Analysis
-
max time kernel
10s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
27-05-2024 23:06
Behavioral task
behavioral1
Sample
25b8291f6dfe85f8c5ca862dd1fd3570_NeikiAnalytics.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
25b8291f6dfe85f8c5ca862dd1fd3570_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
25b8291f6dfe85f8c5ca862dd1fd3570_NeikiAnalytics.exe
-
Size
622KB
-
MD5
25b8291f6dfe85f8c5ca862dd1fd3570
-
SHA1
d1dcab4d3fb6fb9b678763af58e6624a6b5f396e
-
SHA256
ad1e30f94827476caaedc55032a18f3ffe9b73bff4ca956bad12e6e34595ebe1
-
SHA512
b1532b7911bc451fbd770587bf946f74db9994edbc0495e0ce068883be2468d136ef7a351d09afb1500402598601d414d6b9ab206db4d00c1832739a5f991f57
-
SSDEEP
6144:AJ51+Egd1Jpz1gL5pRTMTTjMkId/BynSx7dEe6XwzRaktNP08NhKs39zo43fTtlo:q51xQ1gL5pRTcAkS/3hzN8qE43fm78Vi
Malware Config
Signatures
-
Executes dropped EXE 10 IoCs
pid Process 1792 MSWDM.EXE 2028 MSWDM.EXE 2640 25B8291F6DFE85F8C5CA862DD1FD3570_NEIKIANALYTICS.EXE 1208 Process not Found 2552 MSWDM.EXE 1792 MSWDM.EXE 2028 MSWDM.EXE 2640 25B8291F6DFE85F8C5CA862DD1FD3570_NEIKIANALYTICS.EXE 1208 Process not Found 2552 MSWDM.EXE -
Loads dropped DLL 6 IoCs
pid Process 2028 MSWDM.EXE 2672 Process not Found 1208 Process not Found 2028 MSWDM.EXE 2672 Process not Found 1208 Process not Found -
resource yara_rule behavioral1/memory/2040-0-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2040-8-0x0000000000250000-0x0000000000279000-memory.dmp upx behavioral1/memory/2040-13-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2028-25-0x00000000002D0000-0x00000000002F9000-memory.dmp upx behavioral1/memory/2028-29-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2552-27-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1792-30-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2040-0-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2040-8-0x0000000000250000-0x0000000000279000-memory.dmp upx behavioral1/memory/2040-13-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2028-25-0x00000000002D0000-0x00000000002F9000-memory.dmp upx behavioral1/memory/2028-29-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2552-27-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1792-30-0x0000000000400000-0x0000000000429000-memory.dmp upx -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunServices\WDM = "MSWDM.EXE" MSWDM.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\WDM = "MSWDM.EXE" 25b8291f6dfe85f8c5ca862dd1fd3570_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunServices\WDM = "MSWDM.EXE" 25b8291f6dfe85f8c5ca862dd1fd3570_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\WDM = "MSWDM.EXE" MSWDM.EXE -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\WINDOWS\MSWDM.EXE 25b8291f6dfe85f8c5ca862dd1fd3570_NeikiAnalytics.exe File opened for modification C:\Windows\dev10A4.tmp 25b8291f6dfe85f8c5ca862dd1fd3570_NeikiAnalytics.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2028 MSWDM.EXE 2028 MSWDM.EXE -
Suspicious use of WriteProcessMemory 32 IoCs
