Analysis

  • max time kernel
    20s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    13-06-2024 00:09

General

  • Target

    4ee941525ef3445b099653dce246bbc0_NeikiAnalytics.exe

  • Size

    615KB

  • MD5

    4ee941525ef3445b099653dce246bbc0

  • SHA1

    02d803d30642832034ccd9bc858f3fd99e5ba0e4

  • SHA256

    8fc73a320967934f254b8dc63aa7cd65b9e9aed62bbe48ec838914e82fdb142d

  • SHA512

    d291089751dccf3952465e3eedd9eed79b52fab5b46a82d5c604baa5784f47d3106a17e374e3357506ecc75dd7f6dcc56587c2584429cf48541ad4eeef8fb3eb

  • SSDEEP

    12288:wlbX+Waplw9U+qMi8CtdVldusIh6BBHCHrKZXCktSzIzWpX50:WbX+NYTqMi8CtBd2QHCHmTBW50

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Drops file in Windows directory 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4ee941525ef3445b099653dce246bbc0_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\4ee941525ef3445b099653dce246bbc0_NeikiAnalytics.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    PID:2248
    • C:\WINDOWS\MSWDM.EXE
      "C:\WINDOWS\MSWDM.EXE"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      PID:2228
    • C:\WINDOWS\MSWDM.EXE
      -r!C:\Windows\dev12A6.tmp!C:\Users\Admin\AppData\Local\Temp\4ee941525ef3445b099653dce246bbc0_NeikiAnalytics.exe! !
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:2572
      • C:\Users\Admin\AppData\Local\Temp\4EE941525EF3445B099653DCE246BBC0_NEIKIANALYTICS.EXE
        3⤵
        • Executes dropped EXE
        PID:2188
      • C:\WINDOWS\MSWDM.EXE
        -e!C:\Windows\dev12A6.tmp!C:\Users\Admin\AppData\Local\Temp\4EE941525EF3445B099653DCE246BBC0_NEIKIANALYTICS.EXE!
        3⤵
        • Executes dropped EXE
        • Drops file in Windows directory
        PID:2720

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\4EE941525EF3445B099653DCE246BBC0_NEIKIANALYTICS.EXE

    Filesize

    615KB

    MD5

    de973029b673f16235ea97a11c9509dc

    SHA1

    fb34c9822b67fe97267349d2df2f8cfa05b023ae

    SHA256

    5b358acb2eb9c5381b3b4f0d7af500f601d02d2376a9ecc653368287027dc0ab

    SHA512

    a9a45d5d15ca83a2f1db97c4e3815138ab5f2562cd4cd5ec13dd2c44b9ca405d983bc2b01fc9307c095a02b20b20570a807575a029f51766ea2652544629bc91

  • C:\Windows\MSWDM.EXE

    Filesize

    47KB

    MD5

    336ffd74e5eb29bc13e4e0f5de0cb57a

    SHA1

    fb3bab77482267f8880cd329d926a41d397d072d

    SHA256

    688c0c407e9651d4fb63017475f3ca304c7ff8c0185592c3a1d7d3b660098c79

    SHA512

    e8e70882eebbb5a602ac68a4a51a15c7d32d083b5c5717981a9b33d358e17411a0fee1294b631f29f0f5cf06e0ad86109198de6114ba364fdaac1e866a049d76

  • C:\Windows\dev12A6.tmp

    Filesize

    568KB

    MD5

    04fb3ae7f05c8bc333125972ba907398

    SHA1

    df22612647e9404a515d48ebad490349685250de

    SHA256

    2fb898bacb587f2484c9c4aa6da2729079d93d1f923a017bb84beef87bf74fef

    SHA512

    94c164a0b884c939ece30f5038d07b756702998d46786f9f613fbea2eb30bed4bc19a409f347bb4cc565898473b18155d580b453683223beaf30ed4079c251b2

  • memory/2228-24-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/2228-36-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/2248-1-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/2248-12-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/2572-23-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/2572-35-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/2720-32-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB