Analysis
-
max time kernel
26s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
27-05-2024 23:06
Behavioral task
behavioral1
Sample
25b8291f6dfe85f8c5ca862dd1fd3570_NeikiAnalytics.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
25b8291f6dfe85f8c5ca862dd1fd3570_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
25b8291f6dfe85f8c5ca862dd1fd3570_NeikiAnalytics.exe
-
Size
622KB
-
MD5
25b8291f6dfe85f8c5ca862dd1fd3570
-
SHA1
d1dcab4d3fb6fb9b678763af58e6624a6b5f396e
-
SHA256
ad1e30f94827476caaedc55032a18f3ffe9b73bff4ca956bad12e6e34595ebe1
-
SHA512
b1532b7911bc451fbd770587bf946f74db9994edbc0495e0ce068883be2468d136ef7a351d09afb1500402598601d414d6b9ab206db4d00c1832739a5f991f57
-
SSDEEP
6144:AJ51+Egd1Jpz1gL5pRTMTTjMkId/BynSx7dEe6XwzRaktNP08NhKs39zo43fTtlo:q51xQ1gL5pRTcAkS/3hzN8qE43fm78Vi
Malware Config
Signatures
-
Executes dropped EXE 4 IoCs
pid Process 3016 MSWDM.EXE 4600 MSWDM.EXE 2896 25B8291F6DFE85F8C5CA862DD1FD3570_NEIKIANALYTICS.EXE 2856 MSWDM.EXE -
resource yara_rule behavioral2/memory/3276-0-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/files/0x000600000002326f-5.dat upx behavioral2/memory/3276-7-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4600-11-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3016-9-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/files/0x00070000000233cb-18.dat upx behavioral2/memory/2856-19-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4600-21-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3016-22-0x0000000000400000-0x0000000000429000-memory.dmp upx -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\WDM = "MSWDM.EXE" 25b8291f6dfe85f8c5ca862dd1fd3570_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunServices\WDM = "MSWDM.EXE" 25b8291f6dfe85f8c5ca862dd1fd3570_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\WDM = "MSWDM.EXE" MSWDM.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunServices\WDM = "MSWDM.EXE" MSWDM.EXE -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\WINDOWS\MSWDM.EXE 25b8291f6dfe85f8c5ca862dd1fd3570_NeikiAnalytics.exe File opened for modification C:\Windows\dev445C.tmp 25b8291f6dfe85f8c5ca862dd1fd3570_NeikiAnalytics.exe File opened for modification C:\Windows\dev445C.tmp MSWDM.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4600 MSWDM.EXE 4600 MSWDM.EXE -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 3276 wrote to memory of 3016 3276 25b8291f6dfe85f8c5ca862dd1fd3570_NeikiAnalytics.exe 81 PID 3276 wrote to memory of 3016 3276 25b8291f6dfe85f8c5ca862dd1fd3570_NeikiAnalytics.exe 81 PID 3276 wrote to memory of 3016 3276 25b8291f6dfe85f8c5ca862dd1fd3570_NeikiAnalytics.exe 81 PID 3276 wrote to memory of 4600 3276 25b8291f6dfe85f8c5ca862dd1fd3570_NeikiAnalytics.exe 82 PID 3276 wrote to memory of 4600 3276 25b8291f6dfe85f8c5ca862dd1fd3570_NeikiAnalytics.exe 82 PID 3276 wrote to memory of 4600 3276 25b8291f6dfe85f8c5ca862dd1fd3570_NeikiAnalytics.exe 82 PID 4600 wrote to memory of 2896 4600 MSWDM.EXE 83 PID 4600 wrote to memory of 2896 4600 MSWDM.EXE 83 PID 4600 wrote to memory of 2856 4600 MSWDM.EXE 85 PID 4600 wrote to memory of 2856 4600 MSWDM.EXE 85 PID 4600 wrote to memory of 2856 4600 MSWDM.EXE 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\25b8291f6dfe85f8c5ca862dd1fd3570_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\25b8291f6dfe85f8c5ca862dd1fd3570_NeikiAnalytics.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:3276 -
C:\WINDOWS\MSWDM.EXE"C:\WINDOWS\MSWDM.EXE"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:3016
-
-
C:\WINDOWS\MSWDM.EXE-r!C:\Windows\dev445C.tmp!C:\Users\Admin\AppData\Local\Temp\25b8291f6dfe85f8c5ca862dd1fd3570_NeikiAnalytics.exe! !2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4600 -
C:\Users\Admin\AppData\Local\Temp\25B8291F6DFE85F8C5CA862DD1FD3570_NEIKIANALYTICS.EXE
- Executes dropped EXE
PID:2896
-
-
C:\WINDOWS\MSWDM.EXE-e!C:\Windows\dev445C.tmp!C:\Users\Admin\AppData\Local\Temp\25B8291F6DFE85F8C5CA862DD1FD3570_NEIKIANALYTICS.EXE!3⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:2856
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
622KB
MD57b27efeea6068a9002389655e4854e2f
SHA14430b62f9d04d4f98cb8f4cda05254172cf724b8
SHA256d6900cd4b807e5e5ee0413bc94d7dca6f3705ab1a412e72c0310c81281e165e8
SHA512c68441d8f1b2e4f58d0d0d5b6059f3d453c244614befff777def8f73f6aba7363c78df4db8103d5f419e3a9ed3df8f212c15fe3191411c53ab44f8cb25d84f02
-
Filesize
164KB
MD578ffffb1a1f22e243fc8cfdbe8679eb2
SHA15aebc345e34a57c62893418defdb21f9c0ed2a87
SHA256d4af24de71aedb73f32891b06cb20f22ebd6b2a1109cd4940e74dff9f736ee62
SHA512e90b56a6d82bdc706bae1542566abce221bee5571e2abb714d54e9fd8c03e450cf07660b2ee8899ff1b639e9a1830592cefc0b53f4bb5eeed44ffd06da3916a9
-
Filesize
458KB
MD5619f7135621b50fd1900ff24aade1524
SHA16c7ea8bbd435163ae3945cbef30ef6b9872a4591
SHA256344f076bb1211cb02eca9e5ed2c0ce59bcf74ccbc749ec611538fa14ecb9aad2
SHA5122c7293c084d09bc2e3ae2d066dd7b331c810d9e2eeca8b236a8e87fdeb18e877b948747d3491fcaff245816507685250bd35f984c67a43b29b0ae31ecb2bd628