Analysis
-
max time kernel
120s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
11/06/2024, 22:01
Behavioral task
behavioral1
Sample
06f72979548a1345e8f8ea4f2886f720_NeikiAnalytics.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
06f72979548a1345e8f8ea4f2886f720_NeikiAnalytics.exe
Resource
win10v2004-20240426-en
General
-
Target
06f72979548a1345e8f8ea4f2886f720_NeikiAnalytics.exe
-
Size
134KB
-
MD5
06f72979548a1345e8f8ea4f2886f720
-
SHA1
cc5c4e2e60b129f9c788e1fbb6e087bf57314df0
-
SHA256
c2128d4b2c7d8e7a1dd2cc3230dd1829022f80de7e2079145a466c675d143b6f
-
SHA512
e5b38a5211125f2ada291457e9d48939840492b619e0ad64ebb54f7cadd9a0a26de0f5eb00521f37915972fd9dfda772d7f90bcc78ea9a0e50b667ec3fc59dd1
-
SSDEEP
1536:rF0AJELopHG9aa+9qX3apJzAKWYr0v7ioy6paK2AZqMIK7aGZh38QR:riAyLN9aa+9U2rW1ip6pr2At7NZuQR
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2356 WwanSvc.exe -
Loads dropped DLL 1 IoCs
pid Process 1284 06f72979548a1345e8f8ea4f2886f720_NeikiAnalytics.exe -
resource yara_rule behavioral1/memory/1284-1-0x00000000011A0000-0x00000000011C8000-memory.dmp upx behavioral1/memory/1284-4-0x0000000000120000-0x0000000000148000-memory.dmp upx behavioral1/files/0x002e000000015364-2.dat upx behavioral1/memory/2356-7-0x00000000012B0000-0x00000000012D8000-memory.dmp upx behavioral1/memory/1284-9-0x00000000011A0000-0x00000000011C8000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Window Update = "\"C:\\ProgramData\\Update\\WwanSvc.exe\" /run" 06f72979548a1345e8f8ea4f2886f720_NeikiAnalytics.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1284 wrote to memory of 2356 1284 06f72979548a1345e8f8ea4f2886f720_NeikiAnalytics.exe 28 PID 1284 wrote to memory of 2356 1284 06f72979548a1345e8f8ea4f2886f720_NeikiAnalytics.exe 28 PID 1284 wrote to memory of 2356 1284 06f72979548a1345e8f8ea4f2886f720_NeikiAnalytics.exe 28 PID 1284 wrote to memory of 2356 1284 06f72979548a1345e8f8ea4f2886f720_NeikiAnalytics.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\06f72979548a1345e8f8ea4f2886f720_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\06f72979548a1345e8f8ea4f2886f720_NeikiAnalytics.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1284 -
C:\ProgramData\Update\WwanSvc.exe"C:\ProgramData\Update\WwanSvc.exe" /run2⤵
- Executes dropped EXE
PID:2356
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
134KB
MD5774d1a1cb4667068fa41127f70022749
SHA11d1890b04afb11998146d1b89c486bfaaf93b99f
SHA256326f1e8e5df5af41398f631440caeaf5708901b6e3f680fffeca4c53c2e419bc
SHA51225de1d498c379dbf00bfc53963f2bd8428c4e8f5c880503321e44316c7fa4d52aecc06efe21d1c40a73a26d13d9f52c46fb606f2ec236e4ad6ed0f0e4c632ea0