Analysis
-
max time kernel
140s -
max time network
94s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
09/05/2024, 22:02
Static task
static1
Behavioral task
behavioral1
Sample
09f1e5386bd4b0203c315c7e39685160_NeikiAnalytics.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
09f1e5386bd4b0203c315c7e39685160_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
09f1e5386bd4b0203c315c7e39685160_NeikiAnalytics.exe
-
Size
283KB
-
MD5
09f1e5386bd4b0203c315c7e39685160
-
SHA1
266164d24e0421e47c1ffcb143422e026b7c565e
-
SHA256
0b3f38de9ddda5bbaa2f5e1e760289c529448febf7202b0c23a4de372f616cb0
-
SHA512
369c300d610de92f7b11d151c28ff806772f6feb754c42798b2cae2afdae7935fec65556ba546e4566f4960b9ef41692955638fe94ea9d9882677467ddffdfdd
-
SSDEEP
6144:ztvBPnU1b7e9SQii1EkoNlhlrQ2ZrM2xjT33J9ChN5wrb:Zv1nWdQP1EDhZPx33Z9yN5wn
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation 09f1e5386bd4b0203c315c7e39685160_NeikiAnalytics.exe -
Executes dropped EXE 1 IoCs
pid Process 1664 Isass.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Isass.exe = "C:\\Program Files (x86)\\Microsoft Build\\Isass.exe" 09f1e5386bd4b0203c315c7e39685160_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Isass.exe = "C:\\Program Files (x86)\\Microsoft Build\\Isass.exe" 09f1e5386bd4b0203c315c7e39685160_NeikiAnalytics.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files (x86)\Microsoft Build\Isass.exe 09f1e5386bd4b0203c315c7e39685160_NeikiAnalytics.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 716 09f1e5386bd4b0203c315c7e39685160_NeikiAnalytics.exe 716 09f1e5386bd4b0203c315c7e39685160_NeikiAnalytics.exe 1664 Isass.exe 1664 Isass.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 716 wrote to memory of 1664 716 09f1e5386bd4b0203c315c7e39685160_NeikiAnalytics.exe 82 PID 716 wrote to memory of 1664 716 09f1e5386bd4b0203c315c7e39685160_NeikiAnalytics.exe 82 PID 716 wrote to memory of 1664 716 09f1e5386bd4b0203c315c7e39685160_NeikiAnalytics.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\09f1e5386bd4b0203c315c7e39685160_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\09f1e5386bd4b0203c315c7e39685160_NeikiAnalytics.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:716 -
C:\Program Files (x86)\Microsoft Build\Isass.exe"C:\Program Files (x86)\Microsoft Build\Isass.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:1664
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
213KB
MD5c7716f74abe02f36f752edb7c49f0a34
SHA17c08105137497d26bfebb07147a00ab03065f635
SHA256737c6553d959d0e7e34b63acd3abb0bd57068d1833974f04fcfd45c5336d2a99
SHA5129ce7d56f3044f96364df88b6985f72a5e874932b89db2572a1a96e2be3ba59d0b462b78e5f88ff1d9fc3e4daee831b27e1a1c6277e34244d934ee29b299c4c26
-
Filesize
6.9MB
MD5dc679da33f92d73c7ae8f494b23a9981
SHA14cb8c10d87999918fa32ad78d4cdd877d0cbb60f
SHA256a2daa5b27af3c9b3a89886b25dd2b8c4c183b271721788802a4fed1a5c6b2ace
SHA5123ad51697bbd750f6284c58827bd07961b9878adeb10df44bb4797092f0734bdde491604698b3e99f329d3ae1a5788b09431071772c5c7b18f4746d6829537977
-
Filesize
56KB
MD518fe30f810364bd33c396c9ee428f4b4
SHA1362433117f9e00a8da6cb54fcd81365fe0168566
SHA2567f13eeb5dca39d05e24b9eb069c6dcb2748633822d67288a8bf8b7e21cdddf55
SHA512160147777466016b908a1a663e3457ed8dc6d0d4c3bb6e75b54206a3e84e8462f1cddf3f23a248d8cbea079615f5f58c4488e016dbdde04b9a0a03db9ce70660