Analysis
-
max time kernel
20s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
13-06-2024 00:09
Static task
static1
Behavioral task
behavioral1
Sample
4ee941525ef3445b099653dce246bbc0_NeikiAnalytics.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
4ee941525ef3445b099653dce246bbc0_NeikiAnalytics.exe
Resource
win10v2004-20240611-en
General
-
Target
4ee941525ef3445b099653dce246bbc0_NeikiAnalytics.exe
-
Size
615KB
-
MD5
4ee941525ef3445b099653dce246bbc0
-
SHA1
02d803d30642832034ccd9bc858f3fd99e5ba0e4
-
SHA256
8fc73a320967934f254b8dc63aa7cd65b9e9aed62bbe48ec838914e82fdb142d
-
SHA512
d291089751dccf3952465e3eedd9eed79b52fab5b46a82d5c604baa5784f47d3106a17e374e3357506ecc75dd7f6dcc56587c2584429cf48541ad4eeef8fb3eb
-
SSDEEP
12288:wlbX+Waplw9U+qMi8CtdVldusIh6BBHCHrKZXCktSzIzWpX50:WbX+NYTqMi8CtBd2QHCHmTBW50
Malware Config
Signatures
-
Executes dropped EXE 5 IoCs
pid Process 2572 MSWDM.EXE 2228 MSWDM.EXE 2188 4EE941525EF3445B099653DCE246BBC0_NEIKIANALYTICS.EXE 1204 Process not Found 2720 MSWDM.EXE -
Loads dropped DLL 2 IoCs
pid Process 2572 MSWDM.EXE 2572 MSWDM.EXE -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\WDM = "MSWDM.EXE" 4ee941525ef3445b099653dce246bbc0_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunServices\WDM = "MSWDM.EXE" 4ee941525ef3445b099653dce246bbc0_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\WDM = "MSWDM.EXE" MSWDM.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunServices\WDM = "MSWDM.EXE" MSWDM.EXE -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\WINDOWS\MSWDM.EXE 4ee941525ef3445b099653dce246bbc0_NeikiAnalytics.exe File opened for modification C:\Windows\dev12A6.tmp 4ee941525ef3445b099653dce246bbc0_NeikiAnalytics.exe File opened for modification C:\Windows\dev12A6.tmp MSWDM.EXE -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2572 MSWDM.EXE -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 2248 wrote to memory of 2228 2248 4ee941525ef3445b099653dce246bbc0_NeikiAnalytics.exe 28 PID 2248 wrote to memory of 2228 2248 4ee941525ef3445b099653dce246bbc0_NeikiAnalytics.exe 28 PID 2248 wrote to memory of 2228 2248 4ee941525ef3445b099653dce246bbc0_NeikiAnalytics.exe 28 PID 2248 wrote to memory of 2228 2248 4ee941525ef3445b099653dce246bbc0_NeikiAnalytics.exe 28 PID 2248 wrote to memory of 2572 2248 4ee941525ef3445b099653dce246bbc0_NeikiAnalytics.exe 29 PID 2248 wrote to memory of 2572 2248 4ee941525ef3445b099653dce246bbc0_NeikiAnalytics.exe 29 PID 2248 wrote to memory of 2572 2248 4ee941525ef3445b099653dce246bbc0_NeikiAnalytics.exe 29 PID 2248 wrote to memory of 2572 2248 4ee941525ef3445b099653dce246bbc0_NeikiAnalytics.exe 29 PID 2572 wrote to memory of 2188 2572 MSWDM.EXE 30 PID 2572 wrote to memory of 2188 2572 MSWDM.EXE 30 PID 2572 wrote to memory of 2188 2572 MSWDM.EXE 30 PID 2572 wrote to memory of 2188 2572 MSWDM.EXE 30 PID 2572 wrote to memory of 2720 2572 MSWDM.EXE 31 PID 2572 wrote to memory of 2720 2572 MSWDM.EXE 31 PID 2572 wrote to memory of 2720 2572 MSWDM.EXE 31 PID 2572 wrote to memory of 2720 2572 MSWDM.EXE 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\4ee941525ef3445b099653dce246bbc0_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\4ee941525ef3445b099653dce246bbc0_NeikiAnalytics.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2248 -
C:\WINDOWS\MSWDM.EXE"C:\WINDOWS\MSWDM.EXE"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:2228
-
-
C:\WINDOWS\MSWDM.EXE-r!C:\Windows\dev12A6.tmp!C:\Users\Admin\AppData\Local\Temp\4ee941525ef3445b099653dce246bbc0_NeikiAnalytics.exe! !2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2572 -
C:\Users\Admin\AppData\Local\Temp\4EE941525EF3445B099653DCE246BBC0_NEIKIANALYTICS.EXE
- Executes dropped EXE
PID:2188
-
-
C:\WINDOWS\MSWDM.EXE-e!C:\Windows\dev12A6.tmp!C:\Users\Admin\AppData\Local\Temp\4EE941525EF3445B099653DCE246BBC0_NEIKIANALYTICS.EXE!3⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:2720
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
615KB
MD5de973029b673f16235ea97a11c9509dc
SHA1fb34c9822b67fe97267349d2df2f8cfa05b023ae
SHA2565b358acb2eb9c5381b3b4f0d7af500f601d02d2376a9ecc653368287027dc0ab
SHA512a9a45d5d15ca83a2f1db97c4e3815138ab5f2562cd4cd5ec13dd2c44b9ca405d983bc2b01fc9307c095a02b20b20570a807575a029f51766ea2652544629bc91
-
Filesize
47KB
MD5336ffd74e5eb29bc13e4e0f5de0cb57a
SHA1fb3bab77482267f8880cd329d926a41d397d072d
SHA256688c0c407e9651d4fb63017475f3ca304c7ff8c0185592c3a1d7d3b660098c79
SHA512e8e70882eebbb5a602ac68a4a51a15c7d32d083b5c5717981a9b33d358e17411a0fee1294b631f29f0f5cf06e0ad86109198de6114ba364fdaac1e866a049d76
-
Filesize
568KB
MD504fb3ae7f05c8bc333125972ba907398
SHA1df22612647e9404a515d48ebad490349685250de
SHA2562fb898bacb587f2484c9c4aa6da2729079d93d1f923a017bb84beef87bf74fef
SHA51294c164a0b884c939ece30f5038d07b756702998d46786f9f613fbea2eb30bed4bc19a409f347bb4cc565898473b18155d580b453683223beaf30ed4079c251b2