Analysis
-
max time kernel
30s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
25-05-2024 20:21
Static task
static1
Behavioral task
behavioral1
Sample
1a57255d4fd7b8b953915f49460edb20_NeikiAnalytics.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
1a57255d4fd7b8b953915f49460edb20_NeikiAnalytics.exe
Resource
win10v2004-20240426-en
General
-
Target
1a57255d4fd7b8b953915f49460edb20_NeikiAnalytics.exe
-
Size
383KB
-
MD5
1a57255d4fd7b8b953915f49460edb20
-
SHA1
1d36883ba5f2a2087fbdc01648d7259e58ed911a
-
SHA256
f47c05f7b964cc637f3126cd57559a509848cd9b6ee21978b748e955dd9a3487
-
SHA512
618872ea375d0a94258d23d6858b4c0e25b24fa98bc58cadfecd3acd222f38205e8e2b5cd1f450f530085675c96bbe05fdd60397d8ef1f8d7c52a3a2b7988dcb
-
SSDEEP
6144:wlj7cMnI+UzU66bkWmchVySqkvAH3qo0wWJC6G/SMT4FWqCC:wlbI+8U66b5zhVymA/XSRh3
Malware Config
Signatures
-
Executes dropped EXE 4 IoCs
pid Process 2840 MSWDM.EXE 2912 MSWDM.EXE 2580 1A57255D4FD7B8B953915F49460EDB20_NEIKIANALYTICS.EXE 2660 MSWDM.EXE -
Loads dropped DLL 1 IoCs
pid Process 2912 MSWDM.EXE -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunServices\WDM = "MSWDM.EXE" 1a57255d4fd7b8b953915f49460edb20_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\WDM = "MSWDM.EXE" MSWDM.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunServices\WDM = "MSWDM.EXE" MSWDM.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\WDM = "MSWDM.EXE" 1a57255d4fd7b8b953915f49460edb20_NeikiAnalytics.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\dev1008.tmp 1a57255d4fd7b8b953915f49460edb20_NeikiAnalytics.exe File created C:\WINDOWS\MSWDM.EXE 1a57255d4fd7b8b953915f49460edb20_NeikiAnalytics.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2912 MSWDM.EXE -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 2732 wrote to memory of 2840 2732 1a57255d4fd7b8b953915f49460edb20_NeikiAnalytics.exe 28 PID 2732 wrote to memory of 2840 2732 1a57255d4fd7b8b953915f49460edb20_NeikiAnalytics.exe 28 PID 2732 wrote to memory of 2840 2732 1a57255d4fd7b8b953915f49460edb20_NeikiAnalytics.exe 28 PID 2732 wrote to memory of 2840 2732 1a57255d4fd7b8b953915f49460edb20_NeikiAnalytics.exe 28 PID 2732 wrote to memory of 2912 2732 1a57255d4fd7b8b953915f49460edb20_NeikiAnalytics.exe 29 PID 2732 wrote to memory of 2912 2732 1a57255d4fd7b8b953915f49460edb20_NeikiAnalytics.exe 29 PID 2732 wrote to memory of 2912 2732 1a57255d4fd7b8b953915f49460edb20_NeikiAnalytics.exe 29 PID 2732 wrote to memory of 2912 2732 1a57255d4fd7b8b953915f49460edb20_NeikiAnalytics.exe 29 PID 2912 wrote to memory of 2580 2912 MSWDM.EXE 30 PID 2912 wrote to memory of 2580 2912 MSWDM.EXE 30 PID 2912 wrote to memory of 2580 2912 MSWDM.EXE 30 PID 2912 wrote to memory of 2580 2912 MSWDM.EXE 30 PID 2912 wrote to memory of 2660 2912 MSWDM.EXE 31 PID 2912 wrote to memory of 2660 2912 MSWDM.EXE 31 PID 2912 wrote to memory of 2660 2912 MSWDM.EXE 31 PID 2912 wrote to memory of 2660 2912 MSWDM.EXE 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\1a57255d4fd7b8b953915f49460edb20_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\1a57255d4fd7b8b953915f49460edb20_NeikiAnalytics.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2732 -
C:\WINDOWS\MSWDM.EXE"C:\WINDOWS\MSWDM.EXE"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:2840
-
-
C:\WINDOWS\MSWDM.EXE-r!C:\Windows\dev1008.tmp!C:\Users\Admin\AppData\Local\Temp\1a57255d4fd7b8b953915f49460edb20_NeikiAnalytics.exe! !2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2912 -
C:\Users\Admin\AppData\Local\Temp\1A57255D4FD7B8B953915F49460EDB20_NEIKIANALYTICS.EXE
- Executes dropped EXE
PID:2580
-
-
C:\WINDOWS\MSWDM.EXE-e!C:\Windows\dev1008.tmp!C:\Users\Admin\AppData\Local\Temp\1A57255D4FD7B8B953915F49460EDB20_NEIKIANALYTICS.EXE!3⤵
- Executes dropped EXE
PID:2660
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
47KB
MD58281630c34398a6569e720407a61ca05
SHA1d983308e8fe1bab035342cd8d2ddc63cd9ce1ac0
SHA2568f0e45e4b02d7e47c2a82eaf263756167dbc07fb1e50eaf7f8f0b232d4d097e0
SHA512483fab964c6e7899af972bc14101ef225722ff09f544ab2e2dc37f0af781c20b3a526610922c0fe2a1d7dc53ffc7ee0ee6a030bc73b1f2b35f7ea36568945187
-
Filesize
335KB
MD540ac62c087648ccc2c58dae066d34c98
SHA10e87efb6ddfe59e534ea9e829cad35be8563e5f7
SHA256482c4c1562490e164d5f17990253373691aa5eab55a81c7f890fe9583a9ea916
SHA5120c1ff13ff88409d54fee2ceb07fe65135ce2a9aa6f8da51ac0158abb2cfbb3a898ef26f476931986f1367622f21a7c0b0e742d0f4de8be6e215596b0d88c518f