Analysis

  • max time kernel
    22s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240220-en
  • resource tags

    arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system
  • submitted
    23-05-2024 03:47

General

  • Target

    e15a26cb6c5196cf6859a5a401279f70_NeikiAnalytics.exe

  • Size

    501KB

  • MD5

    e15a26cb6c5196cf6859a5a401279f70

  • SHA1

    de3743d423f7548cf1dc8ffe4c11781dff76e705

  • SHA256

    f5c65f6c5ccd4a287e827df97079394b016a278fb8e9afd1ef4efb735863f655

  • SHA512

    b31be9a3307baa4a77fe39d31a920e90287c7214d40f5625d6999d495af7f9044d193eed391765bb99df65acf35e1d3778d931148132c445659d10f314330238

  • SSDEEP

    6144:wlj7cMnU+c78n5Qw0tneDA/sqhleIc0HftDrkYY1hj63hgDonsogCh6NEpAFF:wlbU+285bM3npxYfj63hgD1ZiW

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 1 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Drops file in Windows directory 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 19 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e15a26cb6c5196cf6859a5a401279f70_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\e15a26cb6c5196cf6859a5a401279f70_NeikiAnalytics.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    PID:2080
    • C:\WINDOWS\MSWDM.EXE
      "C:\WINDOWS\MSWDM.EXE"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      PID:1800
    • C:\WINDOWS\MSWDM.EXE
      -r!C:\Windows\dev12F4.tmp!C:\Users\Admin\AppData\Local\Temp\e15a26cb6c5196cf6859a5a401279f70_NeikiAnalytics.exe! !
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:2692
      • C:\Users\Admin\AppData\Local\Temp\E15A26CB6C5196CF6859A5A401279F70_NEIKIANALYTICS.EXE
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        PID:2620
      • C:\WINDOWS\MSWDM.EXE
        -e!C:\Windows\dev12F4.tmp!C:\Users\Admin\AppData\Local\Temp\E15A26CB6C5196CF6859A5A401279F70_NEIKIANALYTICS.EXE!
        3⤵
        • Executes dropped EXE
        • Drops file in Windows directory
        PID:2568

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\E15A26CB6C5196CF6859A5A401279F70_NEIKIANALYTICS.EXE

    Filesize

    501KB

    MD5

    8adb401eef6de9fd1a2949143c6c5b1e

    SHA1

    aa3d46b56326754683f7abbdf6f0114f9cfa2b26

    SHA256

    38b28ff46589eea8d00a9f14b8601d5c15b93fcbb21692225e2b2d02f32d9331

    SHA512

    eb1d1ce0d40e1f4a05018114bbf3ddc9afa209eb211f0379e0bf32aacfa365d6996f0aab34f06eba2dafc2b11f771bbd03c7c2d03cec09a70c276b4cabf52355

  • C:\Windows\MSWDM.EXE

    Filesize

    47KB

    MD5

    2af966e7672f1e9c626245551247fb3a

    SHA1

    e951cfe9ab27dad1f3df6e8189d0cf9b6dbbf66c

    SHA256

    6b493904f292ff29033f7c6570485a7bef4d83eb9a71b2e64b9fc3308017a6c8

    SHA512

    dfa2ae6cf2ff64bb9e3f884c02d348a9e615e94e6cbd05ce8bc98ec98d22dead2b6007e7da9e1d9e2317d53366c58611100146a68ff44526e93ea71d2561c98e

  • C:\Windows\dev12F4.tmp

    Filesize

    453KB

    MD5

    96f7cb9f7481a279bd4bc0681a3b993e

    SHA1

    deaedb5becc6c0bd263d7cf81e0909b912a1afd4

    SHA256

    d2893c55259772b554cb887d3e2e1f9c67f5cd5abac2ab9f4720dec507cdd290

    SHA512

    694d2da36df04db25cc5972f7cc180b77e1cb0c3b5be8b69fe7e2d4e59555efb8aa7e50b1475ad5196ca638dabde2c796ae6faeb4a31f38166838cd1cc028149

  • memory/1800-16-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/1800-33-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/2080-1-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/2080-3-0x0000000000270000-0x000000000028B000-memory.dmp

    Filesize

    108KB

  • memory/2080-14-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/2568-29-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/2692-32-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB