Analysis
-
max time kernel
150s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
07/05/2024, 21:27
Static task
static1
Behavioral task
behavioral1
Sample
3b62a2eda77fa99ef313a5ad0ba6d9c0_NEIKI.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
3b62a2eda77fa99ef313a5ad0ba6d9c0_NEIKI.exe
Resource
win10v2004-20240419-en
General
-
Target
3b62a2eda77fa99ef313a5ad0ba6d9c0_NEIKI.exe
-
Size
4.1MB
-
MD5
3b62a2eda77fa99ef313a5ad0ba6d9c0
-
SHA1
f98905b5a0f8d2e47e6a0fa36dcfdb1c3a9c6c28
-
SHA256
33d18d5db5f12180525a20ec01b86d746f7bfddeaa4123706648b88e891b2119
-
SHA512
6e625e5ce0f46e882452ecef902a2128e24682f6615478f4f424e36582c6a58aef61a30083f142e7b8162ccbd3efeaad9ed1a6c33d52f2dbbafd6581471bd5ab
-
SSDEEP
49152:sxX7665YxRVplZzSKntlGIiT+HvRdpcAHSjpjK3LB7B/bSqz8b6LNXJqI20t:sxX7QnxrloE5dpUpMbVz8eLFcz
Malware Config
Signatures
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ecdevopti.exe 3b62a2eda77fa99ef313a5ad0ba6d9c0_NEIKI.exe -
Executes dropped EXE 2 IoCs
pid Process 3900 ecdevopti.exe 4108 xbodec.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Parametr = "C:\\SysDrvCP\\xbodec.exe" 3b62a2eda77fa99ef313a5ad0ba6d9c0_NEIKI.exe Set value (str) \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Parametr = "C:\\VidOT\\optidevloc.exe" 3b62a2eda77fa99ef313a5ad0ba6d9c0_NEIKI.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4648 3b62a2eda77fa99ef313a5ad0ba6d9c0_NEIKI.exe 4648 3b62a2eda77fa99ef313a5ad0ba6d9c0_NEIKI.exe 4648 3b62a2eda77fa99ef313a5ad0ba6d9c0_NEIKI.exe 4648 3b62a2eda77fa99ef313a5ad0ba6d9c0_NEIKI.exe 3900 ecdevopti.exe 3900 ecdevopti.exe 4108 xbodec.exe 4108 xbodec.exe 3900 ecdevopti.exe 3900 ecdevopti.exe 4108 xbodec.exe 4108 xbodec.exe 3900 ecdevopti.exe 3900 ecdevopti.exe 4108 xbodec.exe 4108 xbodec.exe 3900 ecdevopti.exe 3900 ecdevopti.exe 4108 xbodec.exe 4108 xbodec.exe 3900 ecdevopti.exe 3900 ecdevopti.exe 4108 xbodec.exe 4108 xbodec.exe 3900 ecdevopti.exe 3900 ecdevopti.exe 4108 xbodec.exe 4108 xbodec.exe 3900 ecdevopti.exe 3900 ecdevopti.exe 4108 xbodec.exe 4108 xbodec.exe 3900 ecdevopti.exe 3900 ecdevopti.exe 4108 xbodec.exe 4108 xbodec.exe 3900 ecdevopti.exe 3900 ecdevopti.exe 4108 xbodec.exe 4108 xbodec.exe 3900 ecdevopti.exe 3900 ecdevopti.exe 4108 xbodec.exe 4108 xbodec.exe 3900 ecdevopti.exe 3900 ecdevopti.exe 4108 xbodec.exe 4108 xbodec.exe 3900 ecdevopti.exe 3900 ecdevopti.exe 4108 xbodec.exe 4108 xbodec.exe 3900 ecdevopti.exe 3900 ecdevopti.exe 4108 xbodec.exe 4108 xbodec.exe 3900 ecdevopti.exe 3900 ecdevopti.exe 4108 xbodec.exe 4108 xbodec.exe 3900 ecdevopti.exe 3900 ecdevopti.exe 4108 xbodec.exe 4108 xbodec.