Analysis
-
max time kernel
93s -
max time network
94s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
12/05/2024, 12:36
Static task
static1
Behavioral task
behavioral1
Sample
0dc66ebaf0c47fc15f101cd271dc2610_NeikiAnalytics.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
0dc66ebaf0c47fc15f101cd271dc2610_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
0dc66ebaf0c47fc15f101cd271dc2610_NeikiAnalytics.exe
-
Size
178KB
-
MD5
0dc66ebaf0c47fc15f101cd271dc2610
-
SHA1
34abad436b80766cd214ec1b20c2969686274a9e
-
SHA256
d6b87ba33aef5c120be50eea7c47134468d3754e3e2f6ec27b3f16fc3b453356
-
SHA512
a2bd3e4c342cb6555af58920e9f729065b0f8531d75d82da422d205332f6796947d188ff85c3d7b1678d07280eae4065c4c828cffe231b04af2028911cd5079b
-
SSDEEP
3072:kjr87SHQ3WHVezaox7QCVa/29UnflIvJhYaf3hIKq:5vQPCV19Uflg3xq
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 1524 WAL5LjawuGKj7kB.exe 5012 CTS.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\CTS = "C:\\Windows\\CTS.exe" 0dc66ebaf0c47fc15f101cd271dc2610_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\CTS = "C:\\Windows\\CTS.exe" CTS.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\CTS.exe 0dc66ebaf0c47fc15f101cd271dc2610_NeikiAnalytics.exe File created C:\Windows\CTS.exe CTS.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1088 0dc66ebaf0c47fc15f101cd271dc2610_NeikiAnalytics.exe Token: SeDebugPrivilege 5012 CTS.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 1088 wrote to memory of 1524 1088 0dc66ebaf0c47fc15f101cd271dc2610_NeikiAnalytics.exe 82 PID 1088 wrote to memory of 1524 1088 0dc66ebaf0c47fc15f101cd271dc2610_NeikiAnalytics.exe 82 PID 1088 wrote to memory of 5012 1088 0dc66ebaf0c47fc15f101cd271dc2610_NeikiAnalytics.exe 83 PID 1088 wrote to memory of 5012 1088 0dc66ebaf0c47fc15f101cd271dc2610_NeikiAnalytics.exe 83 PID 1088 wrote to memory of 5012 1088 0dc66ebaf0c47fc15f101cd271dc2610_NeikiAnalytics.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\0dc66ebaf0c47fc15f101cd271dc2610_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\0dc66ebaf0c47fc15f101cd271dc2610_NeikiAnalytics.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1088 -
C:\Users\Admin\AppData\Local\Temp\WAL5LjawuGKj7kB.exeC:\Users\Admin\AppData\Local\Temp\WAL5LjawuGKj7kB.exe2⤵
- Executes dropped EXE
PID:1524
-
-
C:\Windows\CTS.exe"C:\Windows\CTS.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:5012
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
402KB
MD5347692eca74d201d95295a4954c71622
SHA1aadc54112a38b45dd3e2f889feda80802213bd54
SHA2568c00b6d1e924c3c7018f4ddfb4271948caa9156a0cee345a9c7b7dafcc4f81e1
SHA51238c200bafad6a471022a04a8b0e8c0b6452eebaa01e72bb9b68836ddfa3b7d117da3b9207c7deab63c2cb8399dc29fb8ebc414664812cd26e0abda419db915d1
-
Filesize
97KB
MD50655a0af4a2ff9bf591f614ba8f5721f
SHA1b10d53dccec179109aff61b86ecca65be816f3c4
SHA256d1a473a0dd813bd3565b810dcb8ff8bc7907478a994c564d55200925894e0d32
SHA5129051043e6711b1f1b73f4137a8e4c16362c6be5d6c01b15f0430920ce096adf0b9f6a344462aadc5c2847ab5c0d9682df13803351449462dc5dda6059319d45f
-
Filesize
80KB
MD5ec704028ad7125c2fa52e04dc68c0ca3
SHA12a63f27d0138696c9c27a9ea2534e8f2ca11ddc4
SHA2565f77a5d7c9eac3b004820646dece450e315a6e3ed320dc183ae68d59cd2318bf
SHA512a008a08c980583b8698431ca44fa45d5565fdc5316dc3e58c47ae523e7a7a776162979b0c79f9c64f0b71e0d98fb49102679378354f76c270d0c99207c15d160