description pid Process procid_target PID 2040 wrote to memory of 1792 2040 25b8291f6dfe85f8c5ca862dd1fd3570_NeikiAnalytics.exe 28 PID 2040 wrote to memory of 1792 2040 25b8291f6dfe85f8c5ca862dd1fd3570_NeikiAnalytics.exe 28 PID 2040 wrote to memory of 1792 2040 25b8291f6dfe85f8c5ca862dd1fd3570_NeikiAnalytics.exe 28 PID 2040 wrote to memory of 1792 2040 25b8291f6dfe85f8c5ca862dd1fd3570_NeikiAnalytics.exe 28 PID 2040 wrote to memory of 2028 2040 25b8291f6dfe85f8c5ca862dd1fd3570_NeikiAnalytics.exe 29 PID 2040 wrote to memory of 2028 2040 25b8291f6dfe85f8c5ca862dd1fd3570_NeikiAnalytics.exe 29 PID 2040 wrote to memory of 2028 2040 25b8291f6dfe85f8c5ca862dd1fd3570_NeikiAnalytics.exe 29 PID 2040 wrote to memory of 2028 2040 25b8291f6dfe85f8c5ca862dd1fd3570_NeikiAnalytics.exe 29 PID 2028 wrote to memory of 2640 2028 MSWDM.EXE 30 PID 2028 wrote to memory of 2640 2028 MSWDM.EXE 30 PID 2028 wrote to memory of 2640 2028 MSWDM.EXE 30 PID 2028 wrote to memory of 2640 2028 MSWDM.EXE 30 PID 2028 wrote to memory of 2552 2028 MSWDM.EXE 32 PID 2028 wrote to memory of 2552 2028 MSWDM.EXE 32 PID 2028 wrote to memory of 2552 2028 MSWDM.EXE 32 PID 2028 wrote to memory of 2552 2028 MSWDM.EXE 32 PID 2040 wrote to memory of 1792 2040 25b8291f6dfe85f8c5ca862dd1fd3570_NeikiAnalytics.exe 28 PID 2040 wrote to memory of 1792 2040 25b8291f6dfe85f8c5ca862dd1fd3570_NeikiAnalytics.exe 28 PID 2040 wrote to memory of 1792 2040 25b8291f6dfe85f8c5ca862dd1fd3570_NeikiAnalytics.exe 28 PID 2040 wrote to memory of 1792 2040 25b8291f6dfe85f8c5ca862dd1fd3570_NeikiAnalytics.exe 28 PID 2040 wrote to memory of 2028 2040 25b8291f6dfe85f8c5ca862dd1fd3570_NeikiAnalytics.exe 29 PID 2040 wrote to memory of 2028 2040 25b8291f6dfe85f8c5ca862dd1fd3570_NeikiAnalytics.exe 29 PID 2040 wrote to memory of 2028 2040 25b8291f6dfe85f8c5ca862dd1fd3570_NeikiAnalytics.exe 29 PID 2040 wrote to memory of 2028 2040 25b8291f6dfe85f8c5ca862dd1fd3570_NeikiAnalytics.exe 29 PID 2028 wrote to memory of 2640 2028 MSWDM.EXE 30 PID 2028 wrote to memory of 2640 2028 MSWDM.EXE 30 PID 2028 wrote to memory of 2640 2028 MSWDM.EXE 30 PID 2028 wrote to memory of 2640 2028 MSWDM.EXE 30 PID 2028 wrote to memory of 2552 2028 MSWDM.EXE 32 PID 2028 wrote to memory of 2552 2028 MSWDM.EXE 32 PID 2028 wrote to memory of 2552 2028 MSWDM.EXE 32 PID 2028 wrote to memory of 2552 2028 MSWDM.EXE 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\25b8291f6dfe85f8c5ca862dd1fd3570_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\25b8291f6dfe85f8c5ca862dd1fd3570_NeikiAnalytics.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2040 -
C:\WINDOWS\MSWDM.EXE"C:\WINDOWS\MSWDM.EXE"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:1792
-
-
C:\WINDOWS\MSWDM.EXE-r!C:\Windows\dev10A4.tmp!C:\Users\Admin\AppData\Local\Temp\25b8291f6dfe85f8c5ca862dd1fd3570_NeikiAnalytics.exe! !2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2028 -
C:\Users\Admin\AppData\Local\Temp\25B8291F6DFE85F8C5CA862DD1FD3570_NEIKIANALYTICS.EXE
- Executes dropped EXE
PID:2640
-
-
C:\WINDOWS\MSWDM.EXE-e!C:\Windows\dev10A4.tmp!C:\Users\Admin\AppData\Local\Temp\25B8291F6DFE85F8C5CA862DD1FD3570_NEIKIANALYTICS.EXE!3⤵
- Executes dropped EXE
PID:2552
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
164KB
MD578ffffb1a1f22e243fc8cfdbe8679eb2
SHA15aebc345e34a57c62893418defdb21f9c0ed2a87
SHA256d4af24de71aedb73f32891b06cb20f22ebd6b2a1109cd4940e74dff9f736ee62
SHA512e90b56a6d82bdc706bae1542566abce221bee5571e2abb714d54e9fd8c03e450cf07660b2ee8899ff1b639e9a1830592cefc0b53f4bb5eeed44ffd06da3916a9
-
Filesize
458KB
MD5619f7135621b50fd1900ff24aade1524
SHA16c7ea8bbd435163ae3945cbef30ef6b9872a4591
SHA256344f076bb1211cb02eca9e5ed2c0ce59bcf74ccbc749ec611538fa14ecb9aad2
SHA5122c7293c084d09bc2e3ae2d066dd7b331c810d9e2eeca8b236a8e87fdeb18e877b948747d3491fcaff245816507685250bd35f984c67a43b29b0ae31ecb2bd628