Analysis

  • max time kernel
    140s
  • max time network
    94s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09/05/2024, 22:02

General

  • Target

    09f1e5386bd4b0203c315c7e39685160_NeikiAnalytics.exe

  • Size

    283KB

  • MD5

    09f1e5386bd4b0203c315c7e39685160

  • SHA1

    266164d24e0421e47c1ffcb143422e026b7c565e

  • SHA256

    0b3f38de9ddda5bbaa2f5e1e760289c529448febf7202b0c23a4de372f616cb0

  • SHA512

    369c300d610de92f7b11d151c28ff806772f6feb754c42798b2cae2afdae7935fec65556ba546e4566f4960b9ef41692955638fe94ea9d9882677467ddffdfdd

  • SSDEEP

    6144:ztvBPnU1b7e9SQii1EkoNlhlrQ2ZrM2xjT33J9ChN5wrb:Zv1nWdQP1EDhZPx33Z9yN5wn

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops file in Program Files directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\09f1e5386bd4b0203c315c7e39685160_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\09f1e5386bd4b0203c315c7e39685160_NeikiAnalytics.exe"
    1⤵
    • Checks computer location settings
    • Adds Run key to start application
    • Drops file in Program Files directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:716
    • C:\Program Files (x86)\Microsoft Build\Isass.exe
      "C:\Program Files (x86)\Microsoft Build\Isass.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      PID:1664

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Program Files (x86)\Microsoft Build\Isass.exe

          Filesize

          213KB

          MD5

          c7716f74abe02f36f752edb7c49f0a34

          SHA1

          7c08105137497d26bfebb07147a00ab03065f635

          SHA256

          737c6553d959d0e7e34b63acd3abb0bd57068d1833974f04fcfd45c5336d2a99

          SHA512

          9ce7d56f3044f96364df88b6985f72a5e874932b89db2572a1a96e2be3ba59d0b462b78e5f88ff1d9fc3e4daee831b27e1a1c6277e34244d934ee29b299c4c26

        • C:\ProgramData\Microsoft\ClickToRun\{9AC08E99-230B-47e8-9721-4577B7F124EA}\integrator.exe

          Filesize

          6.9MB

          MD5

          dc679da33f92d73c7ae8f494b23a9981

          SHA1

          4cb8c10d87999918fa32ad78d4cdd877d0cbb60f

          SHA256

          a2daa5b27af3c9b3a89886b25dd2b8c4c183b271721788802a4fed1a5c6b2ace

          SHA512

          3ad51697bbd750f6284c58827bd07961b9878adeb10df44bb4797092f0734bdde491604698b3e99f329d3ae1a5788b09431071772c5c7b18f4746d6829537977

        • C:\Users\Admin\AppData\Local\Temp\NL_09f1e5386bd4b0203c315c7e39685160_NeikiAnalytics.exe

          Filesize

          56KB

          MD5

          18fe30f810364bd33c396c9ee428f4b4

          SHA1

          362433117f9e00a8da6cb54fcd81365fe0168566

          SHA256

          7f13eeb5dca39d05e24b9eb069c6dcb2748633822d67288a8bf8b7e21cdddf55

          SHA512

          160147777466016b908a1a663e3457ed8dc6d0d4c3bb6e75b54206a3e84e8462f1cddf3f23a248d8cbea079615f5f58c4488e016dbdde04b9a0a03db9ce70660

        • memory/716-18-0x0000000000400000-0x00000000016A7000-memory.dmp

          Filesize

          18.7MB

        • memory/716-4-0x0000000000400000-0x00000000016A7000-memory.dmp

          Filesize

          18.7MB

        • memory/716-8-0x00000000019C0000-0x00000000019C1000-memory.dmp

          Filesize

          4KB

        • memory/1664-22-0x0000000000400000-0x00000000016A7000-memory.dmp

          Filesize

          18.7MB

        • memory/1664-27-0x0000000000400000-0x00000000016A7000-memory.dmp

          Filesize

          18.7MB

        • memory/1664-20-0x0000000000400000-0x00000000016A7000-memory.dmp

          Filesize

          18.7MB

        • memory/1664-21-0x0000000000400000-0x00000000016A7000-memory.dmp

          Filesize

          18.7MB

        • memory/1664-9-0x0000000001A60000-0x0000000001A61000-memory.dmp

          Filesize

          4KB

        • memory/1664-23-0x0000000000400000-0x00000000016A7000-memory.dmp

          Filesize

          18.7MB

        • memory/1664-24-0x0000000000400000-0x00000000016A7000-memory.dmp

          Filesize

          18.7MB

        • memory/1664-25-0x0000000000400000-0x00000000016A7000-memory.dmp

          Filesize

          18.7MB

        • memory/1664-26-0x0000000000400000-0x00000000016A7000-memory.dmp

          Filesize

          18.7MB

        • memory/1664-19-0x0000000000400000-0x00000000016A7000-memory.dmp

          Filesize

          18.7MB

        • memory/1664-28-0x0000000000400000-0x00000000016A7000-memory.dmp

          Filesize

          18.7MB

        • memory/1664-29-0x0000000000400000-0x00000000016A7000-memory.dmp

          Filesize

          18.7MB

        • memory/1664-6-0x0000000000400000-0x00000000016A7000-memory.dmp

          Filesize

          18.7MB

        • memory/1664-34-0x0000000000400000-0x00000000016A7000-memory.dmp

          Filesize

          18.7MB

        • memory/1664-37-0x0000000000400000-0x00000000016A7000-memory.dmp

          Filesize

          18.7MB

        • memory/1664-60-0x0000000000400000-0x00000000016A7000-memory.dmp

          Filesize

          18.7MB

        • memory/1664-61-0x0000000000400000-0x00000000016A7000-memory.dmp

          Filesize

          18.7MB