Analysis
-
max time kernel
149s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
08/05/2024, 01:48
Static task
static1
Behavioral task
behavioral1
Sample
9ac1899ada7ef9d720f05ea5bd44f610_NEIKI.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
9ac1899ada7ef9d720f05ea5bd44f610_NEIKI.exe
Resource
win10v2004-20240226-en
General
-
Target
9ac1899ada7ef9d720f05ea5bd44f610_NEIKI.exe
-
Size
3.0MB
-
MD5
9ac1899ada7ef9d720f05ea5bd44f610
-
SHA1
f4a39d23730e227cfb2bb9d642bf82fb07e1165f
-
SHA256
7347f6be05016f79c4df3911f84e4e2462d39eff3b7ebd3e72d1cc2dbe92fc10
-
SHA512
6df4747e9e53534ca5bbb18fc3f720be149eb3be3095860f8ec17ac47625c17d08331c3fcbe072b86496a408f4dc7017782066f22522f1eae49f7a5541301647
-
SSDEEP
49152:sxX7665YxRVplZzSKntlGIiT+HvRdpcAHSjpjK3LBTB/bSqz8b6LNX:sxX7QnxrloE5dpUpkbVz8eLF
Malware Config
Signatures
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\sysadob.exe 9ac1899ada7ef9d720f05ea5bd44f610_NEIKI.exe -
Executes dropped EXE 2 IoCs
pid Process 2312 sysadob.exe 1664 abodloc.exe -
Loads dropped DLL 2 IoCs
pid Process 1736 9ac1899ada7ef9d720f05ea5bd44f610_NEIKI.exe 1736 9ac1899ada7ef9d720f05ea5bd44f610_NEIKI.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\Parametr = "C:\\AdobeDJ\\abodloc.exe" 9ac1899ada7ef9d720f05ea5bd44f610_NEIKI.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\Parametr = "C:\\LabZ6V\\boddevec.exe" 9ac1899ada7ef9d720f05ea5bd44f610_NEIKI.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1736 9ac1899ada7ef9d720f05ea5bd44f610_NEIKI.exe 1736 9ac1899ada7ef9d720f05ea5bd44f610_NEIKI.exe 2312 sysadob.exe 1664 abodloc.exe 2312 sysadob.exe 1664 abodloc.exe 2312 sysadob.exe 1664 abodloc.exe 2312 sysadob.exe 1664 abodloc.exe 2312 sysadob.exe 1664 abodloc.exe 2312 sysadob.exe 1664 abodloc.exe 2312 sysadob.exe 1664 abodloc.exe 2312 sysadob.exe 1664 abodloc.exe 2312 sysadob.exe 1664 abodloc.exe 2312 sysadob.exe 1664 abodloc.exe 2312 sysadob.exe 1664 abodloc.exe 2312 sysadob.exe 1664 abodloc.exe 2312 sysadob.exe 1664 abodloc.exe 2312 sysadob.exe 1664 abodloc.exe 2312 sysadob.exe 1664 abodloc.exe 2312 sysadob.exe 1664 abodloc.exe 2312 sysadob.exe 1664 abodloc.exe 2312 sysadob.exe 1664 abodloc.exe 2312 sysadob.exe 1664 abodloc.exe 2312 sysadob.exe 1664 abodloc.exe 2312 sysadob.exe 1664 abodloc.exe 2312 sysadob.exe 1664 abodloc.exe 2312 sysadob.exe 1664 abodloc.exe 2312 sysadob.exe 1664 abodloc.exe 2312 sysadob.exe 1664 abodloc.exe 2312 sysadob.exe 1664 abodloc.exe 2312 sysadob.exe 1664 abodloc.exe 2312 sysadob.exe 1664 abodloc.exe 2312 sysadob.exe 1664 abodloc.exe 2312 sysadob.exe 1664 abodloc.exe 2312 sysadob.exe 1664 abodloc.