Analysis
-
max time kernel
150s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
07/05/2024, 21:56
Static task
static1
Behavioral task
behavioral1
Sample
45727dce66b14809567077d53cec3400_NEIKI.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
45727dce66b14809567077d53cec3400_NEIKI.exe
Resource
win10v2004-20240419-en
General
-
Target
45727dce66b14809567077d53cec3400_NEIKI.exe
-
Size
3.2MB
-
MD5
45727dce66b14809567077d53cec3400
-
SHA1
0188682ab8743ae0da9dbc58fa8a71c2074423e2
-
SHA256
e50fa43532c6e030439e2d64c900809d20658d87668d5c5348220f16948b1a9e
-
SHA512
22962fa43a18e05e54a2c47c0efd13eb3167a5665dd019e10abc61659c93021d02741aace7b1ba6c144bb122a13b61f2d5c16ccbbf71746da58c668111ec1c89
-
SSDEEP
49152:sxX7665YxRVplZzSKntlGIiT+HvRdpcAHSjpjK3LBdB/bSqz8b6LNXJqI20t:sxX7QnxrloE5dpUpWbVz8eLFcz
Malware Config
Signatures
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ecdevbod.exe 45727dce66b14809567077d53cec3400_NEIKI.exe -
Executes dropped EXE 2 IoCs
pid Process 2572 ecdevbod.exe 2636 xoptisys.exe -
Loads dropped DLL 2 IoCs
pid Process 2208 45727dce66b14809567077d53cec3400_NEIKI.exe 2208 45727dce66b14809567077d53cec3400_NEIKI.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Run\Parametr = "C:\\UserDotGO\\xoptisys.exe" 45727dce66b14809567077d53cec3400_NEIKI.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\Parametr = "C:\\LabZIG\\dobdevec.exe" 45727dce66b14809567077d53cec3400_NEIKI.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2208 45727dce66b14809567077d53cec3400_NEIKI.exe 2208 45727dce66b14809567077d53cec3400_NEIKI.exe 2572 ecdevbod.exe 2636 xoptisys.exe 2572 ecdevbod.exe 2636 xoptisys.exe 2572 ecdevbod.exe 2636 xoptisys.exe 2572 ecdevbod.exe 2636 xoptisys.exe 2572 ecdevbod.exe 2636 xoptisys.exe 2572 ecdevbod.exe 2636 xoptisys.exe 2572 ecdevbod.exe 2636 xoptisys.exe 2572 ecdevbod.exe 2636 xoptisys.exe 2572 ecdevbod.exe 2636 xoptisys.exe 2572 ecdevbod.exe 2636 xoptisys.exe 2572 ecdevbod.exe 2636 xoptisys.exe 2572 ecdevbod.exe 2636 xoptisys.exe 2572 ecdevbod.exe 2636 xoptisys.exe 2572 ecdevbod.exe 2636 xoptisys.exe 2572 ecdevbod.exe 2636 xoptisys.exe 2572 ecdevbod.exe 2636 xoptisys.exe 2572 ecdevbod.exe 2636 xoptisys.exe 2572 ecdevbod.exe 2636 xoptisys.exe 2572 ecdevbod.exe 2636 xoptisys.exe 2572 ecdevbod.exe 2636 xoptisys.exe 2572 ecdevbod.exe 2636 xoptisys.exe 2572 ecdevbod.exe 2636 xoptisys.exe 2572 ecdevbod.exe 2636 xoptisys.exe 2572 ecdevbod.exe 2636 xoptisys.exe 2572 ecdevbod.exe 2636 xoptisys.exe 2572 ecdevbod.exe 2636 xoptisys.exe 2572 ecdevbod.exe 2636 xoptisys.exe 2572 ecdevbod.exe 2636 xoptisys.exe 2572 ecdevbod.exe 2636 xoptisys.exe 2572 ecdevbod.exe 2636 xoptisys.exe 2572 ecdevbod.exe 2636 xoptisys.