf6859a5a401279f70_NeikiAnalytics.exe
-
Size
501KB
-
MD5
e15a26cb6c5196cf6859a5a401279f70
-
SHA1
de3743d423f7548cf1dc8ffe4c11781dff76e705
-
SHA256
f5c65f6c5ccd4a287e827df97079394b016a278fb8e9afd1ef4efb735863f655
-
SHA512
b31be9a3307baa4a77fe39d31a920e90287c7214d40f5625d6999d495af7f9044d193eed391765bb99df65acf35e1d3778d931148132c445659d10f314330238
-
SSDEEP
6144:wlj7cMnU+c78n5Qw0tneDA/sqhleIc0HftDrkYY1hj63hgDonsogCh6NEpAFF:wlbU+285bM3npxYfj63hgD1ZiW
Malware Config
Signatures
-
Executes dropped EXE 4 IoCs
pid Process 1800 MSWDM.EXE 2692 MSWDM.EXE 2620 E15A26CB6C5196CF6859A5A401279F70_NEIKIANALYTICS.EXE 2568 MSWDM.EXE -
Loads dropped DLL 1 IoCs
pid Process 2692 MSWDM.EXE -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\WDM = "MSWDM.EXE" e15a26cb6c5196cf6859a5a401279f70_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunServices\WDM = "MSWDM.EXE" e15a26cb6c5196cf6859a5a401279f70_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\WDM = "MSWDM.EXE" MSWDM.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunServices\WDM = "MSWDM.EXE" MSWDM.EXE -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\WINDOWS\MSWDM.EXE e15a26cb6c5196cf6859a5a401279f70_NeikiAnalytics.exe File opened for modification C:\Windows\dev12F4.tmp e15a26cb6c5196cf6859a5a401279f70_NeikiAnalytics.exe File opened for modification C:\Windows\dev12F4.tmp MSWDM.EXE -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2692 MSWDM.EXE -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2620 E15A26CB6C5196CF6859A5A401279F70_NEIKIANALYTICS.EXE 2620 E15A26CB6C5196CF6859A5A401279F70_NEIKIANALYTICS.EXE 2620 E15A26CB6C5196CF6859A5A401279F70_NEIKIANALYTICS.EXE -
Suspicious use of WriteProcessMemory 19 IoCs
description pid Process procid_target PID 2080 wrote to memory of 1800 2080 e15a26cb6c5196cf6859a5a401279f70_NeikiAnalytics.exe 28 PID 2080 wrote to memory of 1800 2080 e15a26cb6c5196cf6859a5a401279f70_NeikiAnalytics.exe 28 PID 2080 wrote to memory of 1800 2080 e15a26cb6c5196cf6859a5a401279f70_NeikiAnalytics.exe 28 PID 2080 wrote to memory of 1800 2080 e15a26cb6c5196cf6859a5a401279f70_NeikiAnalytics.exe 28 PID 2080 wrote to memory of 2692 2080 e15a26cb6c5196cf6859a5a401279f70_NeikiAnalytics.exe 29 PID 2080 wrote to memory of 2692 2080 e15a26cb6c5196cf6859a5a401279f70_NeikiAnalytics.exe 29 PID 2080 wrote to memory of 2692 2080 e15a26cb6c5196cf6859a5a401279f70_NeikiAnalytics.exe 29 PID 2080 wrote to memory of 2692 2080 e15a26cb6c5196cf6859a5a401279f70_NeikiAnalytics.exe 29 PID 2692 wrote to memory of 2620 2692 MSWDM.EXE 30 PID 2692 wrote to memory of 2620 2692 MSWDM.EXE 30 PID 2692 wrote to memory of 2620 2692 MSWDM.EXE 30 PID 2692 wrote to memory of 2620 2692 MSWDM.EXE 30 PID 2692 wrote to memory of 2620 2692 MSWDM.EXE 30 PID 2692 wrote to memory of 2620 2692 MSWDM.EXE 30 PID 2692 wrote to memory of 2620 2692 MSWDM.EXE 30 PID 2692 wrote to memory of 2568 2692 MSWDM.EXE 31 PID 2692 wrote to memory of 2568 2692 MSWDM.EXE 31 PID 2692 wrote to memory of 2568 2692 MSWDM.EXE 31 PID 2692 wrote to memory of 2568 2692 MSWDM.EXE 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\e15a26cb6c5196cf6859a5a401279f70_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\e15a26cb6c5196cf6859a5a401279f70_NeikiAnalytics.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2080 -
C:\WINDOWS\MSWDM.EXE"C:\WINDOWS\MSWDM.EXE"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:1800
-
-
C:\WINDOWS\MSWDM.EXE-r!C:\Windows\dev12F4.tmp!C:\Users\Admin\AppData\Local\Temp\e15a26cb6c5196cf6859a5a401279f70_NeikiAnalytics.exe! !2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2692 -
C:\Users\Admin\AppData\Local\Temp\E15A26CB6C5196CF6859A5A401279F70_NEIKIANALYTICS.EXE
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2620
-
-
C:\WINDOWS\MSWDM.EXE-e!C:\Windows\dev12F4.tmp!C:\Users\Admin\AppData\Local\Temp\E15A26CB6C5196CF6859A5A401279F70_NEIKIANALYTICS.EXE!3⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:2568
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
501KB
MD58adb401eef6de9fd1a2949143c6c5b1e
SHA1aa3d46b56326754683f7abbdf6f0114f9cfa2b26
SHA25638b28ff46589eea8d00a9f14b8601d5c15b93fcbb21692225e2b2d02f32d9331
SHA512eb1d1ce0d40e1f4a05018114bbf3ddc9afa209eb211f0379e0bf32aacfa365d6996f0aab34f06eba2dafc2b11f771bbd03c7c2d03cec09a70c276b4cabf52355
-
Filesize
47KB
MD52af966e7672f1e9c626245551247fb3a
SHA1e951cfe9ab27dad1f3df6e8189d0cf9b6dbbf66c
SHA2566b493904f292ff29033f7c6570485a7bef4d83eb9a71b2e64b9fc3308017a6c8
SHA512dfa2ae6cf2ff64bb9e3f884c02d348a9e615e94e6cbd05ce8bc98ec98d22dead2b6007e7da9e1d9e2317d53366c58611100146a68ff44526e93ea71d2561c98e
-
Filesize
453KB
MD596f7cb9f7481a279bd4bc0681a3b993e
SHA1deaedb5becc6c0bd263d7cf81e0909b912a1afd4
SHA256d2893c55259772b554cb887d3e2e1f9c67f5cd5abac2ab9f4720dec507cdd290
SHA512694d2da36df04db25cc5972f7cc180b77e1cb0c3b5be8b69fe7e2d4e59555efb8aa7e50b1475ad5196ca638dabde2c796ae6faeb4a31f38166838cd1cc028149