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1736 wrote to memory of 2312 1736 9ac1899ada7ef9d720f05ea5bd44f610_NEIKI.exe 28 PID 1736 wrote to memory of 2312 1736 9ac1899ada7ef9d720f05ea5bd44f610_NEIKI.exe 28 PID 1736 wrote to memory of 2312 1736 9ac1899ada7ef9d720f05ea5bd44f610_NEIKI.exe 28 PID 1736 wrote to memory of 2312 1736 9ac1899ada7ef9d720f05ea5bd44f610_NEIKI.exe 28 PID 1736 wrote to memory of 1664 1736 9ac1899ada7ef9d720f05ea5bd44f610_NEIKI.exe 29 PID 1736 wrote to memory of 1664 1736 9ac1899ada7ef9d720f05ea5bd44f610_NEIKI.exe 29 PID 1736 wrote to memory of 1664 1736 9ac1899ada7ef9d720f05ea5bd44f610_NEIKI.exe 29 PID 1736 wrote to memory of 1664 1736 9ac1899ada7ef9d720f05ea5bd44f610_NEIKI.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\9ac1899ada7ef9d720f05ea5bd44f610_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\9ac1899ada7ef9d720f05ea5bd44f610_NEIKI.exe"1⤵
- Drops startup file
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1736 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\sysadob.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\sysadob.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2312
-
-
C:\AdobeDJ\abodloc.exeC:\AdobeDJ\abodloc.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:1664
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.0MB
MD5b5b7d1f871adf5918652fc51e44aad97
SHA18942b3b06520258ea284d9ec9a36796bf264340e
SHA256a721b5336175b08f98a3f97551385b226fa4f0424fbf36042d9588f9aa9d3ec3
SHA5122bc74e59ec6167d2557c6bb4e6299355c1a2c85b3183c7cd1318ca97892ee43678377626a5ec70eefdf8f3c61193cb46de18a0ae7a969fcdac13a7517fc20205
-
Filesize
2.7MB
MD5a806ead82dd5ae0738acba18c54308e3
SHA1bba48566322b796cb14c5fc263be7c1ddca8e7f6
SHA256a6ede6754be91fb8687ff02c621f11561c0dbb09a44ad25aefe14efb080a8fb4
SHA51280568060ff98f4ad50f249debf1f06b8955da4ba09a85c9890e9c55678784893b6fa7272b033cc0ef869bc62572616d6a2516e11d0cbf3ebbe0bf192546c0a86
-
Filesize
3.0MB
MD559703bd47f0347a9eda955be6e549af4
SHA11e9107a7e031f6367562e15ca6eca3e5f7c0f9af
SHA256ad37b495c41502cf326649736233e139168b8e2ce57cab36b8292d70adbfbd56
SHA51215a285475af562dd73f281a0a34ba7f46864477d02e65713a165dd0eb469fba409fdb3fb87ed0f024950138d8da45e61d7f0ce1227e5a36d90d73dab203ab064
-
Filesize
169B
MD5b7ffdc1cd6bced519005dd8f8d63b340
SHA158e75c23d147c6aeea893a313513526664dd2e14
SHA256ef17bcc58fd8ae55ce8e0e860b9b567530b0998e5307ef5ab2536052769d98cd
SHA5129919a1320d2f6904e6e0888b6e6fc55aad58b1343d5d6300ad528769cefeea2a67af51c3b123772fadfe7d8364fc933d2fcbd08cba17b9739c2d0f978dff2525
-
Filesize
201B
MD51e5fbae2aec6e8e16e83be1683b12659
SHA19c30dcecee9ad45f408685e05904be7322d9fb13
SHA2567cb8c5df0897a8586c0d6efc816ff2392ae882574b7f1e4113ef4a701baa08aa
SHA5127c5a7b58c1dc55fc1607a4bf931fecff61d91e2ea6c0b0e3eaba7e6a36bc699408bf74d719a1c91aa7b25c3da2c134ddf164ce8374cef0e34caa98ee26d2f57a
-
Filesize
3.0MB
MD500fb3afc410ee376cb2f892d0abb4479
SHA15c9d12a2ab70d08be404a40994939305d8fee75a
SHA25655a7fef5b95542a4371827026243f3f856f0f9c69d96b8e5e2609fe38544322a
SHA512b7e25093a23bc3b09fdc12581e482fd7f2d49848be658c35b782944ded019b07b0867be0acb7a340e9752d5eaad0c1f819bc02f11687d2504616935cb57c52fb