Analysis

  • max time kernel
    150s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240215-en
  • resource tags

    arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system
  • submitted
    07/05/2024, 21:56

General

  • Target

    45727dce66b14809567077d53cec3400_NEIKI.exe

  • Size

    3.2MB

  • MD5

    45727dce66b14809567077d53cec3400

  • SHA1

    0188682ab8743ae0da9dbc58fa8a71c2074423e2

  • SHA256

    e50fa43532c6e030439e2d64c900809d20658d87668d5c5348220f16948b1a9e

  • SHA512

    22962fa43a18e05e54a2c47c0efd13eb3167a5665dd019e10abc61659c93021d02741aace7b1ba6c144bb122a13b61f2d5c16ccbbf71746da58c668111ec1c89

  • SSDEEP

    49152:sxX7665YxRVplZzSKntlGIiT+HvRdpcAHSjpjK3LBdB/bSqz8b6LNXJqI20t:sxX7QnxrloE5dpUpWbVz8eLFcz

Malware Config

Signatures

  • Drops startup file 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\45727dce66b14809567077d53cec3400_NEIKI.exe
    "C:\Users\Admin\AppData\Local\Temp\45727dce66b14809567077d53cec3400_NEIKI.exe"
    1⤵
    • Drops startup file
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:2208
    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ecdevbod.exe
      "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ecdevbod.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      PID:2572
    • C:\UserDotGO\xoptisys.exe
      C:\UserDotGO\xoptisys.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      PID:2636

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\LabZIG\dobdevec.exe

          Filesize

          2.1MB

          MD5

          f3868168ee6a64559e0db3a5a419cc23

          SHA1

          8e3fcc2f3536ce8fc4ef86833a425d0a088583e0

          SHA256

          fcdc19fd58d2d8fffa6411ebbb7320a5ffbb5765faf7c5762a220bb024f67d45

          SHA512

          acbff08015e12452f2a1845873fdefc0d323716edc56bc0c7aaa75aa0be236d0a2cedbf6dbb3929c880c64670eadf1f6f672baef4d5d736c10bdbc412648d44f

        • C:\LabZIG\dobdevec.exe

          Filesize

          3.2MB

          MD5

          8faf7f3a8567f08677df1a8145e17bb7

          SHA1

          c61ca281e089f0ebcb19090c34fc0fcc2736f5df

          SHA256

          7cffddec19c98ceea88c658270e7b2013334e16f267fd2b2ccb2bbabfce55fbf

          SHA512

          0146947e28d8848c1a90a60de92d357b3da568654df709818434dd6434fb63e7cc4749ec4324951f693316ced7c02d0c10bfdbd02fce0f746f11b6804b3adaf0

        • C:\UserDotGO\xoptisys.exe

          Filesize

          3.2MB

          MD5

          089e0629bb712fbf36b4760a97c7ad5a

          SHA1

          05225d53d9e31e47b312ff8d6eb761ee3598644b

          SHA256

          0e57723f07fa2de11926f4c1480679258012bdbad559f4eeca9d1acf2164010d

          SHA512

          1b806ba5691a2163c293d13c061d2a49904b4b2afefbe16cb835aa0160cc47136711baa00a9e2b8f787605f78f3fa1219f0d4e476863d3bd5315d8041af55564

        • C:\Users\Admin\253086396416_6.1_Admin.ini

          Filesize

          173B

          MD5

          9bfbc6d2826e78b9a9e3c698b41c4eb4

          SHA1

          6157d2f439aa0202ed55553f23f8550b9586a6b3

          SHA256

          51a5f53824564b55b02e2c5eb5c2d453144570f2078d48fc2c8c2023bd1c704c

          SHA512

          42300da1fe64096ea3cf4a8b8b63cf6a97c6c988a31ad34b0badd2b60a94b8a20a63ec447527cf7089b5ab29809b8c5a0094dbcae5e4bfbdaf43f4c4af08d501

        • C:\Users\Admin\253086396416_6.1_Admin.ini

          Filesize

          205B

          MD5

          2e7b6742ca4680500d0c16e8afad1e2d

          SHA1

          5b2b6344d1f5688530fbe3991bd0c2fc3538d426

          SHA256

          d88995a62589409c950d6bd890c59df728bdbdd23fd6d9f8ba98aaca5d8503fe

          SHA512

          9a08035775bd6e10aa6caf98c487c95ee7e45ded1df493262abdfc8d183f2181bcd5b3ff250869406364c48c7a08bee70464f01348216183b17c0b65c599990e

        • \Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ecdevbod.exe

          Filesize

          3.2MB

          MD5

          087b089bb88184ae0b3454d00302fee3

          SHA1

          30477688d5187ab31b51fb5ba7813ddac2c204cb

          SHA256

          50e69cd298c98df78f4445915cae13a55756383d8fc1b1391c52f90029e14e88

          SHA512

          4ac300c532b4f790aa99c40869ff6f936632e8256bdab30d8e846f3655abc0bbf7da17d882858ea010c087953a746f4b65be823752b7377b63429062e351f809