Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
10/05/2024, 07:19
Static task
static1
Behavioral task
behavioral1
Sample
9ea889233129a72fbe429afd3c821d60_NeikiAnalytics.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
9ea889233129a72fbe429afd3c821d60_NeikiAnalytics.exe
Resource
win10v2004-20240426-en
General
-
Target
9ea889233129a72fbe429afd3c821d60_NeikiAnalytics.exe
-
Size
387KB
-
MD5
9ea889233129a72fbe429afd3c821d60
-
SHA1
382cba08a3b7fbe4a338ab81de551c51807cca37
-
SHA256
ff599d9dd5b2a31e734391ef0fc4316ef781768b5c653e9380d7118595995103
-
SHA512
96411be9114ccad76a390bf1df9bbde9d6b11c60b415f8078f7e9fdb54afce6bb4cbe4223f738a8a79c4c323f64a4969cef448f839d0c1a921d9703fab712f79
-
SSDEEP
6144:/rTfUHeeSKOS9ccFKk3Y9t9YZZ44omkAseOudcDiQuAB:/n8yN0Mr8ZZ4WxOccmQus
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 6 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\Control Panel\International\Geo\Nation 9ea889233129a72fbe429afd3c821d60_NeikiAnalytics.exe Key value queried \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\Control Panel\International\Geo\Nation Isass.exe Key value queried \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\Control Panel\International\Geo\Nation 9ea889233129a72fbe429afd3c821d60_NeikiAnalytics.exe Key value queried \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\Control Panel\International\Geo\Nation Isass.exe Key value queried \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\Control Panel\International\Geo\Nation 9ea889233129a72fbe429afd3c821d60_NeikiAnalytics.exe Key value queried \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\Control Panel\International\Geo\Nation Isass.exe -
Executes dropped EXE 5 IoCs
pid Process 4256 Isass.exe 1908 Isass.exe 552 Isass.exe 1436 Isass.exe 2352 9ea889233129a72fbe429afd3c821d60_NeikiAnalytics.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Isass.exe = "C:\\Users\\Public\\Microsoft Build\\Isass.exe" 9ea889233129a72fbe429afd3c821d60_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Isass.exe = "C:\\Users\\Public\\Microsoft Build\\Isass.exe" 9ea889233129a72fbe429afd3c821d60_NeikiAnalytics.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 24 IoCs
pid Process 960 9ea889233129a72fbe429afd3c821d60_NeikiAnalytics.exe 960 9ea889233129a72fbe429afd3c821d60_NeikiAnalytics.exe 4256 Isass.exe 4256 Isass.exe 1908 Isass.exe 1908 Isass.exe 1908 Isass.exe 1908 Isass.exe 1908 Isass.exe 1908 Isass.exe 4828 9ea889233129a72fbe429afd3c821d60_NeikiAnalytics.exe 4828 9ea889233129a72fbe429afd3c821d60_NeikiAnalytics.exe 552 Isass.exe 552 Isass.exe 552 Isass.exe 552 Isass.exe 552 Isass.exe 552 Isass.exe 1136 9ea889233129a72fbe429afd3c821d60_NeikiAnalytics.exe 1136 9ea889233129a72fbe429afd3c821d60_NeikiAnalytics.exe 1436 Isass.exe 1436 Isass.exe 1436 Isass.exe 1436 Isass.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 960 wrote to memory of 4256 960 9ea889233129a72fbe429afd3c821d60_NeikiAnalytics.exe 83 PID 960 wrote to memory of 4256 960 9ea889233129a72fbe429afd3c821d60_NeikiAnalytics.exe 83 PID 960 wrote to memory of 4256 960 9ea889233129a72fbe429afd3c821d60_NeikiAnalytics.exe 83 PID 960 wrote to memory of 1908 960 9ea889233129a72fbe429afd3c821d60_NeikiAnalytics.exe 84 PID 960 wrote to memory of 1908 960 9ea889233129a72fbe429afd3c821d60_NeikiAnalytics.exe 84 PID 960 wrote to memory of 1908 960 9ea889233129a72fbe429afd3c821d60_NeikiAnalytics.exe 84 PID 1908 wrote to memory of 4828 1908 Isass.exe 85 PID 1908 wrote to memory of 4828 1908 Isass.exe 85 PID 1908 wrote to memory of 4828 1908 