Analysis

  • max time kernel
    23s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30-05-2024 03:44

General

  • Target

    62f4f2b2e9b59d8fa17f25b0fce34690_NeikiAnalytics.exe

  • Size

    72KB

  • MD5

    62f4f2b2e9b59d8fa17f25b0fce34690

  • SHA1

    39a23f1eb745ff0172cc00d7cc440154250975f6

  • SHA256

    637289b6a7a6dad8acf83c0d64bbd314820db3d04a1d19dec15c6d8ade14e471

  • SHA512

    8e2f108c5f55a5222ae3d59264346d4ac1279ef644c5526c25ff6dacaefde9f0bd2f6bf16986bb51e20febac00d1b1c059e28e99637056d4620d2e3753c95e19

  • SSDEEP

    1536:Hlqls0GgUyj5JxdA4Oj3W2Fsdq4F0gG+sxSd/PwKAEa:HQC/yj5JO3Mn0gG+nPwKAEa

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 4 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Drops file in Windows directory 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\62f4f2b2e9b59d8fa17f25b0fce34690_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\62f4f2b2e9b59d8fa17f25b0fce34690_NeikiAnalytics.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    PID:4952
    • C:\WINDOWS\MSWDM.EXE
      "C:\WINDOWS\MSWDM.EXE"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      PID:740
    • C:\WINDOWS\MSWDM.EXE
      -r!C:\Windows\dev44E8.tmp!C:\Users\Admin\AppData\Local\Temp\62f4f2b2e9b59d8fa17f25b0fce34690_NeikiAnalytics.exe! !
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:1252
      • C:\Users\Admin\AppData\Local\Temp\62F4F2B2E9B59D8FA17F25B0FCE34690_NEIKIANALYTICS.EXE
        3⤵
        • Executes dropped EXE
        PID:5100
      • C:\WINDOWS\MSWDM.EXE
        -e!C:\Windows\dev44E8.tmp!C:\Users\Admin\AppData\Local\Temp\62F4F2B2E9B59D8FA17F25B0FCE34690_NEIKIANALYTICS.EXE!
        3⤵
        • Executes dropped EXE
        • Drops file in Windows directory
        PID:4492

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\62F4F2B2E9B59D8FA17F25B0FCE34690_NEIKIANALYTICS.EXE

    Filesize

    72KB

    MD5

    0d692c1c6f1210e1855fdac8df566f93

    SHA1

    f4c65fe3ec9cbb84ab743b8cdbb27ef0346e4574

    SHA256

    e17691f491db51dd1309a6ce50201ac715f47053f855cfe8839f4ff15e642c70

    SHA512

    71e5f5cf0d066620d6cd718b9898af60b5385336fb709366c8cfdb73ac984c32594aef19e912f23faf583c5e83eebfdc89696fd9f3bbbbd5566d3041326f5f84

  • C:\Windows\MSWDM.EXE

    Filesize

    47KB

    MD5

    6b983b3af160e0b57ac28d308026cb1c

    SHA1

    90b71deb39713c7b49bb83ddd045144bdba05bbd

    SHA256

    66cbddcf2a2ddf4c9e36b01d17d60bd0ad68063d585f79396bc6ac9f6ae8e4d3

    SHA512

    afec899e625333d169d19ca29b99f83ee090ebbca515a9fe3ea606cd51bc8275b2d899bfd06465bfe88e03e0eeea22261290cc515a0e7521b4b89babaddec157

  • C:\Windows\dev44E8.tmp

    Filesize

    25KB

    MD5

    abbd49c180a2f8703f6306d6fa731fdc

    SHA1

    d63f4bfe7f74936b2fbace803e3da6103fbf6586

    SHA256

    5f411c0bd9ed9a42b0f07ed568c7d0cf358a83063b225a1f8f7da3296dde90f1

    SHA512

    290dd984acc451b778f3db8c510bae7aec1d9547c3ad0a1829df731c136e4ecc9a37dc6a786cf8f1ecc4d14339aed1288af25055f450f6f953138c8d4d5c36e9

  • memory/740-12-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/740-27-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/1252-10-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/1252-26-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/4492-18-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/4492-23-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/4952-1-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/4952-7-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/5100-16-0x0000000000400000-0x000000000040D000-memory.dmp

    Filesize

    52KB