Malware Analysis Report

2025-06-16 07:20

Sample ID 240602-b1mtqsed9w
Target 1d7111ab5f67a519b7e271d4bcda9340_NeikiAnalytics.exe
SHA256 12f61e065a1c1f70c4255d68451fc5a54f02d336ca241f9513427f668ee38c57
Tags
persistence
score
7/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
7/10

SHA256

12f61e065a1c1f70c4255d68451fc5a54f02d336ca241f9513427f668ee38c57

Threat Level: Shows suspicious behavior

The file 1d7111ab5f67a519b7e271d4bcda9340_NeikiAnalytics.exe was found to be: Shows suspicious behavior.

Malicious Activity Summary

persistence

Executes dropped EXE

Loads dropped DLL

Adds Run key to start application

Drops file in Windows directory

Unsigned PE

Suspicious behavior: EnumeratesProcesses

Suspicious use of WriteProcessMemory

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-06-02 01:36

Signatures

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-06-02 01:36

Reported

2024-06-02 01:39

Platform

win7-20240215-en

Max time kernel

18s

Max time network

121s

Command Line

"C:\Users\Admin\AppData\Local\Temp\1d7111ab5f67a519b7e271d4bcda9340_NeikiAnalytics.exe"

Signatures

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\WINDOWS\MSWDM.EXE N/A
N/A N/A C:\WINDOWS\MSWDM.EXE N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1D7111AB5F67A519B7E271D4BCDA9340_NEIKIANALYTICS.EXE N/A
N/A N/A C:\WINDOWS\MSWDM.EXE N/A

Loads dropped DLL

Description Indicator Process Target
N/A N/A C:\WINDOWS\MSWDM.EXE N/A
N/A N/A N/A N/A

Adds Run key to start application

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\WDM = "MSWDM.EXE" C:\Users\Admin\AppData\Local\Temp\1d7111ab5f67a519b7e271d4bcda9340_NeikiAnalytics.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunServices\WDM = "MSWDM.EXE" C:\Users\Admin\AppData\Local\Temp\1d7111ab5f67a519b7e271d4bcda9340_NeikiAnalytics.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\WDM = "MSWDM.EXE" C:\WINDOWS\MSWDM.EXE N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunServices\WDM = "MSWDM.EXE" C:\WINDOWS\MSWDM.EXE N/A

Drops file in Windows directory

Description Indicator Process Target
File created C:\WINDOWS\MSWDM.EXE C:\Users\Admin\AppData\Local\Temp\1d7111ab5f67a519b7e271d4bcda9340_NeikiAnalytics.exe N/A
File opened for modification C:\Windows\dev140D.tmp C:\Users\Admin\AppData\Local\Temp\1d7111ab5f67a519b7e271d4bcda9340_NeikiAnalytics.exe N/A

