Analysis

  • max time kernel
    134s
  • max time network
    103s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12/05/2024, 02:35

General

  • Target

    5e1a35ea2dce2f1e3601432744d2faa0_NeikiAnalytics.exe

  • Size

    80KB

  • MD5

    5e1a35ea2dce2f1e3601432744d2faa0

  • SHA1

    00e59e46869620db792b225f61fedea67b1975e0

  • SHA256

    f58bbe4135b71924433a014bbc60a9f8c95555e917bfba8413b6a0aea49753de

  • SHA512

    4e01be69e1b745821059fd1ad1a25e097f487735171c3ad8bc2881d0759bbfc0454e1ce0f1601fed5962a45bee9f55adc50cb2aa5c33e426af6379a02755f2bc

  • SSDEEP

    768:JNK2cNW0QbRsWjcd+6yBFLqJ4Z8qx70RM8/O/B2Z9tRQL:pcNjQlsWjcd+xzl7SMQQL

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops file in Windows directory 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5e1a35ea2dce2f1e3601432744d2faa0_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\5e1a35ea2dce2f1e3601432744d2faa0_NeikiAnalytics.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:976
    • C:\Windows\CTS.exe
      "C:\Windows\CTS.exe"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Drops file in Windows directory
      • Suspicious use of AdjustPrivilegeToken
      PID:4992

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\Office\16.0\excel.exe_Rules.xml

    Filesize

    402KB

    MD5

    5237ad4157be6e7c3001d49501d02d32

    SHA1

    74bc9ee027e787660002afa581bc316dfb955457

    SHA256

    a024a67f5f429437fd532cc351fb167c4820475754932f3697e5c20a4b888559

    SHA512

    2b63a290b6c9bfdb29cf074dac69dd8e9b177f4698d9341ff113594c2c308475c12319a2579c4e29c86e0120e63006e3e90386998ad447bef72fa40c0c4405d7

  • C:\Users\Admin\AppData\Local\Temp\PS0N8PfZhEL77uf.exe

    Filesize

    80KB

    MD5

    9bc6f4e00ccbf45a0bd94aa745f3d41d

    SHA1

    cdf9bdf13a947745f2cf9355a861fe42e3b9925c

    SHA256

    3660095ffb9fd71d4012c9a8ffa46e49f81047acf54a3184a503da1c537179cf

    SHA512

    d72f388a0edfed855fc986bafe0ebb6cea51fd21151881a1100201fe54b564e376b1fe1ad3675712dfbcc62119a09cddeee4d11dbdaf21e699091da6f988e30d

  • C:\Windows\CTS.exe

    Filesize

    80KB

    MD5

    ec704028ad7125c2fa52e04dc68c0ca3

    SHA1

    2a63f27d0138696c9c27a9ea2534e8f2ca11ddc4

    SHA256

    5f77a5d7c9eac3b004820646dece450e315a6e3ed320dc183ae68d59cd2318bf

    SHA512

    a008a08c980583b8698431ca44fa45d5565fdc5316dc3e58c47ae523e7a7a776162979b0c79f9c64f0b71e0d98fb49102679378354f76c270d0c99207c15d160