Analysis

  • max time kernel
    14s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    29-05-2024 10:41

General

  • Target

    519edf995f91e489d8e7bfefa1f38530_NeikiAnalytics.exe

  • Size

    538KB

  • MD5

    519edf995f91e489d8e7bfefa1f38530

  • SHA1

    39e0caa5430d617df0490204a5359a8f9c084c7d

  • SHA256

    b5bc2f706581687019bfe7c1c6d115b80d2b4b3d55a771baea21b7433b85485c

  • SHA512

    3468353bc6059fb1c7e551a5fdcf3da5f36f5d7f4bfb95b3169a5f8871a5ef33cb12f124af620ddbc9cd785f9aa7d75364cceb110e608846462b808248dbeb31

  • SSDEEP

    12288:wlbU+h1gL5pRTcAkS/3hzN8qE43fm78V7:WbU+w5jcAkSYqyE7

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Drops file in Windows directory 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\519edf995f91e489d8e7bfefa1f38530_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\519edf995f91e489d8e7bfefa1f38530_NeikiAnalytics.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    PID:1704
    • C:\WINDOWS\MSWDM.EXE
      "C:\WINDOWS\MSWDM.EXE"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      PID:1752
    • C:\WINDOWS\MSWDM.EXE
      -r!C:\Windows\dev8D51.tmp!C:\Users\Admin\AppData\Local\Temp\519edf995f91e489d8e7bfefa1f38530_NeikiAnalytics.exe! !
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:2516
      • C:\Users\Admin\AppData\Local\Temp\519EDF995F91E489D8E7BFEFA1F38530_NEIKIANALYTICS.EXE
        3⤵
        • Executes dropped EXE
        PID:2648
      • C:\WINDOWS\MSWDM.EXE
        -e!C:\Windows\dev8D51.tmp!C:\Users\Admin\AppData\Local\Temp\519EDF995F91E489D8E7BFEFA1F38530_NEIKIANALYTICS.EXE!
        3⤵
        • Executes dropped EXE
        • Drops file in Windows directory
        PID:2644

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\519EDF995F91E489D8E7BFEFA1F38530_NEIKIANALYTICS.EXE

    Filesize

    538KB

    MD5

    e8d66e5d18b8c8d2b20f5066fda69c85

    SHA1

    1bc452370e150ad007dc2bced52be675e79c5757

    SHA256

    9f14021cfc6367da36f7f0bb05139d9567c91719e4fb4ba1061d89d6aacffca5

    SHA512

    b7ef2681488e07d3218614eeced38a91816836ef14d42e2551d203a86cb7bcfd664ba5db49067a4c1b90b51300df8182fda4e8047697d17dc0ec31edf306b242

  • C:\Windows\MSWDM.EXE

    Filesize

    80KB

    MD5

    3bad16e6b9791239f0136f664c22ace8

    SHA1

    a92f82890a3ac797b3e5d51840be75376e751a0f

    SHA256

    6b5e6c7bd133a0b2972be2796b0a52f0fa8713d9a9c27d25fdca7e9fcb8d1b17

    SHA512

    ac2b8b671958cfbd4b4966bddbeb3375c6b29089c90364aeb3a3e4836878970e65fa74ca0b5f553a9164b33c630534722306ee4e7b6b36c432e517c503d23dfd

  • C:\Windows\dev8D51.tmp

    Filesize

    458KB

    MD5

    619f7135621b50fd1900ff24aade1524

    SHA1

    6c7ea8bbd435163ae3945cbef30ef6b9872a4591

    SHA256

    344f076bb1211cb02eca9e5ed2c0ce59bcf74ccbc749ec611538fa14ecb9aad2

    SHA512

    2c7293c084d09bc2e3ae2d066dd7b331c810d9e2eeca8b236a8e87fdeb18e877b948747d3491fcaff245816507685250bd35f984c67a43b29b0ae31ecb2bd628

  • memory/1704-0-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/1704-13-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/1752-19-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/1752-34-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/2516-18-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/2516-24-0x00000000002A0000-0x00000000002BB000-memory.dmp

    Filesize

    108KB

  • memory/2516-33-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/2644-30-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB