Analysis

  • max time kernel
    30s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    25-05-2024 20:21

General

  • Target

    1a57255d4fd7b8b953915f49460edb20_NeikiAnalytics.exe

  • Size

    383KB

  • MD5

    1a57255d4fd7b8b953915f49460edb20

  • SHA1

    1d36883ba5f2a2087fbdc01648d7259e58ed911a

  • SHA256

    f47c05f7b964cc637f3126cd57559a509848cd9b6ee21978b748e955dd9a3487

  • SHA512

    618872ea375d0a94258d23d6858b4c0e25b24fa98bc58cadfecd3acd222f38205e8e2b5cd1f450f530085675c96bbe05fdd60397d8ef1f8d7c52a3a2b7988dcb

  • SSDEEP

    6144:wlj7cMnI+UzU66bkWmchVySqkvAH3qo0wWJC6G/SMT4FWqCC:wlbI+8U66b5zhVymA/XSRh3

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 1 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Drops file in Windows directory 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1a57255d4fd7b8b953915f49460edb20_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\1a57255d4fd7b8b953915f49460edb20_NeikiAnalytics.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    PID:2732
    • C:\WINDOWS\MSWDM.EXE
      "C:\WINDOWS\MSWDM.EXE"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      PID:2840
    • C:\WINDOWS\MSWDM.EXE
      -r!C:\Windows\dev1008.tmp!C:\Users\Admin\AppData\Local\Temp\1a57255d4fd7b8b953915f49460edb20_NeikiAnalytics.exe! !
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:2912
      • C:\Users\Admin\AppData\Local\Temp\1A57255D4FD7B8B953915F49460EDB20_NEIKIANALYTICS.EXE
        3⤵
        • Executes dropped EXE
        PID:2580
      • C:\WINDOWS\MSWDM.EXE
        -e!C:\Windows\dev1008.tmp!C:\Users\Admin\AppData\Local\Temp\1A57255D4FD7B8B953915F49460EDB20_NEIKIANALYTICS.EXE!
        3⤵
        • Executes dropped EXE
        PID:2660

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\MSWDM.EXE

    Filesize

    47KB

    MD5

    8281630c34398a6569e720407a61ca05

    SHA1

    d983308e8fe1bab035342cd8d2ddc63cd9ce1ac0

    SHA256

    8f0e45e4b02d7e47c2a82eaf263756167dbc07fb1e50eaf7f8f0b232d4d097e0

    SHA512

    483fab964c6e7899af972bc14101ef225722ff09f544ab2e2dc37f0af781c20b3a526610922c0fe2a1d7dc53ffc7ee0ee6a030bc73b1f2b35f7ea36568945187

  • C:\Windows\dev1008.tmp

    Filesize

    335KB

    MD5

    40ac62c087648ccc2c58dae066d34c98

    SHA1

    0e87efb6ddfe59e534ea9e829cad35be8563e5f7

    SHA256

    482c4c1562490e164d5f17990253373691aa5eab55a81c7f890fe9583a9ea916

    SHA512

    0c1ff13ff88409d54fee2ceb07fe65135ce2a9aa6f8da51ac0158abb2cfbb3a898ef26f476931986f1367622f21a7c0b0e742d0f4de8be6e215596b0d88c518f

  • memory/2660-27-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/2732-0-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/2732-15-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/2732-9-0x0000000000280000-0x000000000029B000-memory.dmp

    Filesize

    108KB

  • memory/2732-8-0x0000000000280000-0x000000000029B000-memory.dmp

    Filesize

    108KB

  • memory/2840-16-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/2840-31-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/2912-30-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/2912-23-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB