Analysis

  • max time kernel
    140s
  • max time network
    139s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09/05/2024, 14:14

General

  • Target

    57d29c0fb7968a8c09a3e6bf44b164d0_NeikiAnalytics.exe

  • Size

    645KB

  • MD5

    57d29c0fb7968a8c09a3e6bf44b164d0

  • SHA1

    f45967f1844a4b1a3f82ca4261d211a788f45c07

  • SHA256

    059a5bd50faa94d289deb835b336929b5af4ca1838eaeb752f6e8afadce24717

  • SHA512

    fe54868c94534a5deaa9d3891f5fa171513ad9cd3efc5a0321693d1265a8ce0c27ed7050f696229faeabd3ce7cb3efe1997c8daea97aa37754ccc8bbcb028b69

  • SSDEEP

    12288:xC0woDsnqdKviYErMTR/bF8WK1lJtL1posGOcAaDR36lv4rucLjeXHAY:DwmGqd8lErM9xzIxDcBR3mv4KcLU

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops file in Windows directory 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\57d29c0fb7968a8c09a3e6bf44b164d0_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\57d29c0fb7968a8c09a3e6bf44b164d0_NeikiAnalytics.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2152
    • C:\Users\Admin\AppData\Local\Temp\8RX7DCfQJfIoldx.exe
      C:\Users\Admin\AppData\Local\Temp\8RX7DCfQJfIoldx.exe
      2⤵
      • Executes dropped EXE
      PID:1208
    • C:\Windows\CTS.exe
      "C:\Windows\CTS.exe"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Drops file in Windows directory
      • Suspicious use of AdjustPrivilegeToken
      PID:4452

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\Office\16.0\excel.exe_Rules.xml

    Filesize

    395KB

    MD5

    cac5fb4667cd3e87a882a90111047ce8

    SHA1

    b48c88f13ae9038fecbf274cda49c74b47e04cd5

    SHA256

    53078bf53fd79b06e62ccc12ed9adf597fff94ccb3e2587e93d7b5fc05d3de69

    SHA512

    22d12b17c3528ca2c3513edab9d6824babd1d4a45ce7d588693308e9866fd7765a2c3b41b6deadb07ba4754d9686ecc253920eefdfba23223315a71fa9e4b454

  • C:\Users\Admin\AppData\Local\Temp\8RX7DCfQJfIoldx.exe

    Filesize

    574KB

    MD5

    6503efe0a01c2d50c97be27f3cb10a43

    SHA1

    a0cb3708603a18f02352d01ec672020e5bad5073

    SHA256

    0cf9864ae3a8679ed503f954a453452c93fa44f99ca6f39bbc5860abde7fd35e

    SHA512

    ebdbc553ba4348676fd3f2ca12e48af53a229b449a36e653dbfca90efb34d21033e41d1157dcca28c2b1e5f91368c0839298992247cf7d2e8feca5feab8ecea4

  • C:\Windows\CTS.exe

    Filesize

    71KB

    MD5

    f9d4ab0a726adc9b5e4b7d7b724912f1

    SHA1

    3d42ca2098475924f70ee4a831c4f003b4682328

    SHA256

    b43be87e8586ca5e995979883468f3b3d9dc5212fbfd0b5f3341a5b7c56e0fbc

    SHA512

    22a5f0e4b2716244e978ee50771823926f86baf0382ece48fd049f039cf77b5eb0691d83c61148903cff081fdbea969f47b8ed521647717f42bbed5c64552432