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2208 wrote to memory of 2572 2208 45727dce66b14809567077d53cec3400_NEIKI.exe 28 PID 2208 wrote to memory of 2572 2208 45727dce66b14809567077d53cec3400_NEIKI.exe 28 PID 2208 wrote to memory of 2572 2208 45727dce66b14809567077d53cec3400_NEIKI.exe 28 PID 2208 wrote to memory of 2572 2208 45727dce66b14809567077d53cec3400_NEIKI.exe 28 PID 2208 wrote to memory of 2636 2208 45727dce66b14809567077d53cec3400_NEIKI.exe 29 PID 2208 wrote to memory of 2636 2208 45727dce66b14809567077d53cec3400_NEIKI.exe 29 PID 2208 wrote to memory of 2636 2208 45727dce66b14809567077d53cec3400_NEIKI.exe 29 PID 2208 wrote to memory of 2636 2208 45727dce66b14809567077d53cec3400_NEIKI.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\45727dce66b14809567077d53cec3400_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\45727dce66b14809567077d53cec3400_NEIKI.exe"1⤵
- Drops startup file
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2208 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ecdevbod.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ecdevbod.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2572
-
-
C:\UserDotGO\xoptisys.exeC:\UserDotGO\xoptisys.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2636
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.1MB
MD5f3868168ee6a64559e0db3a5a419cc23
SHA18e3fcc2f3536ce8fc4ef86833a425d0a088583e0
SHA256fcdc19fd58d2d8fffa6411ebbb7320a5ffbb5765faf7c5762a220bb024f67d45
SHA512acbff08015e12452f2a1845873fdefc0d323716edc56bc0c7aaa75aa0be236d0a2cedbf6dbb3929c880c64670eadf1f6f672baef4d5d736c10bdbc412648d44f
-
Filesize
3.2MB
MD58faf7f3a8567f08677df1a8145e17bb7
SHA1c61ca281e089f0ebcb19090c34fc0fcc2736f5df
SHA2567cffddec19c98ceea88c658270e7b2013334e16f267fd2b2ccb2bbabfce55fbf
SHA5120146947e28d8848c1a90a60de92d357b3da568654df709818434dd6434fb63e7cc4749ec4324951f693316ced7c02d0c10bfdbd02fce0f746f11b6804b3adaf0
-
Filesize
3.2MB
MD5089e0629bb712fbf36b4760a97c7ad5a
SHA105225d53d9e31e47b312ff8d6eb761ee3598644b
SHA2560e57723f07fa2de11926f4c1480679258012bdbad559f4eeca9d1acf2164010d
SHA5121b806ba5691a2163c293d13c061d2a49904b4b2afefbe16cb835aa0160cc47136711baa00a9e2b8f787605f78f3fa1219f0d4e476863d3bd5315d8041af55564
-
Filesize
173B
MD59bfbc6d2826e78b9a9e3c698b41c4eb4
SHA16157d2f439aa0202ed55553f23f8550b9586a6b3
SHA25651a5f53824564b55b02e2c5eb5c2d453144570f2078d48fc2c8c2023bd1c704c
SHA51242300da1fe64096ea3cf4a8b8b63cf6a97c6c988a31ad34b0badd2b60a94b8a20a63ec447527cf7089b5ab29809b8c5a0094dbcae5e4bfbdaf43f4c4af08d501
-
Filesize
205B
MD52e7b6742ca4680500d0c16e8afad1e2d
SHA15b2b6344d1f5688530fbe3991bd0c2fc3538d426
SHA256d88995a62589409c950d6bd890c59df728bdbdd23fd6d9f8ba98aaca5d8503fe
SHA5129a08035775bd6e10aa6caf98c487c95ee7e45ded1df493262abdfc8d183f2181bcd5b3ff250869406364c48c7a08bee70464f01348216183b17c0b65c599990e
-
Filesize
3.2MB
MD5087b089bb88184ae0b3454d00302fee3
SHA130477688d5187ab31b51fb5ba7813ddac2c204cb
SHA25650e69cd298c98df78f4445915cae13a55756383d8fc1b1391c52f90029e14e88
SHA5124ac300c532b4f790aa99c40869ff6f936632e8256bdab30d8e846f3655abc0bbf7da17d882858ea010c087953a746f4b65be823752b7377b63429062e351f809