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\WINDOWS\MSWDM.EXE N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 2740 wrote to memory of 1968 N/A C:\Users\Admin\AppData\Local\Temp\1d7111ab5f67a519b7e271d4bcda9340_NeikiAnalytics.exe C:\WINDOWS\MSWDM.EXE
PID 2740 wrote to memory of 1968 N/A C:\Users\Admin\AppData\Local\Temp\1d7111ab5f67a519b7e271d4bcda9340_NeikiAnalytics.exe C:\WINDOWS\MSWDM.EXE
PID 2740 wrote to memory of 1968 N/A C:\Users\Admin\AppData\Local\Temp\1d7111ab5f67a519b7e271d4bcda9340_NeikiAnalytics.exe C:\WINDOWS\MSWDM.EXE
PID 2740 wrote to memory of 1968 N/A C:\Users\Admin\AppData\Local\Temp\1d7111ab5f67a519b7e271d4bcda9340_NeikiAnalytics.exe C:\WINDOWS\MSWDM.EXE
PID 2740 wrote to memory of 2208 N/A C:\Users\Admin\AppData\Local\Temp\1d7111ab5f67a519b7e271d4bcda9340_NeikiAnalytics.exe C:\WINDOWS\MSWDM.EXE
PID 2740 wrote to memory of 2208 N/A C:\Users\Admin\AppData\Local\Temp\1d7111ab5f67a519b7e271d4bcda9340_NeikiAnalytics.exe C:\WINDOWS\MSWDM.EXE
PID 2740 wrote to memory of 2208 N/A C:\Users\Admin\AppData\Local\Temp\1d7111ab5f67a519b7e271d4bcda9340_NeikiAnalytics.exe C:\WINDOWS\MSWDM.EXE
PID 2740 wrote to memory of 2208 N/A C:\Users\Admin\AppData\Local\Temp\1d7111ab5f67a519b7e271d4bcda9340_NeikiAnalytics.exe C:\WINDOWS\MSWDM.EXE
PID 2208 wrote to memory of 2996 N/A C:\WINDOWS\MSWDM.EXE C:\Users\Admin\AppData\Local\Temp\1D7111AB5F67A519B7E271D4BCDA9340_NEIKIANALYTICS.EXE
PID 2208 wrote to memory of 2996 N/A C:\WINDOWS\MSWDM.EXE C:\Users\Admin\AppData\Local\Temp\1D7111AB5F67A519B7E271D4BCDA9340_NEIKIANALYTICS.EXE
PID 2208 wrote to memory of 2996 N/A C:\WINDOWS\MSWDM.EXE C:\Users\Admin\AppData\Local\Temp\1D7111AB5F67A519B7E271D4BCDA9340_NEIKIANALYTICS.EXE
PID 2208 wrote to memory of 2996 N/A C:\WINDOWS\MSWDM.EXE C:\Users\Admin\AppData\Local\Temp\1D7111AB5F67A519B7E271D4BCDA9340_NEIKIANALYTICS.EXE
PID 2208 wrote to memory of 2808 N/A C:\WINDOWS\MSWDM.EXE C:\WINDOWS\MSWDM.EXE
PID 2208 wrote to memory of 2808 N/A C:\WINDOWS\MSWDM.EXE C:\WINDOWS\MSWDM.EXE
PID 2208 wrote to memory of 2808 N/A C:\WINDOWS\MSWDM.EXE C:\WINDOWS\MSWDM.EXE
PID 2208 wrote to memory of 2808 N/A C:\WINDOWS\MSWDM.EXE C:\WINDOWS\MSWDM.EXE

Processes

C:\Users\Admin\AppData\Local\Temp\1d7111ab5f67a519b7e271d4bcda9340_NeikiAnalytics.exe

"C:\Users\Admin\AppData\Local\Temp\1d7111ab5f67a519b7e271d4bcda9340_NeikiAnalytics.exe"

C:\WINDOWS\MSWDM.EXE

"C:\WINDOWS\MSWDM.EXE"

C:\WINDOWS\MSWDM.EXE

-r!C:\Windows\dev140D.tmp!C:\Users\Admin\AppData\Local\Temp\1d7111ab5f67a519b7e271d4bcda9340_NeikiAnalytics.exe! !

C:\Users\Admin\AppData\Local\Temp\1D7111AB5F67A519B7E271D4BCDA9340_NEIKIANALYTICS.EXE

C:\WINDOWS\MSWDM.EXE

-e!C:\Windows\dev140D.tmp!C:\Users\Admin\AppData\Local\Temp\1D7111AB5F67A519B7E271D4BCDA9340_NEIKIANALYTICS.EXE!

