Analysis
-
max time kernel
149s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
10-05-2024 09:00
Static task
static1
Behavioral task
behavioral1
Sample
afc37cfaa3a3ac5d8ed5ecaed32846c0_NeikiAnalytics.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
afc37cfaa3a3ac5d8ed5ecaed32846c0_NeikiAnalytics.exe
Resource
win10v2004-20240426-en
General
-
Target
afc37cfaa3a3ac5d8ed5ecaed32846c0_NeikiAnalytics.exe
-
Size
2.6MB
-
MD5
afc37cfaa3a3ac5d8ed5ecaed32846c0
-
SHA1
15eb7cbe991a6a33a87200b031fe011af5ee77c0
-
SHA256
7309de65f8a90f0247e82dd3fad354202897ac6cfcb8ff42f26bb56d9fb42703
-
SHA512
77ae33a9f98d617defbce8b66afb154199e8fb5851b148f597ba6e75cb0d25fa297035e263989cd268d5758f2e39d59e53323749f74b140dcc443699b59c94cb
-
SSDEEP
49152:sxX7665YxRVplZzSKntlGIiT+HvRdpcAHSjpjK3LB8B/bS:sxX7QnxrloE5dpUpHb
Malware Config
Signatures
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\locadob.exe afc37cfaa3a3ac5d8ed5ecaed32846c0_NeikiAnalytics.exe -
Executes dropped EXE 2 IoCs
pid Process 2352 locadob.exe 1144 adobloc.exe -
Loads dropped DLL 2 IoCs
pid Process 2200 afc37cfaa3a3ac5d8ed5ecaed32846c0_NeikiAnalytics.exe 2200 afc37cfaa3a3ac5d8ed5ecaed32846c0_NeikiAnalytics.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\Parametr = "C:\\IntelprocDR\\adobloc.exe" afc37cfaa3a3ac5d8ed5ecaed32846c0_NeikiAnalytics.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\Parametr = "C:\\LabZXT\\bodasys.exe" afc37cfaa3a3ac5d8ed5ecaed32846c0_NeikiAnalytics.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2200 afc37cfaa3a3ac5d8ed5ecaed32846c0_NeikiAnalytics.exe 2200 afc37cfaa3a3ac5d8ed5ecaed32846c0_NeikiAnalytics.exe 2352 locadob.exe 1144 adobloc.exe 2352 locadob.exe 1144 adobloc.exe 2352 locadob.exe 1144 adobloc.exe 2352 locadob.exe 1144 adobloc.exe 2352 locadob.exe 1144 adobloc.exe 2352 locadob.exe 1144 adobloc.exe 2352 locadob.exe 1144 adobloc.exe 2352 locadob.exe 1144 adobloc.exe 2352 locadob.exe 1144 adobloc.exe 2352 locadob.exe 1144 adobloc.exe 2352 locadob.exe 1144 adobloc.exe 2352 locadob.exe 1144 adobloc.exe 2352 locadob.exe 1144 adobloc.exe 2352 locadob.exe 1144 adobloc.exe 2352 locadob.exe 1144 adobloc.exe 2352 locadob.exe 1144 adobloc.exe 2352 locadob.exe 1144 adobloc.exe 2352 locadob.exe 1144 adobloc.exe 2352 locadob.exe 1144 adobloc.exe 2352 locadob.exe 1144 adobloc.exe 2352 locadob.exe 1144 adobloc.exe 2352 locadob.exe 1144 adobloc.exe 2352 locadob.exe 1144 adobloc.exe 2352 locadob.exe 1144 adobloc.exe 2352 locadob.exe 1144 adobloc.exe 2352 locadob.exe 1144 adobloc.exe 2352 locadob.exe 1144 adobloc.exe 2352 locadob.exe 1144 adobloc.exe 2352 locadob.exe 1144 adobloc.exe 2352 locadob.exe 1144 adobloc.exe 2352 locadob.exe 1144 adobloc.