Analysis

  • max time kernel
    149s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240220-en
  • resource tags

    arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system
  • submitted
    10-05-2024 09:00

General

  • Target

    afc37cfaa3a3ac5d8ed5ecaed32846c0_NeikiAnalytics.exe

  • Size

    2.6MB

  • MD5

    afc37cfaa3a3ac5d8ed5ecaed32846c0

  • SHA1

    15eb7cbe991a6a33a87200b031fe011af5ee77c0

  • SHA256

    7309de65f8a90f0247e82dd3fad354202897ac6cfcb8ff42f26bb56d9fb42703

  • SHA512

    77ae33a9f98d617defbce8b66afb154199e8fb5851b148f597ba6e75cb0d25fa297035e263989cd268d5758f2e39d59e53323749f74b140dcc443699b59c94cb

  • SSDEEP

    49152:sxX7665YxRVplZzSKntlGIiT+HvRdpcAHSjpjK3LB8B/bS:sxX7QnxrloE5dpUpHb

Malware Config

Signatures

  • Drops startup file 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\afc37cfaa3a3ac5d8ed5ecaed32846c0_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\afc37cfaa3a3ac5d8ed5ecaed32846c0_NeikiAnalytics.exe"
    1⤵
    • Drops startup file
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:2200
    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\locadob.exe
      "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\locadob.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      PID:2352
    • C:\IntelprocDR\adobloc.exe
      C:\IntelprocDR\adobloc.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      PID:1144

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\IntelprocDR\adobloc.exe

    Filesize

    2.6MB

    MD5

    0c0dea83cd3e4519122e8e37f24f27fa

    SHA1

    043246b97bc08bc1938e5db43240d862559f715b

    SHA256

    d35ae30818d4e5c8f7b4d9c64087e2de6c37e1dc1d1ea7853e34bf03042cd0a9

    SHA512

    904e426134205f4f3728ede2e5d68bffb6a23ef72c024bce4f68104a40b7c8c7446c81b66c58fb73d43dfddf6baea3ac09a9650d1e7f38b804b7d7d44ec1dcf1

  • C:\LabZXT\bodasys.exe

    Filesize

    1.9MB

    MD5

    20735bad8c0290c621f33bda9d76acee

    SHA1

    ddc8d84600a19ecd53c4ec8fbc9ca3ee4f4de417

    SHA256

    b198f77600fefaa8fda064396b02dbe653287ae5a2d3ffb9da7a178f8d2d8076

    SHA512

    7e7e87e037527af5733c32fadeaab915ef85bf03327b37dd39bb8543154fb3b58bd81d3cab3fe16819ab5faaf02a278fdce63dad61c05cbade0aebe0a2d9161c

  • C:\LabZXT\bodasys.exe

    Filesize

    2.6MB

    MD5

    750f218de648df5574cc3c3902767c24

    SHA1

    6973c1d62a8926b9fffdf62fc4f18ce90f9b861b

    SHA256

    f746664a828fa11e8019473c2d5d0aa051f52f5d178e7b87291466e0fee1ebd3

    SHA512

    ee78a99e2d90b7c59a71aecfb51a4be1e7ad96b3456166dc3762a35ca94064b9829a53e3c9739e4a2c78a26af535bd62f86c1ac338945c98d5089809083d4479

  • C:\Users\Admin\253086396416_6.1_Admin.ini

    Filesize

    172B

    MD5

    b1db7a664897205c73c197e1599b19e7

    SHA1

    9dcb0ccd281d749fcba265b8993f7467c204d6a2

    SHA256

    ab997b37462fa216e7b06b1a1c11f994bb891273573b6341458a23966c5c5563

    SHA512

    553fa92c5c9548f4dcdfe65544bec18f940836e7f7d8c4b29f44d4005eed94acb58e9c2052ea9d48373c341793363dcb73559dd95642583a44ef8637656c02c7

  • C:\Users\Admin\253086396416_6.1_Admin.ini

    Filesize

    204B

    MD5

    e2256f5c835a2e2dbbb6e3fd8585fd1a

    SHA1

    1435f95a17a3116288f3de770c41e0e56c1d0c16

    SHA256

    9337a3b0b8c614674714cf812f124609c6167d30f49d4b9604ddac30e1235d95

    SHA512

    742d6d5b7586346a7e41e2226b1c77859e8c7ec1fe480b066df70688d00d9adcd877e5ca89922cc17fefbff0bcb9b3f49ccffac9f60d6c043617b2ca4f392ab4

  • \Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\locadob.exe

    Filesize

    2.6MB

    MD5

    72c11e694e1200206bc4eb856e235af4

    SHA1

    d65565b1a1edf7d63414423b5f16edaf4d44da34

    SHA256

    4e94bc1689a8d5b836014984ba1ef580e6f8cfb9f6554f3d657d9d080e0ad344

    SHA512

    02b374658b70b736e7c5710402663de43c6436922251886f8da3964e50cec17753d3c825bee722f270acfb5ab483c8888d250ca6d5a5b2e79b7ced2f4f7b1786