Analysis

  • max time kernel
    140s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    11/05/2024, 07:50

General

  • Target

    a288e9f68234892f86cd8f1da415c8b0_NeikiAnalytics.exe

  • Size

    905KB

  • MD5

    a288e9f68234892f86cd8f1da415c8b0

  • SHA1

    da916102588b5a65fbef4539233f3183d86bc49c

  • SHA256

    aa87a3ebd114845f81eaf6fb52cac0798b4aaf9cb663cd4477719bccf2f5cb17

  • SHA512

    9efd97eac53d484d880bdc6b6535bc2330499df5b9fba2b54a4abc70a469307d67824aa5701e2263c83583072e26668d6b6a90c53f3f1ace3a08c7f25e16b293

  • SSDEEP

    12288:/n8yN0Mr8Z86aVdzIyFU40vy3W/ceKSHMsiFyY6XNt18n9szJpZjl2zrASZv4Cl:vPuZ8zhfujymk4HM5yJtz1kXxZQCl

Malware Config

Signatures

  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 11 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of WriteProcessMemory 30 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a288e9f68234892f86cd8f1da415c8b0_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\a288e9f68234892f86cd8f1da415c8b0_NeikiAnalytics.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:1740
    • C:\Users\Public\Microsoft Build\Isass.exe
      "C:\Users\Public\Microsoft Build\Isass.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious behavior: EnumeratesProcesses
      PID:2012
    • C:\Users\Public\Microsoft Build\Isass.exe
      "C:\Users\Public\Microsoft Build\Isass.exe" Tablet C:\Users\Admin\AppData\Local\Temp\a288e9f68234892f86cd8f1da415c8b0_NeikiAnalytics.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:2964
      • C:\Users\Admin\AppData\Local\Temp\a288e9f68234892f86cd8f1da415c8b0_NeikiAnalytics.exe
        "C:\Users\Admin\AppData\Local\Temp\a288e9f68234892f86cd8f1da415c8b0_NeikiAnalytics.exe"
        3⤵
        • Loads dropped DLL
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:2612
        • C:\Users\Public\Microsoft Build\Isass.exe
          "C:\Users\Public\Microsoft Build\Isass.exe" Tablet C:\Users\Admin\AppData\Local\Temp\a288e9f68234892f86cd8f1da415c8b0_NeikiAnalytics.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:2648
          • C:\Users\Admin\AppData\Local\Temp\a288e9f68234892f86cd8f1da415c8b0_NeikiAnalytics.exe
            "C:\Users\Admin\AppData\Local\Temp\a288e9f68234892f86cd8f1da415c8b0_NeikiAnalytics.exe"
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of WriteProcessMemory
            PID:2800
            • C:\Windows\Temp\{0E95809D-9E4C-49BF-9613-7BBB69C1A530}\.cr\a288e9f68234892f86cd8f1da415c8b0_NeikiAnalytics.exe
              "C:\Windows\Temp\{0E95809D-9E4C-49BF-9613-7BBB69C1A530}\.cr\a288e9f68234892f86cd8f1da415c8b0_NeikiAnalytics.exe" -burn.clean.room="C:\Users\Admin\AppData\Local\Temp\a288e9f68234892f86cd8f1da415c8b0_NeikiAnalytics.exe" -burn.filehandle.attached=180 -burn.filehandle.self=188
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              PID:3032

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\Temp\{47821B0C-CE91-4A9A-BF7B-0A69E9166E26}\.ba\logo.png

    Filesize

    1KB

    MD5

    d6bd210f227442b3362493d046cea233

    SHA1

    ff286ac8370fc655aea0ef35e9cf0bfcb6d698de

    SHA256

    335a256d4779ec5dcf283d007fb56fd8211bbcaf47dcd70fe60ded6a112744ef

    SHA512

    464aaab9e08de610ad34b97d4076e92dc04c2cdc6669f60bfc50f0f9ce5d71c31b8943bd84cee1a04fb9ab5bbed3442bd41d9cb21a0dd170ea97c463e1ce2b5b

  • \Users\Admin\AppData\Local\Temp\a288e9f68234892f86cd8f1da415c8b0_NeikiAnalytics.exe

