Analysis
-
max time kernel
23s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
30-05-2024 03:44
Static task
static1
Behavioral task
behavioral1
Sample
62f4f2b2e9b59d8fa17f25b0fce34690_NeikiAnalytics.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
62f4f2b2e9b59d8fa17f25b0fce34690_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
62f4f2b2e9b59d8fa17f25b0fce34690_NeikiAnalytics.exe
-
Size
72KB
-
MD5
62f4f2b2e9b59d8fa17f25b0fce34690
-
SHA1
39a23f1eb745ff0172cc00d7cc440154250975f6
-
SHA256
637289b6a7a6dad8acf83c0d64bbd314820db3d04a1d19dec15c6d8ade14e471
-
SHA512
8e2f108c5f55a5222ae3d59264346d4ac1279ef644c5526c25ff6dacaefde9f0bd2f6bf16986bb51e20febac00d1b1c059e28e99637056d4620d2e3753c95e19
-
SSDEEP
1536:Hlqls0GgUyj5JxdA4Oj3W2Fsdq4F0gG+sxSd/PwKAEa:HQC/yj5JO3Mn0gG+nPwKAEa
Malware Config
Signatures
-
Executes dropped EXE 4 IoCs
pid Process 740 MSWDM.EXE 1252 MSWDM.EXE 5100 62F4F2B2E9B59D8FA17F25B0FCE34690_NEIKIANALYTICS.EXE 4492 MSWDM.EXE -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunServices\WDM = "MSWDM.EXE" MSWDM.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\WDM = "MSWDM.EXE" 62f4f2b2e9b59d8fa17f25b0fce34690_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunServices\WDM = "MSWDM.EXE" 62f4f2b2e9b59d8fa17f25b0fce34690_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\WDM = "MSWDM.EXE" MSWDM.EXE -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\WINDOWS\MSWDM.EXE 62f4f2b2e9b59d8fa17f25b0fce34690_NeikiAnalytics.exe File opened for modification C:\Windows\dev44E8.tmp 62f4f2b2e9b59d8fa17f25b0fce34690_NeikiAnalytics.exe File opened for modification C:\Windows\dev44E8.tmp MSWDM.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1252 MSWDM.EXE 1252 MSWDM.EXE -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 4952 wrote to memory of 740 4952 62f4f2b2e9b59d8fa17f25b0fce34690_NeikiAnalytics.exe 82 PID 4952 wrote to memory of 740 4952 62f4f2b2e9b59d8fa17f25b0fce34690_NeikiAnalytics.exe 82 PID 4952 wrote to memory of 740 4952 62f4f2b2e9b59d8fa17f25b0fce34690_NeikiAnalytics.exe 82 PID 4952 wrote to memory of 1252 4952 62f4f2b2e9b59d8fa17f25b0fce34690_NeikiAnalytics.exe 83 PID 4952 wrote to memory of 1252 4952 62f4f2b2e9b59d8fa17f25b0fce34690_NeikiAnalytics.exe 83 PID 4952 wrote to memory of 1252 4952 62f4f2b2e9b59d8fa17f25b0fce34690_NeikiAnalytics.exe 83 PID 1252 wrote to memory of 5100 1252 MSWDM.EXE 84 PID 1252 wrote to memory of 5100 1252 MSWDM.EXE 84 PID 1252 wrote to memory of 4492 1252 MSWDM.EXE 86 PID 1252 wrote to memory of 4492 1252 MSWDM.EXE 86 PID 1252 wrote to memory of 4492 1252 MSWDM.EXE 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\62f4f2b2e9b59d8fa17f25b0fce34690_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\62f4f2b2e9b59d8fa17f25b0fce34690_NeikiAnalytics.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:4952 -
C:\WINDOWS\MSWDM.EXE"C:\WINDOWS\MSWDM.EXE"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:740
-
-
C:\WINDOWS\MSWDM.EXE-r!C:\Windows\dev44E8.tmp!C:\Users\Admin\AppData\Local\Temp\62f4f2b2e9b59d8fa17f25b0fce34690_NeikiAnalytics.exe! !2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1252 -
C:\Users\Admin\AppData\Local\Temp\62F4F2B2E9B59D8FA17F25B0FCE34690_NEIKIANALYTICS.EXE
- Executes dropped EXE
PID:5100
-
-
C:\WINDOWS\MSWDM.EXE-e!C:\Windows\dev44E8.tmp!C:\Users\Admin\AppData\Local\Temp\62F4F2B2E9B59D8FA17F25B0FCE34690_NEIKIANALYTICS.EXE!3⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:4492
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
72KB
MD50d692c1c6f1210e1855fdac8df566f93
SHA1f4c65fe3ec9cbb84ab743b8cdbb27ef0346e4574
SHA256e17691f491db51dd1309a6ce50201ac715f47053f855cfe8839f4ff15e642c70
SHA51271e5f5cf0d066620d6cd718b9898af60b5385336fb709366c8cfdb73ac984c32594aef19e912f23faf583c5e83eebfdc89696fd9f3bbbbd5566d3041326f5f84
-
Filesize
47KB
MD56b983b3af160e0b57ac28d308026cb1c
SHA190b71deb39713c7b49bb83ddd045144bdba05bbd
SHA25666cbddcf2a2ddf4c9e36b01d17d60bd0ad68063d585f79396bc6ac9f6ae8e4d3
SHA512afec899e625333d169d19ca29b99f83ee090ebbca515a9fe3ea606cd51bc8275b2d899bfd06465bfe88e03e0eeea22261290cc515a0e7521b4b89babaddec157
-
Filesize
25KB
MD5abbd49c180a2f8703f6306d6fa731fdc
SHA1d63f4bfe7f74936b2fbace803e3da6103fbf6586
SHA2565f411c0bd9ed9a42b0f07ed568c7d0cf358a83063b225a1f8f7da3296dde90f1
SHA512290dd984acc451b778f3db8c510bae7aec1d9547c3ad0a1829df731c136e4ecc9a37dc6a786cf8f1ecc4d14339aed1288af25055f450f6f953138c8d4d5c36e9