Analysis
-
max time kernel
134s -
max time network
103s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
12/05/2024, 02:35
Static task
static1
Behavioral task
behavioral1
Sample
5e1a35ea2dce2f1e3601432744d2faa0_NeikiAnalytics.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
5e1a35ea2dce2f1e3601432744d2faa0_NeikiAnalytics.exe
Resource
win10v2004-20240426-en
General
-
Target
5e1a35ea2dce2f1e3601432744d2faa0_NeikiAnalytics.exe
-
Size
80KB
-
MD5
5e1a35ea2dce2f1e3601432744d2faa0
-
SHA1
00e59e46869620db792b225f61fedea67b1975e0
-
SHA256
f58bbe4135b71924433a014bbc60a9f8c95555e917bfba8413b6a0aea49753de
-
SHA512
4e01be69e1b745821059fd1ad1a25e097f487735171c3ad8bc2881d0759bbfc0454e1ce0f1601fed5962a45bee9f55adc50cb2aa5c33e426af6379a02755f2bc
-
SSDEEP
768:JNK2cNW0QbRsWjcd+6yBFLqJ4Z8qx70RM8/O/B2Z9tRQL:pcNjQlsWjcd+xzl7SMQQL
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4992 CTS.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\CTS = "C:\\Windows\\CTS.exe" 5e1a35ea2dce2f1e3601432744d2faa0_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\CTS = "C:\\Windows\\CTS.exe" CTS.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\CTS.exe 5e1a35ea2dce2f1e3601432744d2faa0_NeikiAnalytics.exe File created C:\Windows\CTS.exe CTS.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 976 5e1a35ea2dce2f1e3601432744d2faa0_NeikiAnalytics.exe Token: SeDebugPrivilege 4992 CTS.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 976 wrote to memory of 4992 976 5e1a35ea2dce2f1e3601432744d2faa0_NeikiAnalytics.exe 82 PID 976 wrote to memory of 4992 976 5e1a35ea2dce2f1e3601432744d2faa0_NeikiAnalytics.exe 82 PID 976 wrote to memory of 4992 976 5e1a35ea2dce2f1e3601432744d2faa0_NeikiAnalytics.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\5e1a35ea2dce2f1e3601432744d2faa0_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\5e1a35ea2dce2f1e3601432744d2faa0_NeikiAnalytics.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:976 -
C:\Windows\CTS.exe"C:\Windows\CTS.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:4992
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
402KB
MD55237ad4157be6e7c3001d49501d02d32
SHA174bc9ee027e787660002afa581bc316dfb955457
SHA256a024a67f5f429437fd532cc351fb167c4820475754932f3697e5c20a4b888559
SHA5122b63a290b6c9bfdb29cf074dac69dd8e9b177f4698d9341ff113594c2c308475c12319a2579c4e29c86e0120e63006e3e90386998ad447bef72fa40c0c4405d7
-
Filesize
80KB
MD59bc6f4e00ccbf45a0bd94aa745f3d41d
SHA1cdf9bdf13a947745f2cf9355a861fe42e3b9925c
SHA2563660095ffb9fd71d4012c9a8ffa46e49f81047acf54a3184a503da1c537179cf
SHA512d72f388a0edfed855fc986bafe0ebb6cea51fd21151881a1100201fe54b564e376b1fe1ad3675712dfbcc62119a09cddeee4d11dbdaf21e699091da6f988e30d
-
Filesize
80KB
MD5ec704028ad7125c2fa52e04dc68c0ca3
SHA12a63f27d0138696c9c27a9ea2534e8f2ca11ddc4
SHA2565f77a5d7c9eac3b004820646dece450e315a6e3ed320dc183ae68d59cd2318bf
SHA512a008a08c980583b8698431ca44fa45d5565fdc5316dc3e58c47ae523e7a7a776162979b0c79f9c64f0b71e0d98fb49102679378354f76c270d0c99207c15d160