Analysis
-
max time kernel
140s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
11/05/2024, 07:50
Static task
static1
Behavioral task
behavioral1
Sample
a288e9f68234892f86cd8f1da415c8b0_NeikiAnalytics.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
a288e9f68234892f86cd8f1da415c8b0_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
a288e9f68234892f86cd8f1da415c8b0_NeikiAnalytics.exe
-
Size
905KB
-
MD5
a288e9f68234892f86cd8f1da415c8b0
-
SHA1
da916102588b5a65fbef4539233f3183d86bc49c
-
SHA256
aa87a3ebd114845f81eaf6fb52cac0798b4aaf9cb663cd4477719bccf2f5cb17
-
SHA512
9efd97eac53d484d880bdc6b6535bc2330499df5b9fba2b54a4abc70a469307d67824aa5701e2263c83583072e26668d6b6a90c53f3f1ace3a08c7f25e16b293
-
SSDEEP
12288:/n8yN0Mr8Z86aVdzIyFU40vy3W/ceKSHMsiFyY6XNt18n9szJpZjl2zrASZv4Cl:vPuZ8zhfujymk4HM5yJtz1kXxZQCl
Malware Config
Signatures
-
Executes dropped EXE 5 IoCs
pid Process 2012 Isass.exe 2964 Isass.exe 2648 Isass.exe 2800 a288e9f68234892f86cd8f1da415c8b0_NeikiAnalytics.exe 3032 a288e9f68234892f86cd8f1da415c8b0_NeikiAnalytics.exe -
Loads dropped DLL 11 IoCs
pid Process 1740 a288e9f68234892f86cd8f1da415c8b0_NeikiAnalytics.exe 1740 a288e9f68234892f86cd8f1da415c8b0_NeikiAnalytics.exe 1740 a288e9f68234892f86cd8f1da415c8b0_NeikiAnalytics.exe 1740 a288e9f68234892f86cd8f1da415c8b0_NeikiAnalytics.exe 2612 a288e9f68234892f86cd8f1da415c8b0_NeikiAnalytics.exe 2648 Isass.exe 2800 a288e9f68234892f86cd8f1da415c8b0_NeikiAnalytics.exe 3032 a288e9f68234892f86cd8f1da415c8b0_NeikiAnalytics.exe 2012 Isass.exe 2012 Isass.exe 2012 Isass.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Windows\CurrentVersion\Run\Isass.exe = "C:\\Users\\Public\\Microsoft Build\\Isass.exe" a288e9f68234892f86cd8f1da415c8b0_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Isass.exe = "C:\\Users\\Public\\Microsoft Build\\Isass.exe" a288e9f68234892f86cd8f1da415c8b0_NeikiAnalytics.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 1740 a288e9f68234892f86cd8f1da415c8b0_NeikiAnalytics.exe 2012 Isass.exe 2964 Isass.exe 2964 Isass.exe 2964 Isass.exe 2612 a288e9f68234892f86cd8f1da415c8b0_NeikiAnalytics.exe 2648 Isass.exe 2648 Isass.exe -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 1740 wrote to memory of 2012 1740 a288e9f68234892f86cd8f1da415c8b0_NeikiAnalytics.exe 28 PID 1740 wrote to memory of 2012 1740 a288e9f68234892f86cd8f1da415c8b0_NeikiAnalytics.exe 28 PID 1740 wrote to memory of 2012 1740 a288e9f68234892f86cd8f1da415c8b0_NeikiAnalytics.exe 28 PID 1740 wrote to memory of 2012 1740 a288e9f68234892f86cd8f1da415c8b0_NeikiAnalytics.exe 28 PID 1740 wrote to memory of 2964 1740 a288e9f68234892f86cd8f1da415c8b0_NeikiAnalytics.exe 29 PID 1740 wrote to memory of 2964 1740 a288e9f68234892f86cd8f1da415c8b0_NeikiAnalytics.exe 29 PID 1740 wrote to memory of 2964 1740 a288e9f68234892f86cd8f1da415c8b0_NeikiAnalytics.exe 29 PID 1740 wrote to memory of 2964 1740 a288e9f68234892f86cd8f1da415c8b0_NeikiAnalytics.exe 29 PID 2964 wrote to memory of 2612 2964 Isass.exe 30 PID 2964 wrote to memory of 2612 2964 Isass.exe 30 PID 2964 wrote to memory of 2612 2964 Isass.exe 30 PID 2964 wrote to memory of 2612 2964 Isass.exe 30 PID 2612 wrote to memory of 2648 2612 a288e9f68234892f86cd8f1da415c8b0_NeikiAnalytics.exe 31 PID 2612 wrote to memory of 2648 2612 a288e9f68234892f86cd8f1da415c8b0_NeikiAnalytics.exe 31 PID 2612 wrote to memory of 2648 2612 a288e9f68234892f86cd8f1da415c8b0_NeikiAnalytics.exe 31 PID 2612 wrote to memory of 2648 2612 a288e9f68234892f86cd8f1da415c8b0_NeikiAnalytics.exe 31 PID 2648 wrote to memory of 2800 2648 Isass.exe 32 PID 2648 wrote to memory of 2800 2648 Isass.exe 32 PID 2648 wrote to memory of 2800 2648 Isass.exe 32 PID 2648 wrote to memory of 2800 2648 Isass.exe 32 PID 2648 wrote to memory of 2800 2648 Isass.exe 32 