    Filesize

    635KB

    MD5

    7cf46d8dfb686998aaaf81e27b995e8c

    SHA1

    c5638a049787ce441c9720c92d3cd02aa3b02429

    SHA256

    120019a0ac9f54224fc9787afba241bd9faaecef489be5a660bb16e85df052e4

    SHA512

    66cf76324e373d3be6cbef39535b419eda486a8f43c305c38a8c01cfc05f9e4073aeade808db8dea306fd3251955e177e45ab578a57114bac1d2df54b4e95efe

  • \Users\Public\Microsoft Build\Isass.exe

    Filesize

    216KB

    MD5

    3f60f2d08b0c8760d3fcaac20bd354dd

    SHA1

    4c67f17acd207738a5e9020258ec0f050675ea94

    SHA256

    d8630ef62ebbacb15140c71519dc21ae8d17d9952dbbecad4b1730f0943399a8

    SHA512

    3cdc770599e9ee6f05de6ec7817d9cc4c32f8b01163b0c9a66d6f8b54ab2f61a4a0fffce4c3c362f7d0101798b9c7aa0652e1ee11a008ae1dea5d2c64ea1568e

  • \Windows\Temp\{47821B0C-CE91-4A9A-BF7B-0A69E9166E26}\.ba\wixstdba.dll

    Filesize

    191KB

    MD5

    eab9caf4277829abdf6223ec1efa0edd

    SHA1

    74862ecf349a9bedd32699f2a7a4e00b4727543d

    SHA256

    a4efbdb2ce55788ffe92a244cb775efd475526ef5b61ad78de2bcdfaddac7041

    SHA512

    45b15ade68e0a90ea7300aeb6dca9bc9e347a63dba5ce72a635957564d1bdf0b1584a5e34191916498850fc7b3b7ecfbcbfcb246b39dbf59d47f66bc825c6fd2

  • memory/1740-9-0x0000000000400000-0x00000000016A8E52-memory.dmp

    Filesize

    18.7MB

  • memory/1740-14-0x00000000045B0000-0x0000000005859000-memory.dmp

    Filesize

    18.7MB

  • memory/1740-12-0x0000000000400000-0x00000000016A8E52-memory.dmp

    Filesize

    18.7MB

  • memory/2012-99-0x0000000000400000-0x00000000016A8E52-memory.dmp

    Filesize

    18.7MB

  • memory/2012-90-0x0000000000400000-0x00000000016A8E52-memory.dmp

    Filesize

    18.7MB

  • memory/2012-141-0x0000000000400000-0x00000000016A8E52-memory.dmp

    Filesize

    18.7MB

  • memory/2012-128-0x0000000000400000-0x00000000016A8E52-memory.dmp

    Filesize

    18.7MB

  • memory/2012-77-0x0000000000400000-0x00000000016A8E52-memory.dmp

    Filesize

    18.7MB

  • memory/2012-78-0x0000000000400000-0x00000000016A8E52-memory.dmp

    Filesize

    18.7MB

  • memory/2012-81-0x0000000000400000-0x00000000016A8E52-memory.dmp

    Filesize

    18.7MB

  • memory/2012-82-0x0000000000400000-0x00000000016A8E52-memory.dmp

    Filesize

    18.7MB

  • memory/2012-89-0x0000000000400000-0x00000000016A8E52-memory.dmp

    Filesize

    18.7MB

  • memory/2012-127-0x0000000000400000-0x00000000016A8E52-memory.dmp

    Filesize

    18.7MB

  • memory/2012-98-0x0000000000400000-0x00000000016A8E52-memory.dmp

    Filesize

    18.7MB

  • memory/2012-15-0x0000000000400000-0x00000000016A8E52-memory.dmp

    Filesize

    18.7MB

  • memory/2012-105-0x0000000000400000-0x00000000016A8E52-memory.dmp

    Filesize

    18.7MB

  • memory/2012-106-0x0000000000400000-0x00000000016A8E52-memory.dmp

    Filesize

    18.7MB

  • memory/2012-114-0x0000000000400000-0x00000000016A8E52-memory.dmp

    Filesize

    18.7MB

  • memory/2012-115-0x0000000000400000-0x00000000016A8E52-memory.dmp

    Filesize

    18.7MB

  • memory/2612-18-0x0000000000400000-0x00000000016A8E52-memory.dmp

    Filesize

    18.7MB

  • memory/2648-26-0x0000000000400000-0x00000000016A8E52-memory.dmp

    Filesize

    18.7MB

  • memory/2964-16-0x0000000000400000-0x00000000016A8E52-memory.dmp

    Filesize

    18.7MB