Network

Country Destination Domain Proto
N/A 10.127.255.255:78 udp
N/A 10.255.255.255:78 udp
N/A 10.127.0.255:78 udp

Files

memory/2740-0-0x0000000000400000-0x000000000041B000-memory.dmp

C:\Windows\MSWDM.EXE

MD5 02252334fa17a25b781e2bfebd1bca3d
SHA1 a72858647bf5774aefcb9e064a5db74728d6a483
SHA256 3149abb7c1b6e56672f70f483b24222d0a41b948e7b7ec5ad8e66197480173fe
SHA512 8d3e14398fe9e1cae632762f85a548e5f7c455a2f8481e30017e2caad14412215f88ca217a109cfb87f3cb41603c0560c90de4cc648039f9f62b017427b33413

memory/2740-12-0x0000000000400000-0x000000000041B000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\1d7111ab5f67a519b7e271d4bcda9340_NeikiAnalytics.exe

MD5 619f7135621b50fd1900ff24aade1524
SHA1 6c7ea8bbd435163ae3945cbef30ef6b9872a4591
SHA256 344f076bb1211cb02eca9e5ed2c0ce59bcf74ccbc749ec611538fa14ecb9aad2
SHA512 2c7293c084d09bc2e3ae2d066dd7b331c810d9e2eeca8b236a8e87fdeb18e877b948747d3491fcaff245816507685250bd35f984c67a43b29b0ae31ecb2bd628

memory/2208-14-0x0000000000400000-0x000000000041B000-memory.dmp

memory/2208-29-0x0000000000400000-0x000000000041B000-memory.dmp

memory/2808-25-0x0000000000400000-0x000000000041B000-memory.dmp

memory/1968-30-0x0000000000400000-0x000000000041B000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2024-06-02 01:36

Reported

2024-06-02 01:39

Platform

win10v2004-20240226-en

Max time kernel

47s

Max time network

158s

Command Line

"C:\Users\Admin\AppData\Local\Temp\1d7111ab5f67a519b7e271d4bcda9340_NeikiAnalytics.exe"

Signatures

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\WINDOWS\MSWDM.EXE N/A
N/A N/A C:\WINDOWS\MSWDM.EXE N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1D7111AB5F67A519B7E271D4BCDA9340_NEIKIANALYTICS.EXE N/A
N/A N/A C:\WINDOWS\MSWDM.EXE N/A

Adds Run key to start application

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\WDM = "MSWDM.EXE" C:\Users\Admin\AppData\Local\Temp\1d7111ab5f67a519b7e271d4bcda9340_NeikiAnalytics.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunServices\WDM = "MSWDM.EXE" C:\Users\Admin\AppData\Local\Temp\1d7111ab5f67a519b7e271d4bcda9340_NeikiAnalytics.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\WDM = "MSWDM.EXE" C:\WINDOWS\MSWDM.EXE N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunServices\WDM = "MSWDM.EXE" C:\WINDOWS\MSWDM.EXE N/A

Drops file in Windows directory

Description Indicator Process Target
File opened for modification C:\Windows\devF8B.tmp C:\WINDOWS\MSWDM.EXE N/A
File created C:\WINDOWS\MSWDM.EXE C:\Users\Admin\AppData\Local\Temp\1d7111ab5f67a519b7e271d4bcda9340_NeikiAnalytics.exe N/A
File opened for modification C:\Windows\devF8B.tmp C:\Users\Admin\AppData\Local\Temp\1d7111ab5f67a519b7e271d4bcda9340_NeikiAnalytics.exe N/A

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\WINDOWS\MSWDM.EXE N/A
N/A N/A C:\WINDOWS\MSWDM.EXE N/A

Processes

C:\Users\Admin\AppData\Local\Temp\1d7111ab5f67a519b7e271d4bcda9340_NeikiAnalytics.exe

"C:\Users\Admin\AppData\Local\Temp\1d7111ab5f67a519b7e271d4bcda9340_NeikiAnalytics.exe"

C:\WINDOWS\MSWDM.EXE

"C:\WINDOWS\MSWDM.EXE"

C:\WINDOWS\MSWDM.EXE

-r!C:\Windows\devF8B.tmp!C:\Users\Admin\AppData\Local\Temp\1d7111ab5f67a519b7e271d4bcda9340_NeikiAnalytics.exe! !

