Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
08-05-2024 01:28
Static task
static1
Behavioral task
behavioral1
Sample
92824bfa2d9f88ae6bcef9f692858b70_NEIKI.exe
Resource
win7-20240221-en
General
-
Target
92824bfa2d9f88ae6bcef9f692858b70_NEIKI.exe
-
Size
7.6MB
-
MD5
92824bfa2d9f88ae6bcef9f692858b70
-
SHA1
f1723631ff5c232892cfc3778ecda6ebac088e44
-
SHA256
a78eb6b99d2143d1d094d1b370c12cce4598af76f3454366aa5e16ff1207cfb7
-
SHA512
0d464f5b20b7c63162d74ceeec5c9bfccf5eec8ef4a022d3bc4769b5602c286eca1ae570c06c2116e6100823f5fbe45ae7b6c43a738092e09101844f5ffa15a3
-
SSDEEP
196608:vH4GhBuV5aqFL4rooriZHLwWIcl2FVIo2Ghi3Cx6smv:QGhBuV5a64r5roHLARVIo2G886P
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2176 servbrow.exe 2900 servbrow.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops file in Program Files directory 6 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Mozilla Maintenance Service\Ws2Help.dll 92824bfa2d9f88ae6bcef9f692858b70_NEIKI.exe File created C:\Program Files\7-Zip\Ws2Help.dll 92824bfa2d9f88ae6bcef9f692858b70_NEIKI.exe File opened for modification C:\Program Files\7-Zip\Ws2Help.dll 92824bfa2d9f88ae6bcef9f692858b70_NEIKI.exe File created C:\Program Files\VideoLAN\VLC\Ws2Help.dll 92824bfa2d9f88ae6bcef9f692858b70_NEIKI.exe File opened for modification C:\Program Files\VideoLAN\VLC\Ws2Help.dll 92824bfa2d9f88ae6bcef9f692858b70_NEIKI.exe File created C:\Program Files (x86)\Mozilla Maintenance Service\Ws2Help.dll 92824bfa2d9f88ae6bcef9f692858b70_NEIKI.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\servbrow.exe 92824bfa2d9f88ae6bcef9f692858b70_NEIKI.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeTcbPrivilege 2176 servbrow.exe Token: SeChangeNotifyPrivilege 2176 servbrow.exe Token: SeIncreaseQuotaPrivilege 2176 servbrow.exe Token: SeAssignPrimaryTokenPrivilege 2176 servbrow.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2940 92824bfa2d9f88ae6bcef9f692858b70_NEIKI.exe 2176 servbrow.exe 2900 servbrow.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2176 wrote to memory of 2900 2176 servbrow.exe 31 PID 2176 wrote to memory of 2900 2176 servbrow.exe 31 PID 2176 wrote to memory of 2900 2176 servbrow.exe 31 PID 2176 wrote to memory of 2900 2176 servbrow.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\92824bfa2d9f88ae6bcef9f692858b70_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\92824bfa2d9f88ae6bcef9f692858b70_NEIKI.exe"1⤵
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
PID:2940
-
C:\Windows\servbrow.exe"C:\Windows\servbrow.exe" /Service1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2176 -
C:\Windows\servbrow.exe"C:\Windows\servbrow.exe" /Popup2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2900
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
7.6MB
MD55e02764fece52ded1ff00fdcb2f6d1df
SHA16c32a52570586662923fa76bf18378dd3588b374
SHA25669d8f8d08f72660d3331cab8766bba51871a77152f6a94c1a0812369f253d85c
SHA512d474077920e6548136787cf550ca2aae8f0d112221ee789c691cb9547353142d5a7ae250aa92d6bbadab901f33aeb57cc13f17ac33ed2aa22830c36833697477
-
Filesize
7.6MB
MD58ec4a941b18a61f948fcdfa6880b5953
SHA127d37fe85cd70ddc95260b7fb13d9e11d1ae413b
SHA2563fd7635afee53ca8117b7b9e1a727d3e2586d65dc54dccda4455aa15c13c7ece
SHA5128af5dbe89c351be16769e21aa9228b021e9ea3ef274143ed91aaca33927103d7e52d4b53865c7380130196d16d948fcc2c8bdb7b84e3fcf37917fe0fcc88efc3