Analysis
-
max time kernel
141s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
11/05/2024, 14:16
Static task
static1
Behavioral task
behavioral1
Sample
0cfcbed897db86ab9f29df8d4b576150_NeikiAnalytics.exe
Resource
win7-20240221-en
General
-
Target
0cfcbed897db86ab9f29df8d4b576150_NeikiAnalytics.exe
-
Size
6.8MB
-
MD5
0cfcbed897db86ab9f29df8d4b576150
-
SHA1
5984d1601e6d115dd84dcf1e5e9e68c8d083ba9e
-
SHA256
eac4f2902f8d0756ca00326dc4a53d8b0d3f77dab23d1d05a5fd5257dcf13e7c
-
SHA512
d1c0086d128d4125d6ac39615adf2fe2a2ba44b0aad1d246a99d056a8f066312e0aa8d9a4fb864d902b359662248ec5f30f0af683403789e02d9fff668d9b5be
-
SSDEEP
98304:8ZU+4cYV5M6Z17WovexHh+Md+bC1mH4cZUi8SlbWI:8ZUBxsHhWbI5cZUid
Malware Config
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
pid Process 476 powershell.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 476 powershell.exe 1728 powershell.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 476 powershell.exe Token: SeDebugPrivilege 1728 powershell.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 2140 wrote to memory of 668 2140 0cfcbed897db86ab9f29df8d4b576150_NeikiAnalytics.exe 29 PID 2140 wrote to memory of 668 2140 0cfcbed897db86ab9f29df8d4b576150_NeikiAnalytics.exe 29 PID 2140 wrote to memory of 668 2140 0cfcbed897db86ab9f29df8d4b576150_NeikiAnalytics.exe 29 PID 668 wrote to memory of 476 668 cmd.exe 30 PID 668 wrote to memory of 476 668 cmd.exe 30 PID 668 wrote to memory of 476 668 cmd.exe 30 PID 2140 wrote to memory of 1720 2140 0cfcbed897db86ab9f29df8d4b576150_NeikiAnalytics.exe 31 PID 2140 wrote to memory of 1720 2140 0cfcbed897db86ab9f29df8d4b576150_NeikiAnalytics.exe 31 PID 2140 wrote to memory of 1720 2140 0cfcbed897db86ab9f29df8d4b576150_NeikiAnalytics.exe 31 PID 1720 wrote to memory of 1728 1720 cmd.exe 32 PID 1720 wrote to memory of 1728 1720 cmd.exe 32 PID 1720 wrote to memory of 1728 1720 cmd.exe 32 PID 2140 wrote to memory of 2864 2140 0cfcbed897db86ab9f29df8d4b576150_NeikiAnalytics.exe 33 PID 2140 wrote to memory of 2864 2140 0cfcbed897db86ab9f29df8d4b576150_NeikiAnalytics.exe 33 PID 2140 wrote to memory of 2864 2140 0cfcbed897db86ab9f29df8d4b576150_NeikiAnalytics.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\0cfcbed897db86ab9f29df8d4b576150_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\0cfcbed897db86ab9f29df8d4b576150_NeikiAnalytics.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2140 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c powershell.exe "Get-Command Compress-Archive"2⤵
- Suspicious use of WriteProcessMemory
PID:668 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe "Get-Command Compress-Archive"3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:476
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c powershell.exe "$ProgressPreference = 'SilentlyContinue'; Compress-Archive -Force -Path \"C:\Users\Admin\AppData\Local\Temp\ChromeTemp\" -DestinationPath \"C:\Users\Admin\AppData\Local\Temp\ExomC.zip\""2⤵
- Suspicious use of WriteProcessMemory
PID:1720 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe "$ProgressPreference = 'SilentlyContinue'; Compress-Archive -Force -Path \"C:\Users\Admin\AppData\Local\Temp\ChromeTemp\" -DestinationPath \"C:\Users\Admin\AppData\Local\Temp\ExomC.zip\""3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1728
-
-
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 2140 -s 1322⤵PID:2864
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD59e02f262fd9f4445e7e67206c63f757e
SHA139a8d07ee7a130ca817c7a1af0f13e434dc8194a
SHA25667e35455aa3c3bb5fa27668297f585b8a3ee9d72dfdb62f53e32aca1f5d5e2cf
SHA512ae1e3c0355c6c9fefd0b29b22d792a8f5821ac47438f6765fcf6545a544c584b5e86547d57ac07c22121c8eb292e87021785929b8d5babb0af919aff370c9c20