C:\Users\Admin\AppData\Local\Temp\1D7111AB5F67A519B7E271D4BCDA9340_NEIKIANALYTICS.EXE

C:\WINDOWS\MSWDM.EXE

-e!C:\Windows\devF8B.tmp!C:\Users\Admin\AppData\Local\Temp\1D7111AB5F67A519B7E271D4BCDA9340_NEIKIANALYTICS.EXE!

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4140 --field-trial-handle=3192,i,2785050981002401924,4037047756083432660,262144 --variations-seed-version /prefetch:8

Network

Country Destination Domain Proto
N/A 10.127.255.255:78 udp
N/A 10.255.255.255:78 udp
N/A 10.127.0.255:78 udp
US 8.8.8.8:53 255.0.127.10.in-addr.arpa udp
US 8.8.8.8:53 255.255.255.10.in-addr.arpa udp
US 8.8.8.8:53 217.106.137.52.in-addr.arpa udp
US 8.8.8.8:53 172.210.232.199.in-addr.arpa udp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
US 8.8.8.8:53 164.189.21.2.in-addr.arpa udp
US 8.8.8.8:53 58.55.71.13.in-addr.arpa udp
US 8.8.8.8:53 103.169.127.40.in-addr.arpa udp
US 8.8.8.8:53 15.164.165.52.in-addr.arpa udp
US 13.107.253.64:443 tcp
US 8.8.8.8:53 196.249.167.52.in-addr.arpa udp
NL 52.142.223.178:80 tcp
US 8.8.8.8:53 0.204.248.87.in-addr.arpa udp
US 8.8.8.8:53 29.243.111.52.in-addr.arpa udp
US 8.8.8.8:53 92.16.208.104.in-addr.arpa udp

Files

memory/3176-0-0x0000000000400000-0x000000000041B000-memory.dmp

C:\Windows\MSWDM.EXE

MD5 02252334fa17a25b781e2bfebd1bca3d
SHA1 a72858647bf5774aefcb9e064a5db74728d6a483
SHA256 3149abb7c1b6e56672f70f483b24222d0a41b948e7b7ec5ad8e66197480173fe
SHA512 8d3e14398fe9e1cae632762f85a548e5f7c455a2f8481e30017e2caad14412215f88ca217a109cfb87f3cb41603c0560c90de4cc648039f9f62b017427b33413

memory/3176-9-0x0000000000400000-0x000000000041B000-memory.dmp

C:\Windows\devF8B.tmp

MD5 619f7135621b50fd1900ff24aade1524
SHA1 6c7ea8bbd435163ae3945cbef30ef6b9872a4591
SHA256 344f076bb1211cb02eca9e5ed2c0ce59bcf74ccbc749ec611538fa14ecb9aad2
SHA512 2c7293c084d09bc2e3ae2d066dd7b331c810d9e2eeca8b236a8e87fdeb18e877b948747d3491fcaff245816507685250bd35f984c67a43b29b0ae31ecb2bd628

C:\Users\Admin\AppData\Local\Temp\1D7111AB5F67A519B7E271D4BCDA9340_NEIKIANALYTICS.EXE

MD5 2c37c7942900b3e860fbcb562d86e3d4
SHA1 7959f6903d8aa5304c3ce5e77fdc3dd07a0bcb7c
SHA256 7146fc28a4cf216475ba56a2f0e4ca2c912926f2a39faa31365976b2dcb9ca7d
SHA512 f968dc6430648d12fc70b6d0221dd791c0b7d0b506b369749b3256e87d927422bddf051dc637e3c9168e43c58eeb8ec50bebe51ec4ff7a258089126e6a0730b1

memory/2240-17-0x0000000000400000-0x000000000041B000-memory.dmp

memory/2240-20-0x0000000000400000-0x000000000041B000-memory.dmp

memory/2400-23-0x0000000000400000-0x000000000041B000-memory.dmp

memory/2180-24-0x0000000000400000-0x000000000041B000-memory.dmp