Analysis
-
max time kernel
20s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
01/06/2024, 06:52
Static task
static1
Behavioral task
behavioral1
Sample
9193ed0e6f05349f21f50d80d39f43e0_NeikiAnalytics.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
9193ed0e6f05349f21f50d80d39f43e0_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
9193ed0e6f05349f21f50d80d39f43e0_NeikiAnalytics.exe
-
Size
505KB
-
MD5
9193ed0e6f05349f21f50d80d39f43e0
-
SHA1
4f2635d69aa44860799bdd318afdc413d0244d40
-
SHA256
8abb4a420feb9d569332c45a9eae16d068a68f759b2b42301955375852167890
-
SHA512
4725ece77d5a8a6f90c948398bf40b1e7d04f5b6377d3dd98dc0cb6df6ae1a7dd0b87f3002e66755abbf7fbc563721363e676127809f294d5f9a31fca932b96a
-
SSDEEP
12288:wlbX+b1gL5pRTcAkS/3hzN8qE43fm78V6:WbX+G5jcAkSYqyE6
Malware Config
Signatures
-
Executes dropped EXE 4 IoCs
pid Process 2212 MSWDM.EXE 2336 MSWDM.EXE 2636 9193ED0E6F05349F21F50D80D39F43E0_NEIKIANALYTICS.EXE 2548 MSWDM.EXE -
Loads dropped DLL 2 IoCs
pid Process 2336 MSWDM.EXE 2496 Process not Found -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\WDM = "MSWDM.EXE" MSWDM.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunServices\WDM = "MSWDM.EXE" MSWDM.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\WDM = "MSWDM.EXE" 9193ed0e6f05349f21f50d80d39f43e0_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunServices\WDM = "MSWDM.EXE" 9193ed0e6f05349f21f50d80d39f43e0_NeikiAnalytics.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\WINDOWS\MSWDM.EXE 9193ed0e6f05349f21f50d80d39f43e0_NeikiAnalytics.exe File opened for modification C:\Windows\dev13BF.tmp 9193ed0e6f05349f21f50d80d39f43e0_NeikiAnalytics.exe File opened for modification C:\Windows\dev13BF.tmp MSWDM.EXE -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2336 MSWDM.EXE -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 2076 wrote to memory of 2212 2076 9193ed0e6f05349f21f50d80d39f43e0_NeikiAnalytics.exe 28 PID 2076 wrote to memory of 2212 2076 9193ed0e6f05349f21f50d80d39f43e0_NeikiAnalytics.exe 28 PID 2076 wrote to memory of 2212 2076 9193ed0e6f05349f21f50d80d39f43e0_NeikiAnalytics.exe 28 PID 2076 wrote to memory of 2212 2076 9193ed0e6f05349f21f50d80d39f43e0_NeikiAnalytics.exe 28 PID 2076 wrote to memory of 2336 2076 9193ed0e6f05349f21f50d80d39f43e0_NeikiAnalytics.exe 29 PID 2076 wrote to memory of 2336 2076 9193ed0e6f05349f21f50d80d39f43e0_NeikiAnalytics.exe 29 PID 2076 wrote to memory of 2336 2076 9193ed0e6f05349f21f50d80d39f43e0_NeikiAnalytics.exe 29 PID 2076 wrote to memory of 2336 2076 9193ed0e6f05349f21f50d80d39f43e0_NeikiAnalytics.exe 29 PID 2336 wrote to memory of 2636 2336 MSWDM.EXE 30 PID 2336 wrote to memory of 2636 2336 MSWDM.EXE 30 PID 2336 wrote to memory of 2636 2336 MSWDM.EXE 30 PID 2336 wrote to memory of 2636 2336 MSWDM.EXE 30 PID 2336 wrote to memory of 2548 2336 MSWDM.EXE 32 PID 2336 wrote to memory of 2548 2336 MSWDM.EXE 32 PID 2336 wrote to memory of 2548 2336 MSWDM.EXE 32 PID 2336 wrote to memory of 2548 2336 MSWDM.EXE 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\9193ed0e6f05349f21f50d80d39f43e0_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\9193ed0e6f05349f21f50d80d39f43e0_NeikiAnalytics.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2076 -
C:\WINDOWS\MSWDM.EXE"C:\WINDOWS\MSWDM.EXE"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:2212
-
-
C:\WINDOWS\MSWDM.EXE-r!C:\Windows\dev13BF.tmp!C:\Users\Admin\AppData\Local\Temp\9193ed0e6f05349f21f50d80d39f43e0_NeikiAnalytics.exe! !2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2336 -
C:\Users\Admin\AppData\Local\Temp\9193ED0E6F05349F21F50D80D39F43E0_NEIKIANALYTICS.EXE
- Executes dropped EXE
PID:2636
-
-
C:\WINDOWS\MSWDM.EXE-e!C:\Windows\dev13BF.tmp!C:\Users\Admin\AppData\Local\Temp\9193ED0E6F05349F21F50D80D39F43E0_NEIKIANALYTICS.EXE!3⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:2548
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
505KB
MD5d2cb3ed257cb8c1a04939e7b1f37ddd0
SHA13c5943a27bd39543aef80c77f55ae96652a5ee89
SHA256b269264ba07a81282c532ef87872db6cfad3a7e6ec65b14faeedc8565972edca
SHA5126f81e67ef69197e94d2bfbedd3f22a4aca9c23c35ef6e684d834cc3e5ec6f77a808b8baae8f0349c0bd2396eebc3073f9b5c45999649d82cde8b7a2692ef5d8e
-
Filesize
47KB
MD5336ffd74e5eb29bc13e4e0f5de0cb57a
SHA1fb3bab77482267f8880cd329d926a41d397d072d
SHA256688c0c407e9651d4fb63017475f3ca304c7ff8c0185592c3a1d7d3b660098c79
SHA512e8e70882eebbb5a602ac68a4a51a15c7d32d083b5c5717981a9b33d358e17411a0fee1294b631f29f0f5cf06e0ad86109198de6114ba364fdaac1e866a049d76
-
Filesize
458KB
MD5619f7135621b50fd1900ff24aade1524
SHA16c7ea8bbd435163ae3945cbef30ef6b9872a4591
SHA256344f076bb1211cb02eca9e5ed2c0ce59bcf74ccbc749ec611538fa14ecb9aad2
SHA5122c7293c084d09bc2e3ae2d066dd7b331c810d9e2eeca8b236a8e87fdeb18e877b948747d3491fcaff245816507685250bd35f984c67a43b29b0ae31ecb2bd628