Analysis
-
max time kernel
23s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
23/05/2024, 03:47
Static task
static1
Behavioral task
behavioral1
Sample
e15a26cb6c5196cf6859a5a401279f70_NeikiAnalytics.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
e15a26cb6c5196cf6859a5a401279f70_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
e15a26cb6c5196cf6859a5a401279f70_NeikiAnalytics.exe
-
Size
501KB
-
MD5
e15a26cb6c5196cf6859a5a401279f70
-
SHA1
de3743d423f7548cf1dc8ffe4c11781dff76e705
-
SHA256
f5c65f6c5ccd4a287e827df97079394b016a278fb8e9afd1ef4efb735863f655
-
SHA512
b31be9a3307baa4a77fe39d31a920e90287c7214d40f5625d6999d495af7f9044d193eed391765bb99df65acf35e1d3778d931148132c445659d10f314330238
-
SSDEEP
6144:wlj7cMnU+c78n5Qw0tneDA/sqhleIc0HftDrkYY1hj63hgDonsogCh6NEpAFF:wlbU+285bM3npxYfj63hgD1ZiW
Malware Config
Signatures
-
Executes dropped EXE 4 IoCs
pid Process 324 MSWDM.EXE 232 MSWDM.EXE 5100 E15A26CB6C5196CF6859A5A401279F70_NEIKIANALYTICS.EXE 1532 MSWDM.EXE -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\WDM = "MSWDM.EXE" e15a26cb6c5196cf6859a5a401279f70_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunServices\WDM = "MSWDM.EXE" e15a26cb6c5196cf6859a5a401279f70_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\WDM = "MSWDM.EXE" MSWDM.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunServices\WDM = "MSWDM.EXE" MSWDM.EXE -
Drops file in Windows directory 3 IoCs
description ioc Process File opened for modification C:\Windows\dev4788.tmp e15a26cb6c5196cf6859a5a401279f70_NeikiAnalytics.exe File opened for modification C:\Windows\dev4788.tmp MSWDM.EXE File created C:\WINDOWS\MSWDM.EXE e15a26cb6c5196cf6859a5a401279f70_NeikiAnalytics.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 232 MSWDM.EXE 232 MSWDM.EXE -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 5100 E15A26CB6C5196CF6859A5A401279F70_NEIKIANALYTICS.EXE 5100 E15A26CB6C5196CF6859A5A401279F70_NEIKIANALYTICS.EXE 5100 E15A26CB6C5196CF6859A5A401279F70_NEIKIANALYTICS.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4272 wrote to memory of 324 4272 e15a26cb6c5196cf6859a5a401279f70_NeikiAnalytics.exe 83 PID 4272 wrote to memory of 324 4272 e15a26cb6c5196cf6859a5a401279f70_NeikiAnalytics.exe 83 PID 4272 wrote to memory of 324 4272 e15a26cb6c5196cf6859a5a401279f70_NeikiAnalytics.exe 83 PID 4272 wrote to memory of 232 4272 e15a26cb6c5196cf6859a5a401279f70_NeikiAnalytics.exe 84 PID 4272 wrote to memory of 232 4272 e15a26cb6c5196cf6859a5a401279f70_NeikiAnalytics.exe 84 PID 4272 wrote to memory of 232 4272 e15a26cb6c5196cf6859a5a401279f70_NeikiAnalytics.exe 84 PID 232 wrote to memory of 5100 232 MSWDM.EXE 85 PID 232 wrote to memory of 5100 232 MSWDM.EXE 85 PID 232 wrote to memory of 5100 232 MSWDM.EXE 85 PID 232 wrote to memory of 1532 232 MSWDM.EXE 86 PID 232 wrote to memory of 1532 232 MSWDM.EXE 86 PID 232 wrote to memory of 1532 232 MSWDM.EXE 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\e15a26cb6c5196cf6859a5a401279f70_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\e15a26cb6c5196cf6859a5a401279f70_NeikiAnalytics.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:4272 -
C:\WINDOWS\MSWDM.EXE"C:\WINDOWS\MSWDM.EXE"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:324
-
-
C:\WINDOWS\MSWDM.EXE-r!C:\Windows\dev4788.tmp!C:\Users\Admin\AppData\Local\Temp\e15a26cb6c5196cf6859a5a401279f70_NeikiAnalytics.exe! !2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:232 -
C:\Users\Admin\AppData\Local\Temp\E15A26CB6C5196CF6859A5A401279F70_NEIKIANALYTICS.EXE
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:5100
-
-
C:\WINDOWS\MSWDM.EXE-e!C:\Windows\dev4788.tmp!C:\Users\Admin\AppData\Local\Temp\E15A26CB6C5196CF6859A5A401279F70_NEIKIANALYTICS.EXE!3⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:1532
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
501KB
MD58adb401eef6de9fd1a2949143c6c5b1e
SHA1aa3d46b56326754683f7abbdf6f0114f9cfa2b26
SHA25638b28ff46589eea8d00a9f14b8601d5c15b93fcbb21692225e2b2d02f32d9331
SHA512eb1d1ce0d40e1f4a05018114bbf3ddc9afa209eb211f0379e0bf32aacfa365d6996f0aab34f06eba2dafc2b11f771bbd03c7c2d03cec09a70c276b4cabf52355
-
Filesize
453KB
MD596f7cb9f7481a279bd4bc0681a3b993e
SHA1deaedb5becc6c0bd263d7cf81e0909b912a1afd4
SHA256d2893c55259772b554cb887d3e2e1f9c67f5cd5abac2ab9f4720dec507cdd290
SHA512694d2da36df04db25cc5972f7cc180b77e1cb0c3b5be8b69fe7e2d4e59555efb8aa7e50b1475ad5196ca638dabde2c796ae6faeb4a31f38166838cd1cc028149
-
Filesize
47KB
MD52af966e7672f1e9c626245551247fb3a
SHA1e951cfe9ab27dad1f3df6e8189d0cf9b6dbbf66c
SHA2566b493904f292ff29033f7c6570485a7bef4d83eb9a71b2e64b9fc3308017a6c8
SHA512dfa2ae6cf2ff64bb9e3f884c02d348a9e615e94e6cbd05ce8bc98ec98d22dead2b6007e7da9e1d9e2317d53366c58611100146a68ff44526e93ea71d2561c98e