Analysis

  • max time kernel
    93s
  • max time network
    94s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12/05/2024, 12:36

General

  • Target

    0dc66ebaf0c47fc15f101cd271dc2610_NeikiAnalytics.exe

  • Size

    178KB

  • MD5

    0dc66ebaf0c47fc15f101cd271dc2610

  • SHA1

    34abad436b80766cd214ec1b20c2969686274a9e

  • SHA256

    d6b87ba33aef5c120be50eea7c47134468d3754e3e2f6ec27b3f16fc3b453356

  • SHA512

    a2bd3e4c342cb6555af58920e9f729065b0f8531d75d82da422d205332f6796947d188ff85c3d7b1678d07280eae4065c4c828cffe231b04af2028911cd5079b

  • SSDEEP

    3072:kjr87SHQ3WHVezaox7QCVa/29UnflIvJhYaf3hIKq:5vQPCV19Uflg3xq

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops file in Windows directory 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0dc66ebaf0c47fc15f101cd271dc2610_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\0dc66ebaf0c47fc15f101cd271dc2610_NeikiAnalytics.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1088
    • C:\Users\Admin\AppData\Local\Temp\WAL5LjawuGKj7kB.exe
      C:\Users\Admin\AppData\Local\Temp\WAL5LjawuGKj7kB.exe
      2⤵
      • Executes dropped EXE
      PID:1524
    • C:\Windows\CTS.exe
      "C:\Windows\CTS.exe"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Drops file in Windows directory
      • Suspicious use of AdjustPrivilegeToken
      PID:5012

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\Office\16.0\excel.exe_Rules.xml

    Filesize

    402KB

    MD5

    347692eca74d201d95295a4954c71622

    SHA1

    aadc54112a38b45dd3e2f889feda80802213bd54

    SHA256

    8c00b6d1e924c3c7018f4ddfb4271948caa9156a0cee345a9c7b7dafcc4f81e1

    SHA512

    38c200bafad6a471022a04a8b0e8c0b6452eebaa01e72bb9b68836ddfa3b7d117da3b9207c7deab63c2cb8399dc29fb8ebc414664812cd26e0abda419db915d1

  • C:\Users\Admin\AppData\Local\Temp\WAL5LjawuGKj7kB.exe

    Filesize

    97KB

    MD5

    0655a0af4a2ff9bf591f614ba8f5721f

    SHA1

    b10d53dccec179109aff61b86ecca65be816f3c4

    SHA256

    d1a473a0dd813bd3565b810dcb8ff8bc7907478a994c564d55200925894e0d32

    SHA512

    9051043e6711b1f1b73f4137a8e4c16362c6be5d6c01b15f0430920ce096adf0b9f6a344462aadc5c2847ab5c0d9682df13803351449462dc5dda6059319d45f

  • C:\Windows\CTS.exe

    Filesize

    80KB

    MD5

    ec704028ad7125c2fa52e04dc68c0ca3

    SHA1

    2a63f27d0138696c9c27a9ea2534e8f2ca11ddc4

    SHA256

    5f77a5d7c9eac3b004820646dece450e315a6e3ed320dc183ae68d59cd2318bf

    SHA512

    a008a08c980583b8698431ca44fa45d5565fdc5316dc3e58c47ae523e7a7a776162979b0c79f9c64f0b71e0d98fb49102679378354f76c270d0c99207c15d160