PID 2648 wrote to memory of 2800 2648 Isass.exe 32 PID 2648 wrote to memory of 2800 2648 Isass.exe 32 PID 2800 wrote to memory of 3032 2800 a288e9f68234892f86cd8f1da415c8b0_NeikiAnalytics.exe 33 PID 2800 wrote to memory of 3032 2800 a288e9f68234892f86cd8f1da415c8b0_NeikiAnalytics.exe 33 PID 2800 wrote to memory of 3032 2800 a288e9f68234892f86cd8f1da415c8b0_NeikiAnalytics.exe 33 PID 2800 wrote to memory of 3032 2800 a288e9f68234892f86cd8f1da415c8b0_NeikiAnalytics.exe 33 PID 2800 wrote to memory of 3032 2800 a288e9f68234892f86cd8f1da415c8b0_NeikiAnalytics.exe 33 PID 2800 wrote to memory of 3032 2800 a288e9f68234892f86cd8f1da415c8b0_NeikiAnalytics.exe 33 PID 2800 wrote to memory of 3032 2800 a288e9f68234892f86cd8f1da415c8b0_NeikiAnalytics.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\a288e9f68234892f86cd8f1da415c8b0_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\a288e9f68234892f86cd8f1da415c8b0_NeikiAnalytics.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1740 -
C:\Users\Public\Microsoft Build\Isass.exe"C:\Users\Public\Microsoft Build\Isass.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:2012
-
-
C:\Users\Public\Microsoft Build\Isass.exe"C:\Users\Public\Microsoft Build\Isass.exe" Tablet C:\Users\Admin\AppData\Local\Temp\a288e9f68234892f86cd8f1da415c8b0_NeikiAnalytics.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2964 -
C:\Users\Admin\AppData\Local\Temp\a288e9f68234892f86cd8f1da415c8b0_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\a288e9f68234892f86cd8f1da415c8b0_NeikiAnalytics.exe"3⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2612 -
C:\Users\Public\Microsoft Build\Isass.exe"C:\Users\Public\Microsoft Build\Isass.exe" Tablet C:\Users\Admin\AppData\Local\Temp\a288e9f68234892f86cd8f1da415c8b0_NeikiAnalytics.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2648 -
C:\Users\Admin\AppData\Local\Temp\a288e9f68234892f86cd8f1da415c8b0_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\a288e9f68234892f86cd8f1da415c8b0_NeikiAnalytics.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2800 -
C:\Windows\Temp\{0E95809D-9E4C-49BF-9613-7BBB69C1A530}\.cr\a288e9f68234892f86cd8f1da415c8b0_NeikiAnalytics.exe"C:\Windows\Temp\{0E95809D-9E4C-49BF-9613-7BBB69C1A530}\.cr\a288e9f68234892f86cd8f1da415c8b0_NeikiAnalytics.exe" -burn.clean.room="C:\Users\Admin\AppData\Local\Temp\a288e9f68234892f86cd8f1da415c8b0_NeikiAnalytics.exe" -burn.filehandle.attached=180 -burn.filehandle.self=1886⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3032
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5d6bd210f227442b3362493d046cea233
SHA1ff286ac8370fc655aea0ef35e9cf0bfcb6d698de
SHA256335a256d4779ec5dcf283d007fb56fd8211bbcaf47dcd70fe60ded6a112744ef
SHA512464aaab9e08de610ad34b97d4076e92dc04c2cdc6669f60bfc50f0f9ce5d71c31b8943bd84cee1a04fb9ab5bbed3442bd41d9cb21a0dd170ea97c463e1ce2b5b
-
Filesize
635KB
MD57cf46d8dfb686998aaaf81e27b995e8c
SHA1c5638a049787ce441c9720c92d3cd02aa3b02429
SHA256120019a0ac9f54224fc9787afba241bd9faaecef489be5a660bb16e85df052e4
SHA51266cf76324e373d3be6cbef39535b419eda486a8f43c305c38a8c01cfc05f9e4073aeade808db8dea306fd3251955e177e45ab578a57114bac1d2df54b4e95efe
-
Filesize
216KB
MD53f60f2d08b0c8760d3fcaac20bd354dd
SHA14c67f17acd207738a5e9020258ec0f050675ea94
SHA256d8630ef62ebbacb15140c71519dc21ae8d17d9952dbbecad4b1730f0943399a8
SHA5123cdc770599e9ee6f05de6ec7817d9cc4c32f8b01163b0c9a66d6f8b54ab2f61a4a0fffce4c3c362f7d0101798b9c7aa0652e1ee11a008ae1dea5d2c64ea1568e
-
Filesize
191KB
MD5eab9caf4277829abdf6223ec1efa0edd
SHA174862ecf349a9bedd32699f2a7a4e00b4727543d
SHA256a4efbdb2ce55788ffe92a244cb775efd475526ef5b61ad78de2bcdfaddac7041
SHA51245b15ade68e0a90ea7300aeb6dca9bc9e347a63dba5ce72a635957564d1bdf0b1584a5e34191916498850fc7b3b7ecfbcbfcb246b39dbf59d47f66bc825c6fd2