Isass.exe 85 PID 4828 wrote to memory of 552 4828 9ea889233129a72fbe429afd3c821d60_NeikiAnalytics.exe 86 PID 4828 wrote to memory of 552 4828 9ea889233129a72fbe429afd3c821d60_NeikiAnalytics.exe 86 PID 4828 wrote to memory of 552 4828 9ea889233129a72fbe429afd3c821d60_NeikiAnalytics.exe 86 PID 552 wrote to memory of 1136 552 Isass.exe 87 PID 552 wrote to memory of 1136 552 Isass.exe 87 PID 552 wrote to memory of 1136 552 Isass.exe 87 PID 1136 wrote to memory of 1436 1136 9ea889233129a72fbe429afd3c821d60_NeikiAnalytics.exe 88 PID 1136 wrote to memory of 1436 1136 9ea889233129a72fbe429afd3c821d60_NeikiAnalytics.exe 88 PID 1136 wrote to memory of 1436 1136 9ea889233129a72fbe429afd3c821d60_NeikiAnalytics.exe 88 PID 1436 wrote to memory of 2352 1436 Isass.exe 89 PID 1436 wrote to memory of 2352 1436 Isass.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\9ea889233129a72fbe429afd3c821d60_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\9ea889233129a72fbe429afd3c821d60_NeikiAnalytics.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:960 -
C:\Users\Public\Microsoft Build\Isass.exe"C:\Users\Public\Microsoft Build\Isass.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:4256
-
-
C:\Users\Public\Microsoft Build\Isass.exe"C:\Users\Public\Microsoft Build\Isass.exe" Tablet C:\Users\Admin\AppData\Local\Temp\9ea889233129a72fbe429afd3c821d60_NeikiAnalytics.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1908 -
C:\Users\Admin\AppData\Local\Temp\9ea889233129a72fbe429afd3c821d60_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\9ea889233129a72fbe429afd3c821d60_NeikiAnalytics.exe"3⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4828 -
C:\Users\Public\Microsoft Build\Isass.exe"C:\Users\Public\Microsoft Build\Isass.exe" Tablet C:\Users\Admin\AppData\Local\Temp\9ea889233129a72fbe429afd3c821d60_NeikiAnalytics.exe4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:552 -
C:\Users\Admin\AppData\Local\Temp\9ea889233129a72fbe429afd3c821d60_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\9ea889233129a72fbe429afd3c821d60_NeikiAnalytics.exe"5⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1136 -
C:\Users\Public\Microsoft Build\Isass.exe"C:\Users\Public\Microsoft Build\Isass.exe" Tablet C:\Users\Admin\AppData\Local\Temp\9ea889233129a72fbe429afd3c821d60_NeikiAnalytics.exe6⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1436 -
C:\Users\Admin\AppData\Local\Temp\9ea889233129a72fbe429afd3c821d60_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\9ea889233129a72fbe429afd3c821d60_NeikiAnalytics.exe"7⤵
- Executes dropped EXE
PID:2352
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
728KB
MD54a284f9c35be65213cfd76a00275eb0d
SHA187b692f57c0e3d6d654321a3f499c34f251e855e
SHA2567371ed3273a5fd832b0cd96a4d37ec00e7bbebcbfdaaeb856a4a4f73450c5ae7
SHA5123c65d7c8a627068935dba38a8ae046fe836096808787214335bc10466f8d6bec6a2da0add04d8594ee6a5733f47291433b009fb8ac4e5023a08a2672d05ddec0
-
Filesize
140KB
MD50d0b992d2d4b7619f49ee0458d3469b1
SHA15d9835b408a231902654d516b48843890f4130e5
SHA25655c3f3f02b48a1e69d8b58d195c53f2d604acd890d09d7310272dcd289cf2d94
SHA5128435b079d408689fabb3d8713c2d4b86f85f1b9bc4bc79427ee0ae069fafd23a703d71d481a1515bb98a31b90171a75a97c1ec6a9df63170a4961940e04494b7
-
Filesize
216KB
MD5e61335365196601dda57a87c5924f007
SHA1d76360a431c23f593ad6aa6bdfe4b006587d5630
SHA256db98d96b31889d67315b5004e6455599f1b45a85b84e00ffb9f607c838e277bc
SHA512c1302a4c36de22d4067da97947a32e0140290bf123efeaad3353f506b1216ff110283f62c864a1b4de87a453fde96d5bbe94dbcfa9a45c2b382bb047a8d13f7b