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4648 wrote to memory of 3900 4648 3b62a2eda77fa99ef313a5ad0ba6d9c0_NEIKI.exe 90 PID 4648 wrote to memory of 3900 4648 3b62a2eda77fa99ef313a5ad0ba6d9c0_NEIKI.exe 90 PID 4648 wrote to memory of 3900 4648 3b62a2eda77fa99ef313a5ad0ba6d9c0_NEIKI.exe 90 PID 4648 wrote to memory of 4108 4648 3b62a2eda77fa99ef313a5ad0ba6d9c0_NEIKI.exe 93 PID 4648 wrote to memory of 4108 4648 3b62a2eda77fa99ef313a5ad0ba6d9c0_NEIKI.exe 93 PID 4648 wrote to memory of 4108 4648 3b62a2eda77fa99ef313a5ad0ba6d9c0_NEIKI.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\3b62a2eda77fa99ef313a5ad0ba6d9c0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\3b62a2eda77fa99ef313a5ad0ba6d9c0_NEIKI.exe"1⤵
- Drops startup file
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4648 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ecdevopti.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ecdevopti.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:3900
-
-
C:\SysDrvCP\xbodec.exeC:\SysDrvCP\xbodec.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:4108
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4.1MB
MD57ddbadba977c6c0ecca4f29fcd262d53
SHA183177628c6aa1df1475384e29d7c784055541269
SHA256881fd9c8a1f211b6e2a7fd8eb361bdc5f249543a15ca4f58bbaac2008117d209
SHA5125c9266ca5768b2b922ca8e5eefad8d25f8a1b30080b2392721121f6d9ac4246eb70973636086423cbf9a60efc5c366813123e4744dc008b0aa8c1d8de95cc34f
-
Filesize
204B
MD51e4ebaa3953cb325446c9e1908330288
SHA13391c8208f84ef2d8eed5eda4718a3f71eda6c87
SHA2568063a42a57e7d96175691d6f0e22c1d5940905e7a9ccdd9c3e9da3d4b4998f10
SHA51255ace22d32834d0b47526ade4c86ab5b729404094a1a603d9483b489a58dc705e77de4b2e96c5fa579a728c34926ab162faff974577908db92d086f02c734b94
-
Filesize
172B
MD5ff12a3aac4e405dc63048f78b42a8139
SHA1297afcff6d610f5a7d2288da755dbf0270b89a38
SHA256d7dd6c90cdaaf2f1781e28a6cdf9fbe58fc6e4463a1e7b626e2338704dad10df
SHA512136cb9054466f4a08e1523314c5a35df2b7d5a69144bbfcf1abe24087dbb61ae8c3a662ec580c01c16375f489f42b8613080cd480778ec0f1ae2643b3c0db0e7
-
Filesize
4.1MB
MD5bc0d1206673e1b744ddd8f601d8db98c
SHA1f4129e5f2f112f96164248e7ce4dd15cbc67fec8
SHA25667e1d379118da7383aa396812810201d13b72aee31c814cfcc45d6fd39f19219
SHA51215f64fffe13d9e9120efc5f9817845565ca0fdbcede494e968a15f5725cbe4d62193307750798b34e256a9b7f1de0ebe19150d024a48fe35bf7ef436afa9e937
-
Filesize
1.2MB
MD50136675279f80850e44f976125bce38c
SHA19b4deaa9007c006a7d911e96ab55abe2edd66923
SHA256c2caa75003fa02ee17e6868d4ab4d07ca80e9bce85bc942207ec6f40f803db5f
SHA5122890d6cfc0186724908aab2fdf49278f011293ed2137f60b4bdc568791c2abeccb87eacab89abf9b828e31eba60b23cb741dca64d41eeeed5cc437da728629ec
-
Filesize
4.1MB
MD5d51f3fc46e12f0a0974c77fa0bfc99e6
SHA1d36971622f7946f0927edb84bbe71cf988759213
SHA25608ebb1b63644b7c16c457da944ff8c99c4cd40c23e77532da6c01d24bc3ff5be
SHA5126f47df25f86a81c19602b04dea65726a8ce3df0a45ec5cdfcae0e337fd712311488d291569a0ad0bbfd0584976883271a3901b92a1813570a4ba0167d30f7563