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2200 wrote to memory of 2352 2200 afc37cfaa3a3ac5d8ed5ecaed32846c0_NeikiAnalytics.exe 28 PID 2200 wrote to memory of 2352 2200 afc37cfaa3a3ac5d8ed5ecaed32846c0_NeikiAnalytics.exe 28 PID 2200 wrote to memory of 2352 2200 afc37cfaa3a3ac5d8ed5ecaed32846c0_NeikiAnalytics.exe 28 PID 2200 wrote to memory of 2352 2200 afc37cfaa3a3ac5d8ed5ecaed32846c0_NeikiAnalytics.exe 28 PID 2200 wrote to memory of 1144 2200 afc37cfaa3a3ac5d8ed5ecaed32846c0_NeikiAnalytics.exe 29 PID 2200 wrote to memory of 1144 2200 afc37cfaa3a3ac5d8ed5ecaed32846c0_NeikiAnalytics.exe 29 PID 2200 wrote to memory of 1144 2200 afc37cfaa3a3ac5d8ed5ecaed32846c0_NeikiAnalytics.exe 29 PID 2200 wrote to memory of 1144 2200 afc37cfaa3a3ac5d8ed5ecaed32846c0_NeikiAnalytics.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\afc37cfaa3a3ac5d8ed5ecaed32846c0_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\afc37cfaa3a3ac5d8ed5ecaed32846c0_NeikiAnalytics.exe"1⤵
- Drops startup file
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2200 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\locadob.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\locadob.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2352
-
-
C:\IntelprocDR\adobloc.exeC:\IntelprocDR\adobloc.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:1144
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.6MB
MD50c0dea83cd3e4519122e8e37f24f27fa
SHA1043246b97bc08bc1938e5db43240d862559f715b
SHA256d35ae30818d4e5c8f7b4d9c64087e2de6c37e1dc1d1ea7853e34bf03042cd0a9
SHA512904e426134205f4f3728ede2e5d68bffb6a23ef72c024bce4f68104a40b7c8c7446c81b66c58fb73d43dfddf6baea3ac09a9650d1e7f38b804b7d7d44ec1dcf1
-
Filesize
1.9MB
MD520735bad8c0290c621f33bda9d76acee
SHA1ddc8d84600a19ecd53c4ec8fbc9ca3ee4f4de417
SHA256b198f77600fefaa8fda064396b02dbe653287ae5a2d3ffb9da7a178f8d2d8076
SHA5127e7e87e037527af5733c32fadeaab915ef85bf03327b37dd39bb8543154fb3b58bd81d3cab3fe16819ab5faaf02a278fdce63dad61c05cbade0aebe0a2d9161c
-
Filesize
2.6MB
MD5750f218de648df5574cc3c3902767c24
SHA16973c1d62a8926b9fffdf62fc4f18ce90f9b861b
SHA256f746664a828fa11e8019473c2d5d0aa051f52f5d178e7b87291466e0fee1ebd3
SHA512ee78a99e2d90b7c59a71aecfb51a4be1e7ad96b3456166dc3762a35ca94064b9829a53e3c9739e4a2c78a26af535bd62f86c1ac338945c98d5089809083d4479
-
Filesize
172B
MD5b1db7a664897205c73c197e1599b19e7
SHA19dcb0ccd281d749fcba265b8993f7467c204d6a2
SHA256ab997b37462fa216e7b06b1a1c11f994bb891273573b6341458a23966c5c5563
SHA512553fa92c5c9548f4dcdfe65544bec18f940836e7f7d8c4b29f44d4005eed94acb58e9c2052ea9d48373c341793363dcb73559dd95642583a44ef8637656c02c7
-
Filesize
204B
MD5e2256f5c835a2e2dbbb6e3fd8585fd1a
SHA11435f95a17a3116288f3de770c41e0e56c1d0c16
SHA2569337a3b0b8c614674714cf812f124609c6167d30f49d4b9604ddac30e1235d95
SHA512742d6d5b7586346a7e41e2226b1c77859e8c7ec1fe480b066df70688d00d9adcd877e5ca89922cc17fefbff0bcb9b3f49ccffac9f60d6c043617b2ca4f392ab4
-
Filesize
2.6MB
MD572c11e694e1200206bc4eb856e235af4
SHA1d65565b1a1edf7d63414423b5f16edaf4d44da34
SHA2564e94bc1689a8d5b836014984ba1ef580e6f8cfb9f6554f3d657d9d080e0ad344
SHA51202b374658b70b736e7c5710402663de43c6436922251886f8da3964e50cec17753d3c825bee722f270acfb5ab483c8888d250ca6d5a5b2e79b7ced2f4f7b1786